Proceedings of the 1st ACM Workshop on Cyber-Physical System Security 2015
DOI: 10.1145/2732198.2732202
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Location Verification in Air Traffic Surveillance Networks

Abstract: In this work, we develop a realistic threat model for attacks on modern air traffic communication networks and show that current state-of-the-art countermeasures such as multilateration are insufficient. We propose two alternatives, a statistical location verification technique and a grid-based location estimation approach, to deal with the identified threats. We evaluate our proposals using real-world flight data and quantify their effectiveness in terms of aircraft location accuracy, resilience to message in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 42 publications
(23 citation statements)
references
References 25 publications
0
23
0
Order By: Relevance
“…There are two types of countermeasures: non-cryptographic and cryptographic solutions. Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19].…”
Section: Related Workmentioning
confidence: 99%
“…There are two types of countermeasures: non-cryptographic and cryptographic solutions. Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19].…”
Section: Related Workmentioning
confidence: 99%
“…One comment noted that German regulations for controllers state that they should not consider outages or wrong labels as a possibility in their work but always rely on the systems (the implication being that otherwise the workload could not be handled), illustrating technology's importance. ADS-B / TIS-B / FIS-B [6], [8], [10], [13], [51], [87] -X [50], [83], [84], [88]- [93] [50]- [52], [56], [58], [86], [ ACARS [10], [13], [62], [115], [116] X X [24], [62], [63], [116 VOR / NDB / DME [27], [80], [81] -X - [27], [80], [81]…”
Section: Assessment Of Concrete Scenariosmentioning
confidence: 99%
“…Typical representatives of this type of research are separate intrusion detection mechanisms based on cyber-physical defenses such as improved localization protocols (e.g., [57]). Also in this category, we can find works on statistical analysis [58], machine learning [36], physical-layer security [102]- [104], or data fusion with backup technologies [100]. The characteristic shared by these approaches is the fact that they can be deployed within a small time window.…”
Section: Directions In Aviation Security Researchmentioning
confidence: 99%
“…3.1 for more details) does not allow for the inclusion of reliable cryptography solutions, many contributions focused on providing security services through additional system-level approaches. To provide an example in this direction, the authors in [5] propose a two-stage location verification scheme. During an offline stage it creates a fingerprint of a particular aircraft, leveraging both Time Difference of Arrival (TDoA) values and deviations from nominal behavior.…”
Section: Related Workmentioning
confidence: 99%