Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking 2016
DOI: 10.1145/2973750.2973763
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(25 citation statements)
references
References 26 publications
0
25
0
Order By: Relevance
“…In our particular application, the classification of the aircraft will be used to understand if the received signals are really generated from the expected aircraft or not; many methods are proposed in literature to solve this kind of problem [10,21]; each method has pros and cons with different performances for different applications.…”
Section: Aircraft Classification Methodsmentioning
confidence: 99%
“…In our particular application, the classification of the aircraft will be used to understand if the received signals are really generated from the expected aircraft or not; many methods are proposed in literature to solve this kind of problem [10,21]; each method has pros and cons with different performances for different applications.…”
Section: Aircraft Classification Methodsmentioning
confidence: 99%
“…There are various approaches of physical layer based technology, such as approaches based on received signal strength (RSS, [27,28]), based on frequency offset caused by imperfections in the transmitters synchronization [11], or based on the carrier phase (e.g., [29]). While these methods can effectively defeat jamming and modification attacks, the inherently lower performance makes them difficult to use in a large-scale system such as ADS-B.…”
Section: Secure Broadcast Authentication Technologymentioning
confidence: 99%
“…Moser et al [11] first proposed the multidevice false data injection attack of ADS-B multilateration system in ATC surveillance. However, Moser et al simulate the arrival time of the real transmitter without utilizing the characteristics of the multilateration algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…the OpenSky Network [20], Flightaware [5], Flightradar24 [6] and many others. These sensor networks can leverage the time-of-arrival (TOA) of Mode S signals for various kinds of applications, including aircraft localization [20,22], air traffic data verification [13,16,17,19,21], and self-localization [15]. In those applications, a set of cooperating receivers measure locally the TOA of the arriving signals and then send these data to a central computation server.…”
Section: Introductionmentioning
confidence: 99%