Comparative Analysis of ADS-B Verification Techniques

ADS-B is one of many Federal Aviation Administration (FAA) regulated technologies used to monitor air traffic with high precision, while reducing dependencies on dated and costly radar equipment [1]. The FAA hopes to decrease the separation between aircraft, reduce risk of collision as air traffic density increases, save fuel costs, and increase situational awareness of both commercial and general aviation aircraft within United States airspace. Several aviation technology experts have expressed concern over the security of the ADS-B protocol [2] [3]. ADS-B has an open and well known data format, which is broadcast on known frequencies. This means that the protocol is highly susceptible to radio frequency (RF) attacks such as eavesdropping, jamming, and spoofing. Eavesdropping and jamming will be reviewed in Section 3.4. While eavesdropping and jamming attacks are well studied, due to their applicability in many radio technologies, spoofing attacks against ADS-B are particular to this system. As such, the latter is the focus of our research. This paper evaluates so-called Kalman Filtering and Group Validation techniques (described below) in order to assess which would be a better position verification method of ADS-B signals. The parameters for the comparative analysis include both technical feasibility and practical implementation of each position verification technique. The goal is to offer a practical position verification process which could be implemented with limited government funding within the next 10 years.

[1]  T. Graupl,et al.  L-DACS1 air-to-air data-link protocol design and performance , 2011, 2011 Integrated Communications, Navigation, and Surveillance Conference Proceedings.

[2]  E. Valovage,et al.  Enhanced ADS-B Research , 2006, 2006 ieee/aiaa 25TH Digital Avionics Systems Conference.

[3]  Radha Poovendran,et al.  Privacy of future air traffic management broadcasts , 2009, 2009 IEEE/AIAA 28th Digital Avionics Systems Conference.

[4]  Radha Poovendran,et al.  Assessment and mitigation of cyber exploits in future aircraft surveillance , 2010, 2010 IEEE Aerospace Conference.

[5]  Yongdae Kim,et al.  The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems , 2011, TSEC.

[6]  Edward Lester,et al.  Benefits and incentives for ADS-B equipage in the National Airspace System , 2007 .

[7]  Dieter Fox,et al.  Bayesian Filtering for Location Estimation , 2003, IEEE Pervasive Comput..

[8]  Annalisa L. Weigel,et al.  Dynamics of Air Transportation System Transition and Implications for ADS-B Equipage , 2007 .

[9]  Radha Poovendran,et al.  Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond , 2011, Proceedings of the IEEE.

[10]  W. Li,et al.  Integrated aviation security for defense-in-depth of next generation air transportation system , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[11]  Interrogators EUROPEAN ORGANISATION FOR THE SAFETY OF AIR NAVIGATION , 2003 .

[12]  W. Lafayette,et al.  Aircraft ADS-B Data Integrity Check , 2004 .

[13]  George Wright NAV CANADA implements ADS-B , 2009, 2009 Integrated Communications, Navigation and Surveillance Conference.

[14]  J W Mulholland,et al.  Terms of reference. , 2019, Perfusion.

[15]  Krishna Sampigethaya,et al.  Visualization & assessment of ADS-B security for green ATM , 2010, 29th Digital Avionics Systems Conference.