Abstract
This work studies the security of next generation air traffic surveillance technology based on Automatic Dependent Surveillance – Broadcast (ADS-B). ADS-B is already supported by a majority of international aircraft and will become mandatory in 2020 for most airspaces worldwide. While it is known that ADS-B might be susceptible to different spoofing attacks, the complexity and impact of launching these attacks has been debated controversially by the air traffic control community. Yet, the literature remains unclear on the requirements of launching ADS-B attacks in real-world environments, and on the constraints which affect their feasibility. In this paper, we take a scientific approach to systematically evaluate realistic ADS-B attacks. Our objective is to shed light on the practicability of different threats and to quantify the main factors that impact the success of such attacks. Our results reveal some bad news: attacks on ADS-B can be inexpensive and highly successful. Using a controlled experimental design, we offer insights from a real-world feasibility analysis that leads to the conclusion that any safety-critical air traffic decision process should not rely exclusively on the ADS-B system.
Keywords
- NextGen
- ADS-B
- Attacks
- Security
- Threats
- Air Safety
Download conference paper PDF
References
Statistics and Forecast Service: Long-Term Forecast: IFR Flight Movements 2010 – 2030. EEC Technical Report CND/STATFOR Doc415, EUROCONTROL (2010)
Carswell, C.M. (ed.) Reviews of Human Factors and Ergonomics, vol. 4, pp. 195–244. Human Factors and Ergonomics Society (2008)
Skolnik, M.I.: Radar handbook, 3rd edn. McGraw-Hill Professional (2007)
Federal Aviation Administration: NextGen Implementation Plan (March 2011)
SESAR Consortium: The ATM Target Concept. Technical report (2007)
Federal Aviation Administration: Automatic Dependent Surveillance—Broadcast (ADS-B) Out Performance Requirements To Support Air Traffic Control (ATC) Service; Final Rule. Federal Register 75(103), 14 CFR Part 91 (May 2010)
ICAO: Safeguarding International Civil Aviation Against Acts of Unlawful Interference, 9th edn., Annex 17: Security (2011)
Krozel, J., Andrisani, D., Ayoubi, M.A., Hoshizaki, T., Schwalm, C.: Aircraft ADS-B Data Integrity Check. In: AIAA Aviation, Technology, Integration, and Operations Conference Proceedings (September 2004)
Sampigethaya, K., Poovendran, R.: Visualization & assessment of ADS-B security for green ATM. In: 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), pp. 3.A.3–1–3.A.3–16 (October 2010)
McCallie, D., Butts, J., Mills, R.: Security analysis of the ADS-B implementation in the next generation air transportation system. International Journal of Critical Infrastructure Protection 4, 78–87 (2011)
Purton, L., Abbass, H., Alam, S.: Identification of ADS-B System Vulnerabilities and Threats. In: Australian Transport Research Forum (October 2010)
Costin, A.: Ghost is in the air(traffic). Black Hat USA (July 2012)
Haines, B.: Hacker + Airplanes = No Good Can Come of This. In: DEF CON®20 Hacking Conference (July 2012)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Mao, G., Fidan, B., Anderson, B.D.: Wireless sensor network localization techniques. Computer Networks 51(10), 2529–2553 (2007)
ICAO: Annex 10: Aeronautical Telecommunications, 4th edn., vol. IV. Surveillance and Collision Avoidance Systems (2007)
Stevens, M.: Secondary surveillance radar. Artech House (1988)
Pöpper, C., Tippenhauer, N.O., Danev, B., Capkun, S.: Investigation of Signal and Message Manipulations on the Wireless Channel. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 40–59. Springer, Heidelberg (2011)
Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec 2011, pp. 47–52 (2011)
Valovage, E.: Enhanced ADS-B Research. IEEE Aerospace and Electronic Systems Magazine 22(5), 35–38 (2007)
Wood, R.G.: A security risk analysis of the data communications network proposed in the nextgen air traffic control system. PhD thesis, Stillwater, OK, USA (2009)
Sampigethaya, K., Poovendran, R., Bushnell, L.: Assessment and mitigation of cyber exploits in future aircraft surveillance. In: IEEE Aerospace Conference (March 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Schäfer, M., Lenders, V., Martinovic, I. (2013). Experimental Analysis of Attacks on Next Generation Air Traffic Communication. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds) Applied Cryptography and Network Security. ACNS 2013. Lecture Notes in Computer Science, vol 7954. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38980-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-38980-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38979-5
Online ISBN: 978-3-642-38980-1
eBook Packages: Computer ScienceComputer Science (R0)