Skip to main content

Intrusion Detection for Airborne Communication Using PHY-Layer Information

  • Conference paper
  • First Online:
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2015)

Abstract

With passenger and cargo traffic growing rapidly world-wide, and unmanned aerial vehicles (UAV) poised to enter commercial airspaces, a secure next generation of air traffic management systems is required. Recent articles in the academic and hacker community highlight crucial security challenges faced by integral parts of these next generation protocols, with the most dangerous attacks based on classic message injection. In this article, we analyze the possibility and effectiveness of detecting such attacks on critical air traffic infrastructures with a single receiver based on physical layer information. Using hypothesis testing and anomaly detection schemes, we develop an intrusion detection system (IDS) that can accurately detect attackers within 40 s.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See http://prlab.tudelft.nl/david-tax/dd_tools.html and http://prtools.org.

References

  1. Cardenas, A.A., Amin, S., Lin, Z.S., Huang, Y.L., Huang, C.Y., Sastry, S.: Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 355–366. ACM (2011)

    Google Scholar 

  2. Chen, Y., Xu, W., Trappe, W., Zhang, Y.: Attack detection in wireless localization. In: Chen, Y., Xu, W., Trappe, W., Zhang, Y. (eds.) Securing Emerging Wireless Systems, pp. 1–22. Springer, USA (2009)

    Chapter  Google Scholar 

  3. Clayton, M.: Malaysia airlines flight MH370: are planes vulnerable to cyber-attack? Christian Science Monitor, March 2014

    Google Scholar 

  4. Costin, A., Francillon, A.: Ghost in the air (Traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. In: Black Hat. USA (2012)

    Google Scholar 

  5. ICAO: Guidance Material on Comparison of Surveillance Technologies (GMST). Technical report, September 2007

    Google Scholar 

  6. Kunkel, R.: Air traffic control insecurity 2.0. In: DefCon 18 (2010)

    Google Scholar 

  7. McCallie, D., Butts, J., Mills, R.: Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastruct. Prot. 4(2), 78–87 (2011)

    Article  Google Scholar 

  8. Moran, N., De Vynck, G.: Westjet hijack signal called false alarm. Bloomberg, January 2015

    Google Scholar 

  9. RTCA Inc.: Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance - Broadcast (ADS-B) and Traffic Information Services - Broadcast (TIS-B). DO-260B with Corrig. 1 (2011)

    Google Scholar 

  10. Schäfer, M., Lenders, V., Martinovic, I.: Experimental analysis of attacks on next generation air traffic communication. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 253–271. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Schäfer, M., Strohmeier, M., Lenders, V., Martinovic, I., Wilhelm, M.: Bringing up opensky: a large-scale ADS-B sensor network for research. In: ACM/IEEE International Conference on Information Processing in Sensor Networks (2014)

    Google Scholar 

  12. Sheng, Y., Tan, K., Chen, G., Kotz, D., Campbell, A.: Detecting 802.11 MAC layer spoofing using received signal strength. In: The 27th Conference on Computer Communications. INFOCOM 2008. IEEE (2008)

    Google Scholar 

  13. Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. Communications Surveys Tutorials PP(99). IEEE (2014)

    Google Scholar 

  14. Strohmeier, M., Schäfer, M., Lenders, V., Martinovic, I.: Realities and challenges of nextgen air traffic management: the case of ADS-B. Commun. Mag. 52(5), 111–118 (2014)

    Article  Google Scholar 

  15. Zetter, K.: Air traffic controllers pick the wrong week to quit using radar. In: Wired, July 2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Strohmeier .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Strohmeier, M., Lenders, V., Martinovic, I. (2015). Intrusion Detection for Airborne Communication Using PHY-Layer Information. In: Almgren, M., Gulisano, V., Maggi, F. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2015. Lecture Notes in Computer Science(), vol 9148. Springer, Cham. https://doi.org/10.1007/978-3-319-20550-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20550-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20549-6

  • Online ISBN: 978-3-319-20550-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics