Keywords

4.1 Introduction

Over the last years based on our experience with light helicopter operations for disaster relief, search and rescue, and Helicopter Emergency Medical Services (HEMS), the necessity of an ever-widening operational scenario with all-weather capability has become apparent.

The use of Global Navigation Satellite Systems (GNSS) as a primary navigation source under low visibility conditions was, therefore, obvious. Due to weight restrictions and topographical circumstances, these signals often are the only means of getting a position solution. The relevant signals containing navigation information allowing the receiver to estimate the position are transmitted over an openly accessible radio frequency channel. Propagation effects [2] induced by flight attitude in conjunction with the receiver’s antenna pattern may impair the quality of the navigation solution. Moreover, such a channel is prone to noise and interference stemming from different radio sources (Fig. 4.2). If such transmissions are intentional, then one can classify it as an unlawful interference. So while the former are safety-related, the latter is a security issue (Fig. 4.3).

The two domains safety and security have traditionally been kept separated because the International Civil Aviation Organization (ICAO) published different definitions in their annexes to the Chicago Convention. In these documents, security is defined as “Safeguarding civil aviation against acts of unlawful interference”, while safety is “The state in which risks associated with aviation activities, related to, or in direct support of the operation of aircraft, are reduced and controlled to an acceptable level”. While security is handled by entities like law enforcement agencies and airports, safety is said to depend on personnel, procedures, and equipment, which is foremost the field of air operators and air navigation service providers. Another view on this separation comes from applying Systems Engineering (SE) methods. An approach is shown in Fig. 4.1.

Fig. 4.1
figure 1

Context of safety and security from a systems engineering viewpoint

Fig. 4.2
figure 2

Radio Frequency (RF) channel with noise and non-intentional interference

The SE philosophy is quite in line with the saying that hazards lead to safety incidents in the same way that vulnerabilities lead to security incidents. The same view in a more formalized arrangement is shown in Table 4.1.

Table 4.1 Threat matrix formalizing the context in Fig. 4.2

This formalization of the 2 by 2 threat matrix in Table 4.1 reveals two entries (NA) that remain unaddressed. When asked what the synergies are between the two, the author would rather rephrase the question as: What are the commonalities? The question brought up here will be whether the two fields have to be treated differently or whether their unification is thinkable, notwithstanding the fact and existence of different authorities and jurisdictions.

4.2 The Economic Good in Question

The good in question is a radio frequency channel. The practical example chosen is at the same time relevant and valid, due to the fact that satellite navigation signals are extensively used for all sorts of critical infrastructure and hazardous operations.

Such a channel can be characterized by simple metrics, the bandwidth and the signal-to-noise ratio [3]. For this example, we would extend this ratio to also include any interfering signal power. The metric would then be signal-to-(noise + interference). The block schematic in Fig 4.2 is for the situation where only machines or one operator are present N = {0, 1}.

The system bandwidth is largely given by the base-band signal, and any interference being natural or man-made is, to the first order, only relevant within this channel bandwidth, because the receiver (RX) will band-pass all signals and suppress the others. This also means the interference format has to match the bandwidth to be effective.Footnote 1 In the case of meaconing and spoofing, this is per se the case, because the signal used to interfere is identical to the original one (Fig. 4.3).

Fig. 4.3
figure 3

RF channel with intentional interference

So the only free variables for the interferer are the duration and the radiated power. Although a jamming attack has the freedom of different signal formats, the classes are limited to only four.Footnote 2

Jamming is the emission of radio frequency signals of sufficient power and with such characteristics to prevent the receivers from working properly.

Meaconing is the reception, delay, and rebroadcast of a signal with a larger power than received. At the receiving antenna, the wanted and unwanted signals are added to confuse the system. Ground- and space-based augmentation radio links could also be prone to meaconing, especially if the correct differential signal is suppressed with a stronger one containing false corrections.

Spoofing is a technique to cause a receiver to lock onto legitimate-appearing false signals. The attack will inject misleading information and thereby eventually even control the flight [4, 5, p. 63].

The radiated transmission power is a continuous variable that the attacker is free to choose for each attack. However, as indicated above, certain bounds exist. Every RF channel is specified in five dimensions. So out of frequency, time, space, modulation, only polarization would remain an issue for an optimization on the side of the interferer.

An air navigation service provider, supporting hazardous flight operations, has to inform the user of three probabilities

  1. 1.

    ReliabilityFootnote 3: using the service and not losing it.

  2. 2.

    Availability: requesting the service and getting it.

  3. 3.

    Integrity: correctness of the information supplied.

The above include the condition that the provided signals are within specified error bounds in space and time.Footnote 4

The constant presence of interference from natural sources is an important aspect. So even in the absence of man-made interference, the receiver has to cope with noise from intra- or extra-system sources.

Another aspect indicated by the signal-to-(noise + interference) ratio is the diminishing of the signal power due to an increase in radio path attenuation. These two factors are relevant when discussing game-theoretic approaches, namely in the absence of an attacker N = {0, 1}.

