Lightweight Location Verification in Air Traffic Surveillance Networks

In this work, we develop a realistic threat model for attacks on modern air traffic communication networks and show that current state-of-the-art countermeasures such as multilateration are insufficient. We propose two alternatives, a statistical location verification technique and a grid-based location estimation approach, to deal with the identified threats. We evaluate our proposals using real-world flight data and quantify their effectiveness in terms of aircraft location accuracy, resilience to message injection attacks, attack detection speed, and surveillance coverage. Our results show that the statistical verification approach can increase the effective air traffic surveillance coverage compared to multilateration by a factor of more than 100. Concerning our location estimation method, we find that the mean aircraft location accuracy can be increased by up to 41% in comparison with multilateration while also being able to pinpoint ground-based attackers with a mean error of 145m for air-based attackers. Finally, we demonstrate that our proposal is lightweight as it does not require any changes to the existing air traffic protocols and transmitters, and is easily implemented using only low-cost hardware.

[1]  Radha Poovendran,et al.  A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance , 2009 .

[2]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[3]  Ivan Martinovic,et al.  Security of ADS-B: State of the Art and Beyond , 2013, ArXiv.

[4]  Chan-TinEric,et al.  The Frog-Boiling Attack , 2011 .

[5]  Alvaro A. Cárdenas,et al.  Attacks against process control systems: risk assessment, detection, and response , 2011, ASIACCS '11.

[6]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[7]  Yongdae Kim,et al.  The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems , 2011, TSEC.

[8]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[9]  Bashar Nuseibeh,et al.  Securing the Skies: In Requirements We Trust , 2009, Computer.

[10]  Brandon Kovell,et al.  Comparative Analysis of ADS-B Verification Techniques , 2012 .

[11]  Loukas Lazos,et al.  Selective Jamming Attacks in Wireless Networks , 2010, 2010 IEEE International Conference on Communications.

[12]  Todd E. Humphreys,et al.  Can Cryptography Secure Next Generation Air Traffic Surveillance? , 2014 .

[13]  Radha Poovendran,et al.  Security and privacy of future aircraft wireless communications with offboard systems , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[14]  Robert F. Mills,et al.  Security analysis of the ADS-B implementation in the next generation air transportation system , 2011, Int. J. Crit. Infrastructure Prot..

[15]  Jing Liu,et al.  Survey of Wireless Indoor Positioning Techniques and Systems , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[16]  Ivan Martinovic,et al.  Bringing up OpenSky: A large-scale ADS-B sensor network for research , 2014, IPSN-14 Proceedings of the 13th International Symposium on Information Processing in Sensor Networks.

[17]  Nathan J. Gomes,et al.  Next Generation Wireless Communications Using Radio over Fiber , 2012 .

[18]  Fazli Subhan,et al.  Combined K-Nearest Neighbors and Fuzzy Logic Indoor Localization Technique for Wireless Sensor Network , 2012 .

[19]  Andrei Costin,et al.  Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices , 2012 .

[20]  Adrie Stander,et al.  Cyber security in civil aviation , 2016 .

[21]  Ivan Martinovic,et al.  Realities and challenges of nextgen air traffic management: the case of ADS-B , 2014, IEEE Communications Magazine.

[22]  Ivan Martinovic,et al.  On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.

[23]  Eric Feron,et al.  Graceful Degradation of Air Traffic Operations: Airspace Sensitivity to Degraded Surveillance Systems , 2008, Proceedings of the IEEE.

[24]  Srdjan Capkun,et al.  Short paper: detection of GPS spoofing attacks in power grids , 2014, WiSec '14.

[25]  Wint Yi Poe Design Problems in large-scale, time-sensitive WSNs , 2012 .

[26]  Gaspare Galati,et al.  Localization algorithms for multilateration (MLAT) systems in airport surface surveillance , 2015, Signal Image Video Process..

[27]  M. Sparkes Securing the skies , 2006 .

[28]  Ivan Martinovic,et al.  Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.

[29]  G. Galati,et al.  Wide area surveillance using SSR mode S multilateration: advantages and limitations , 2005, European Radar Conference, 2005. EURAD 2005..

[30]  Robert F. Mills,et al.  Enhancing the security of aircraft surveillance in the next generation air traffic control system , 2013, Int. J. Crit. Infrastructure Prot..

[31]  M. Mosavi,et al.  Applying Neural Network Ensembles for Clustering of GPS Satellites , 2011 .

[32]  Hussein A. Abbass,et al.  Identification of ADS-B System Vulnerabilities and Threats , 2010 .

[33]  Steffen Loth,et al.  Airport Service Vehicle Scheduling , 2010 .

[34]  W. Li,et al.  Integrated aviation security for defense-in-depth of next generation air transportation system , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[35]  A. Smith,et al.  Methods to Provide System-Wide ADS-B Back-Up, Validation and Security , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.