Skip to main content

Advertisement

SpringerLink
  • Log in
Book cover

International Conference on Applied Cryptography and Network Security

ACNS 2013: Applied Cryptography and Network Security pp 253–271Cite as

  1. Home
  2. Applied Cryptography and Network Security
  3. Conference paper
Experimental Analysis of Attacks on Next Generation Air Traffic Communication

Experimental Analysis of Attacks on Next Generation Air Traffic Communication

  • Matthias Schäfer17,
  • Vincent Lenders18 &
  • Ivan Martinovic19 
  • Conference paper
  • 3059 Accesses

  • 71 Citations

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7954)

Abstract

This work studies the security of next generation air traffic surveillance technology based on Automatic Dependent Surveillance – Broadcast (ADS-B). ADS-B is already supported by a majority of international aircraft and will become mandatory in 2020 for most airspaces worldwide. While it is known that ADS-B might be susceptible to different spoofing attacks, the complexity and impact of launching these attacks has been debated controversially by the air traffic control community. Yet, the literature remains unclear on the requirements of launching ADS-B attacks in real-world environments, and on the constraints which affect their feasibility. In this paper, we take a scientific approach to systematically evaluate realistic ADS-B attacks. Our objective is to shed light on the practicability of different threats and to quantify the main factors that impact the success of such attacks. Our results reveal some bad news: attacks on ADS-B can be inexpensive and highly successful. Using a controlled experimental design, we offer insights from a real-world feasibility analysis that leads to the conclusion that any safety-critical air traffic decision process should not rely exclusively on the ADS-B system.

Keywords

  • NextGen
  • ADS-B
  • Attacks
  • Security
  • Threats
  • Air Safety

Download conference paper PDF

References

  1. Statistics and Forecast Service: Long-Term Forecast: IFR Flight Movements 2010 – 2030. EEC Technical Report CND/STATFOR Doc415, EUROCONTROL (2010)

    Google Scholar 

  2. Carswell, C.M. (ed.) Reviews of Human Factors and Ergonomics, vol. 4, pp. 195–244. Human Factors and Ergonomics Society (2008)

    Google Scholar 

  3. Skolnik, M.I.: Radar handbook, 3rd edn. McGraw-Hill Professional (2007)

    Google Scholar 

  4. Federal Aviation Administration: NextGen Implementation Plan (March 2011)

    Google Scholar 

  5. SESAR Consortium: The ATM Target Concept. Technical report (2007)

    Google Scholar 

  6. Federal Aviation Administration: Automatic Dependent Surveillance—Broadcast (ADS-B) Out Performance Requirements To Support Air Traffic Control (ATC) Service; Final Rule. Federal Register 75(103), 14 CFR Part 91 (May 2010)

    Google Scholar 

  7. ICAO: Safeguarding International Civil Aviation Against Acts of Unlawful Interference, 9th edn., Annex 17: Security (2011)

    Google Scholar 

  8. Krozel, J., Andrisani, D., Ayoubi, M.A., Hoshizaki, T., Schwalm, C.: Aircraft ADS-B Data Integrity Check. In: AIAA Aviation, Technology, Integration, and Operations Conference Proceedings (September 2004)

    Google Scholar 

  9. Sampigethaya, K., Poovendran, R.: Visualization & assessment of ADS-B security for green ATM. In: 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC), pp. 3.A.3–1–3.A.3–16 (October 2010)

    Google Scholar 

  10. McCallie, D., Butts, J., Mills, R.: Security analysis of the ADS-B implementation in the next generation air transportation system. International Journal of Critical Infrastructure Protection 4, 78–87 (2011)

    CrossRef  Google Scholar 

  11. Purton, L., Abbass, H., Alam, S.: Identification of ADS-B System Vulnerabilities and Threats. In: Australian Transport Research Forum (October 2010)

    Google Scholar 

  12. Costin, A.: Ghost is in the air(traffic). Black Hat USA (July 2012)

    Google Scholar 

  13. Haines, B.: Hacker + Airplanes = No Good Can Come of This. In: DEF CON®20 Hacking Conference (July 2012)

    Google Scholar 

  14. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)

    CrossRef  MathSciNet  MATH  Google Scholar 

  15. Mao, G., Fidan, B., Anderson, B.D.: Wireless sensor network localization techniques. Computer Networks 51(10), 2529–2553 (2007)

    CrossRef  MATH  Google Scholar 

  16. ICAO: Annex 10: Aeronautical Telecommunications, 4th edn., vol. IV. Surveillance and Collision Avoidance Systems (2007)

    Google Scholar 

  17. Stevens, M.: Secondary surveillance radar. Artech House (1988)

    Google Scholar 

  18. Pöpper, C., Tippenhauer, N.O., Danev, B., Capkun, S.: Investigation of Signal and Message Manipulations on the Wireless Channel. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 40–59. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  19. Wilhelm, M., Martinovic, I., Schmitt, J.B., Lenders, V.: Reactive jamming in wireless networks: how realistic is the threat? In: Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec 2011, pp. 47–52 (2011)

    Google Scholar 

  20. Valovage, E.: Enhanced ADS-B Research. IEEE Aerospace and Electronic Systems Magazine 22(5), 35–38 (2007)

    CrossRef  Google Scholar 

  21. Wood, R.G.: A security risk analysis of the data communications network proposed in the nextgen air traffic control system. PhD thesis, Stillwater, OK, USA (2009)

    Google Scholar 

  22. Sampigethaya, K., Poovendran, R., Bushnell, L.: Assessment and mitigation of cyber exploits in future aircraft surveillance. In: IEEE Aerospace Conference (March 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. TU Kaiserslautern, Germany

    Matthias Schäfer

  2. Armasuisse, Switzerland

    Vincent Lenders

  3. University of Oxford, UK

    Ivan Martinovic

Authors
  1. Matthias Schäfer
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Vincent Lenders
    View author publications

    You can also search for this author in PubMed Google Scholar

  3. Ivan Martinovic
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. University of Calgary, Canada

    Michael Jacobson, Michael Locasto, Payman Mohassel & Reihaneh Safavi-Naini, ,  & 

Rights and permissions

Reprints and Permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Schäfer, M., Lenders, V., Martinovic, I. (2013). Experimental Analysis of Attacks on Next Generation Air Traffic Communication. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds) Applied Cryptography and Network Security. ACNS 2013. Lecture Notes in Computer Science, vol 7954. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38980-1_16

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/978-3-642-38980-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38979-5

  • Online ISBN: 978-3-642-38980-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Over 10 million scientific documents at your fingertips

Switch Edition
  • Academic Edition
  • Corporate Edition
  • Home
  • Impressum
  • Legal information
  • Privacy statement
  • California Privacy Statement
  • How we use cookies
  • Manage cookies/Do not sell my data
  • Accessibility
  • FAQ
  • Contact us
  • Affiliate program

Not logged in - 34.232.62.64

Not affiliated

Springer Nature

© 2023 Springer Nature Switzerland AG. Part of Springer Nature.