4.3 A Game-Theoretic Approach Put to Practice

The title of this section reads like a contradiction in terms, but it is well worth to attempt to get practical. Game theory, a branch of mathematics, offers an analytical approach to situations of a practical nature. The situations considered are games with different parties having common or different interests. Mathematical solutions are possible for certain cases. The situations include true games as suchFootnote 5 as well as real-world problems in politics, economics, or warfare. The theory has also recently been applied to terrorism [4, p. 198].

This contribution treats a real-world problem, and classical game theory is being tried. It means players may strategize,Footnote 6 decide, and act. Whereby chance, hidden or incomplete information are pertinent circumstances. A game consists of playersFootnote 7 (individuals/organizations), strategies (a plan, objectives, decisions, and actions), situations, and a gain from participating (utility). In short, a theory of mathematical models is applied to formalize interdependent players with their decisions and actions under a condition of conflict or cooperation.

Thus, the question is what are the provisions of such an approach to safety and security and what are the elements necessary to model the chosen real-life situation. Elements in this example are discrete and can, therefore, be described in a set-theoretic way. The only exception is the radiated power P of the interferer. If an attacker intends to maximize impact while minimizing the probability to be detected, then this value is bounded. This parameter, therefore, is also accessible to set theory. So let the radiated power be P = {0, Pmax}. The two values are then equivalent to abstain or execute an attack.

4.3.1 The Players

The complete setup includes three players with different coalition aspects summarized in Table 4.2.

Table 4.2 Players attributes

Although a coalition of interest exists between the user and the service provider, it may not be strong enough to have the service provider actively taking part in the game. The reason lies in important investments like upgrading or replacing space-based assets. Such actions would have a negative impact on service provider’s utility, which is cost versus the number of users. Thus, the service provider is excluded.

4.3.2 Available Strategies

The course of action or possible strategies in this example form finite sets (SA and SU). The setup of the game has one attacker (A) and one victim, the user of GNSS (U) in a flight under low visibility condition (IMC), under Instrument Flight Rules (IFR) with no redundancy in navigation. The attacker intends to deny the use of this only system. This situation asks for an offensive strategy on the side of the attacker and a defensive one on the side of the user. The attacker has three distinctive but feasible attacks or strategies, and they constitute a finite set:

$${\text{SA}} = \{{\text{Jamming, Meaconing, Spoofing}}\}.$$

For the location of the jammer, different options exist. It could be on a fixed, ground-mobile, or airborne platform. We limit our case to the fixed option. Although a mobile jammer would be more difficult to detect, target jamming an airborne asset would be more of a challenge, since the road network would not be coincident with the projection of the victim’s flight path. An airborne jammer finally would offer a number of attacking advantages, but operating costs would be considerable, to be effective. Moreover, detecting and locating the attacker would be fairly simple. The set of strategies of the attacked UFootnote 8 on the contrary is a purely defensive set:

SU = {spectrum/signal monitoring, reducing the coupling between receiving antenna and attacker's transmission, minimizing the exposure time}.

4.3.3 The Situations

The situations are governed by the phase of flight and its need for a precise aircraft position. The user counts on the three probabilities (1., 2., 3.) above indicated by the service provider. These are estimated from empirical failure ratesFootnote 9 or reliability calculations. Together with corresponding exposure times, it results in failure probabilities. Figure 4.4 defines the general Flight Phases (FP).

Fig. 4.4
figure 4

Phases of flight after [6]

A FP is ended and another started as decided from the flight deck (decision instance, player A). Possible scenarios, therefore, are determined and finite. Although a loss of a position solution in low visibility on ground is not irrelevant, ground movements are discarded for the sake of simplicity. The set is consequently reduced to FP = {Takeoff, Departure, En-route, Approach, Landing}.

Exposure times vary considerably. Table 4.3 shows typical mean values for helicopter operations. While Texp shows changes of the order of a magnitude along the flight trajectory, the distance and with it the radio path attenuation for a potential interfering source toward the victim’s receiving antenna also change.Footnote 10

Table 4.3 FP, Texp, height to the victim’s antenna contrasted with criticality

There is an intrinsic relation between exposure time and the height of the victim above the antenna of a potential interferer. This relation allows some ground for an operationalization of the probability of losing a position due to an interferer located on the ground while executing a specific flight phase. The risks for the victim depend on the status of the signal received. If the signal is in use and a critical flight phase being flown, then the loss of the signal leads to a hazardous situation and the risk of an accident. If the signal is to be acquired but not available, then the mission will be aborted and economic loss results. The attacker may of course choose the interfering powerFootnote 11 at his discretion. However, radiating too much power increases the Probability of Intercept (POI). This condition in turn increases the possibility of being detected by some monitoring processes [79]. Figure 4.5 shows the result of monitoring recorded during normal helicopter missions where the Quality of Service (QoS) is repeatedly degraded. The colors indicate the severity of potential Radio Frequency Interference (RFI).

Fig. 4.5
figure 5

Result of a monitoring action [7] (Figure courtesy of M. Scaramuzza, Skyguide. Included with the permission of the author.)

If detected, the victim will initiate an evasive action rendering futile the attempted attack. Moreover, detection could lead to getting located by an authority in charge, so the attacker has to make a tradeoff.Footnote 12 However, the maximum radiated power of the interferer is not only bounded for tactical reasons but also for technological ones. Table 4.4 underlines the risks of an attack.

Table 4.4 Attacker’s costs on equipment and the probability of intercept

4.3.4 The Outcomes of the Game

The outcomes must illustrate potential gains in the areas of cost, risk, and utility. It is possible, though to include the cost in the risk for both players. The risk R for the attacker may be approached in the following way R = (I + K) ∙ POI, where I is the investment for the equipment, K is the knowledge, and I + K the total cost. POI is the detection of a monitoring instance within the interfered region. An attempt for the payoff matrices of the two players (A and U) is shown in Table 4.5, where the gain (1) and loss (−1) are indicated in each entry.

Table 4.5 Gain matrix

In this example obviously, the gain of the attacker A is the loss of the attacked U. The gain matrix above suggests a strategic advantage to attack. However, the matrix does not display the entire picture. Table 4.6 gives an indication of the likelihood that the attack is being detected and consequently a flight operational action is initiated.

Table 4.6 Likelihood of the attacked gaining situational awareness due to detecting an attack

The likelihood of being detected is about two orders of magnitude smaller for meaconing and spoofing compared to jamming due to the difference in signal formats.

In general, technical infrastructures providing a common good, accessible to the general public, are seldom attacked. An explanation may be that the attacker or his allies need the service they intend to impair for their own purposes.Footnote 13 There is a generally accepted utility attached to this good.Footnote 14 In this case, the payoff matrix must be modified to reflect such situations and to find the Nash-equilibrium [10, p. 286], which could give an explanation for this phenomenon.

4.3.5 Game-Theoretic Classification

To summarize and make use of game theory, an attempt is made to classify the example at hand. Games are classified according to the different sets mentioned above. The most obvious one is the number of players. A game can have one, two, or n players. Each manifestation has its own distinctive features, and the players need not be individuals. It may be a group of persons with common interests being part of some organization. Even organizations could federate in a game. The possibilities are summarized in Table 4.7.

Table 4.7 Game classification

The empty and the unit set of players are included to propose a possible unified approach under game-theoretic aspects. The empty set (no players) would be a purely machine-to-machine interaction, unless artificial intelligence is actively involved. The unit set (1 player) is also called a one-person game. With no rivals, the player only needs to list available strategies so to choose an optimum outcome.

When probabilities are involved, it may turn out to be more complicated. Ways and means to cope with such problems are laid down in decision theory. Or as often said, the single player is engaged in a game against nature, where nature is indifferent to the player’s decision.

Whether the objectives of the players coincide or conflict is another aspect of the classification. Constant-sum games show an entirely conflicting situation (pure competition),Footnote 15 with no communication between the adversaries. This fact leads to incomplete information on both sides.

Whether a game is called finite depends on finite sets above [10, p 286]. Moreover, the game cannot have an indefinite duration. In practice, there exists a window to act.

A finite non-cooperative game between two players is called a bi-matrix game. It is specified by two matrices A = ||aij|| and U = ||uij|| of the same dimension m × n. These two matrices represent the payoff matrices (gain matrices) of the players. The strategy of player A is the selection of a row, that of player U the selection of a column. Let player A choose i (1 < i < m), while player U chooses j (1 < j < n), their respective payoffs or gains will be aij and uij. If aij + uij = 0 for all i, j, then the bi-matrix becomes a matrix game. The two candidates reflecting this example are either a bi-matrix or a matrix game. Table 4.8 indicates that the latter matches the situation.

Table 4.8 Game-theoretic classification for the example

4.4 Conclusion

An attempt has been made to structure a real-world problem to make it accessible for a game-theoretic solution and it appears as if the two aspects of safety and security can be assessed in one single unified solution space. Both fields turn out to be different subsets of a more fundamental superset. More formally, one rationalizes the synergy between safety and security solely in the number N of involved instances or players. So there is a temptation to see game theory as a possible means of offering a unifying approach.

A pertinent question has come into focus, namely why vulnerable basic infrastructure like radio channels in the case of air transportation has been so seldom the target of elaborate electronic attacks. One possible answer is the utility it has for all conflicting parties. In the case of openly accessible radio channels, the utility may even extend to gather information about the adversary.

4.5 Outlook

There are other situations in aviation where game theory seems an appropriate way to model other interactions, namely flight operators, air traffic service providers, and airports. A typical example where airport security is negatively influencing professionals concerned with flight safety is described and analyzed in [11]. Unlike the non-cooperative nature of the example above, these entities are engaged in a coalition game, because they have the opportunity to collaborate for mutual benefit in several ways. Moreover, it would be advantageous to industry if rule-making and supervisory activities would be included in such models.