Advertisement

Journal of Transportation Security

, Volume 11, Issue 1–2, pp 41–52 | Cite as

Can software defined radio be used to compromise ADS-B aircraft transponder signals?

  • Mark A. Revels
  • Mark Ciampa
Article
  • 148 Downloads

Abstract

Air traffic control is moving from independent primary surveillance radar to the automatic dependent surveillance-broadcast (ADS-B) system. This holds the potential of reducing the total cost of deployment and improving the detection accuracy of aircraft. However, as currently being deployed these systems lack strong security mechanisms and are susceptible to a variety of radio frequency attacks. These attacks have been proffered by attackers at hacker conventions and by academic researchers. And many online sites even provide hacking “how-to” instructions on ADS-B. Is it possible for an attacker to manipulate ADS-B to interfere with an aircraft in flight using readily available tools? Using a basic $200 software defined radio (SDR) transceiver we simulated an ADS-B replay attack. Despite the advancement in SDR we find that the quality of SDR transceivers are still insufficient to perform a replay attack.

Keywords

Air traffic control Automatic dependent surveillance-broadcast Ads-b Software defined radio SDR Replay attack 

Notes

Funding

This study was funded by an internal research project award from Embry-Riddle Aeronautical University.

References

  1. Ciampa M (2017) Security+ guide to network security fundamentals, 6e. Cengage, BostonGoogle Scholar
  2. Costin A, Francillon A (2012) Ghost is in the air (traffic). Blackhat. https://media.blackhat.com/bh-us-12/Briefings/Costin/BH_US_12_Costin_Ghosts_In_Air_Slides.pdf. Accessed 25 Feb 2016
  3. Equip ADS-B: Benefits of ADS-B (2015) Federal Aviation Administration. http://www.faa.gov/nextgen/equipadsb/benefits/. Accessed 3 March 2016
  4. Haines B (2012) Hacker + airplanes = no good can come of this. Defcon. https://www.defcon.org/html/defcon-20/dc-20-speakers.html#Renderman. Accessed 3 March 2016
  5. Harrison T (2014). Build a cheap airplane ADS-B radio receiving tracking station. Hackaday. http://hackaday.com/2014/01/16/build-a-cheap-airplane-ads-b-radio-receiving-tracking-station/. Accessed 26 Feb 2016
  6. Krozel JA (2004) Aircraft ADS-B data integrity check. AIAA aviation, technology, integration, and operations conference proceedings. http://arc.aiaa.org/doi/book/10.2514/MATIO04. Accessed 6 June 2016
  7. Lin C, Lai Y (2015) Quasi-ADS-B based UAV conflict detection and resolution to manned aircraft. J Electr Comput Eng 2015:1–12Google Scholar
  8. McCallie D, Butts J, Mills R (2011) Security analysis of the ADS-B implementation in the next generation air transportation system. Int J Crit Infrastruct Prot 4(2):78–87CrossRefGoogle Scholar
  9. NextGen Automated Dependent Surveillance-Broadcast (2015) Federal Aviation Administration. http://www.faa.gov/nextgen/update/progress_and_plans/adsb/. Accessed April 1 2016
  10. NextGen Performance - National Airspace System (2015) Federal Aviation Administration. http://www.faa.gov/nextgen/snapshots/nas/. Accessed 9 March 2016
  11. Purton L, Abbass H, Alam S (2010) Identification of ADS-B system vulnerabilities and threats. Australian Transport Research Forum. http://atrf.info/history/index.aspx. Accessed 15 June 2016
  12. Sampigethaya K, Poovendran R (2010) Visualization & assessment of ADS-B security for green ATM. Digital avionics systems conference (DASC), 2010. Salt Lake City: IEEEGoogle Scholar
  13. Schafer M, Lenders V, Martinovic I (2013) Experimental analysis of attacks on next generation air traffic communication. In: Applied cryptography and network security. Springer, New York, pp 253–271Google Scholar
  14. Storm D (2012) Curious hackers inject ghost airplanes into radar, track celebrities' flights. Computerworld. http://www.computerworld.com/article/2472455/cybercrime-hacking/curious-hackers-inject-ghost-airplanes-into-radar--track-celebrities--flights.html. Accessed 5 April 2016
  15. Strohmeier M, Lenders V, Martinovic I (2014) On the security of the automatic dependent surveillance-broadcast protocol. Cornell University  https://doi.org/10.1109/COMST.2014.2365951
  16. Valovage E (2007) Enhanced ADS-B research. Aerospace and Electronic Systems Magazine 6:35–38CrossRefGoogle Scholar
  17. Wood R (2009) A security risk analysis of the data communications network proposed in the nextgen air traffic control system. Oklahoma State University, DissertationGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Western Kentucky UniversityBowling GreenUSA

Personalised recommendations