Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices

作者: Andrei Costin , Aurélien Francillon

DOI:

关键词:

摘要: In this paper we investigate (in)security aspects of Automatic Dependent Surveillance-Broadcast (ADS-B) protocol. ADS-B is intended to be widely deployed in Air Traffic Management (ATM) Surveillance systems by 2020. One the goals increase safety air traffic. While security was previously questioned, demonstrate that attacks are both easy and practically feasible, for a moderately sophisticated attacker. Attacks range from passive (eavesdropping) active (message jamming, replaying injection). The have been implemented using an Universal Software Radio Peripheral (USRP), available SoftwareDefined (SDR). which developed receiver/transmitter chain with GNURadio. We then present analyze results tested against USRP-based commercial-off-the-self (COTS) radio-enthusiast receivers. Subsequently, discuss risks associated described their implication on air-traffic, as well possible solutions short long terms. Finally, argue ADS-B, planned long-term use, lacks minimal necessary mechanism ensure Keywords-Architecture Design Control, Management, SurveillanceBroadcast, message injection, replay, wireless security, privacy.

参考文章(26)
Mohammed Feham, Benamar Kadri, Abdallah M'hamed, Lightweight PKI for WSN uPKI. International Journal of Network Security. ,vol. 10, pp. 194- 200 ,(2010)
Robert D. Grappel, Guidance Material for Mode S-Specific Protocol Application Avionics Defense Technical Information Center. ,(2007) , 10.21236/ADA468813
D.J. Bernays, A.C. Drumm, E.M. Shank, Validation techniques for ADS-B surveillance data Proceedings. The 21st Digital Avionics Systems Conference. ,vol. 1, ,(2002) , 10.1109/DASC.2002.1067956
R. John Hansman, Edward Lester, Benefits and incentives for ADS-B equipage in the National Airspace System Massachusetts Institute of Technology. ,(2007)
Krishna Sampigethaya, Visualization & assessment of ADS-B security for green ATM document analysis systems. ,(2010) , 10.1109/DASC.2010.5655382
Paul Marks, Air traffic system vulnerable to cyber attack New Scientist. ,vol. 211, pp. 22- 23 ,(2011) , 10.1016/S0262-4079(11)62203-3
K. Sampigethaya, R. Poovendran, L. Bushnell, Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes Proceedings of the IEEE. ,vol. 96, pp. 1992- 2007 ,(2008) , 10.1109/JPROC.2008.2006123
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, Srdjan Capkun, On the requirements for successful GPS spoofing attacks Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. pp. 75- 86 ,(2011) , 10.1145/2046707.2046719
Krishna Sampigethaya, Radha Poovendran, Linda Bushnell, Assessment and mitigation of cyber exploits in future aircraft surveillance 2010 IEEE Aerospace Conference. pp. 1- 10 ,(2010) , 10.1109/AERO.2010.5446905
Krishna Sampigethaya, Radha Poovendran, Sudhakar Shetty, Terry Davis, Chuck Royalty, Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond Proceedings of the IEEE. ,vol. 99, pp. 2040- 2055 ,(2011) , 10.1109/JPROC.2011.2162209