RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks
@article{Cohen2021RadArnomalyPR, title={RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks}, author={Shai Cohen and Efrat Levy and Avi Shaked and Tair Cohen and Yuval Elovici and Asaf Shabtai}, journal={Sensors (Basel, Switzerland)}, year={2021}, volume={22} }
Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have…
Figures and Tables from this paper
2 Citations
Network Attacks Against Marine Radar Systems: A Taxonomy, Simulation Environment, and Dataset
- Computer Science2022 IEEE 47th Conference on Local Computer Networks (LCN)
- 2022
This paper identifies possible attacks on radar communication and discusses how these threaten safe vessel operation in an attack taxonomy, and develops a holistic simulation environment with radar, complementary nautical sensors, and prototypically implemented cyberattacks from this taxonomy.
dump1030: open-source plug-and-play demodulator/decoder for 1030MHz uplink
- Computer ScienceIEEE Aerospace and Electronic Systems Magazine
- 2023
This paper presents the development and evaluation of dump1030 - cross-platform plug-and-play open-source implementation for decoding 1030MHz uplink Mode A/C/S interrogations and achieves a high detection accuracy of 1030 MHz interrogation signals based on lab evaluation using synthetically-generated interrogation signals.
References
SHOWING 1-10 OF 33 REFERENCES
Security Analysis of Radar Systems
- Computer Science, MathematicsCPS-SPC@CCS
- 2019
This study presents a risk analysis for radar systems, an in depth review of the existing literature on related topics, and demonstrates the realization of an attack on a radar system created for this task.
A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems
- Computer ScienceIEEE Transactions on Signal and Information Processing over Networks
- 2018
This paper takes the first attempt to investigate the FDI attack's effects on a networked radar system and proposes a novel data fusion algorithm to combat this attack.
Classification of Radar Signals with Convolutional Neural Networks
- Computer Science2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)
- 2018
A method based on machine learning to cope with new threat signals of radars according to the jamming techniques with convolutional neural networks, and does not refer to the preexisting library.
A Comprehensive Survey of Machine Learning Applied to Radar Signal Processing
- Computer ScienceArXiv
- 2020
This paper aims at helping researchers and practitioners to better understand the application of ML techniques to RSP-related problems by providing a comprehensive, structured and reasoned literature overview of ML-based RSP techniques.
Joint Probabilistic Data Association Tracker for Extended Target Tracking Applied to X-Band Marine Radar Data
- Computer ScienceIEEE Journal of Oceanic Engineering
- 2016
This paper proposes a signal processing chain composed by a detector and a joint probabilistic data association (JPDA) tracker to handle the problem of multiple ETT and to jointly estimate both the targets' kinematics and their sizes, i.e., length and width.
Classification of radar jammer FM signals using a neural network
- Computer ScienceDefense + Security
- 2017
An approach based on artificial Neural Networks to classify wideband radar jammer signals for more efficient use of countermeasures and observes that a Signal to Noise Ratio (SNR) of 5dB allows the network to approach an average of 5% percent Probability of Error (PE).
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks
- Computer Science2019 IEEE Conference on Communications and Network Security (CNS)
- 2019
SODA - a two-stage Deep Neural Network (DNN)-based spoofing detector for ADS-B that consists of a message classifier and an aircraft classifier that outperforms other machine learning techniques such as XGBoost, Logistic Regression, and Support Vector Machine.
Security system for surveillance radar network communication using chaos algorithm
- Computer Science2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)
- 2014
A prototype of security system for surveillance radar network, which is handling the security of communications over the Internet between a radar station to master station, is proposed and Pseudorandom Number Generator using chaos algorithm was added to strengthen the salt cryptographic scheme.
Decentralized Automotive Radar Spectrum Allocation to Avoid Mutual Interference Using Reinforcement Learning
- Computer ScienceIEEE Transactions on Aerospace and Electronic Systems
- 2021
A long short-term memory recurrent network is used to aggregate radar observations through time so that each radar can learn to choose a frequency subband by combining both the present and past observations.
On-Road Vehicle Detection and Tracking Using MMW Radar and Monovision Fusion
- Computer Science, EngineeringIEEE Transactions on Intelligent Transportation Systems
- 2016
This paper presents a collaborative fusion approach to achieve the optimal balance between vehicle detection accuracy and computational efficiency and shows that the proposed system can detect on-road vehicles with 92.36% detection rate and 0% false alarm rate.