Proceedings of the 9th ACM Conference on Security &Amp; Privacy in Wireless and Mobile Networks 2016
DOI: 10.1145/2939918.2939920
|View full text |Cite
|
Sign up to set email alerts
|

Secure Motion Verification using the Doppler Effect

Abstract: Future transportation systems highly rely on the integrity of spatial information provided by their means of transportation such as vehicles and planes. In critical applications (e.g. collision avoidance), tampering with this data can result in life-threatening situations. It is therefore essential for the safety of these systems to securely verify this information. While there is a considerable body of work on the secure verification of locations, movement of nodes has only received little attention in the li… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 24 publications
0
16
0
Order By: Relevance
“…It is a common phenomenon in wireless communications, which is widely used in many applications [51], [40]. However, some studies have suggested using the Doppler shift of an ADS-B signal to verify the velocity, and subsequently, the position of an aircraft [52], [53]. The Doppler shift effect is mainly used to verify whether the signal is coming from a source-in-motion, assuming that the attacker is likely to be in the static mode, while a real aircraft is constantly in motion when it flies.…”
Section: B Defense Using the Doppler Shiftmentioning
confidence: 99%
“…It is a common phenomenon in wireless communications, which is widely used in many applications [51], [40]. However, some studies have suggested using the Doppler shift of an ADS-B signal to verify the velocity, and subsequently, the position of an aircraft [52], [53]. The Doppler shift effect is mainly used to verify whether the signal is coming from a source-in-motion, assuming that the attacker is likely to be in the static mode, while a real aircraft is constantly in motion when it flies.…”
Section: B Defense Using the Doppler Shiftmentioning
confidence: 99%
“…Schäfer et al [109] discuss how the Doppler effect can be used to validate movement in an approach similar to those discussed above. Although their work primarily focuses on flying vehicles (e.g., airplanes), where distances are much greater and thus signal propagation takes much more time.…”
Section: B Data-centric Mechanismsmentioning
confidence: 99%
“…Strohmeier et al [46], [49] survey the existing research on countermeasures. More specifically, Ghose and Lazos [10] as well as Schäfer et al [37], [38] and Liu et al [22] propose the usage of timing or Dopplershift characteristics to detect attacks on ADS-B. While this cannot protect from attacks, it still helps to identify malicious or inaccurate messages.…”
Section: Related Workmentioning
confidence: 99%
“…Since our system is solely based on an already existing infrastructure and does not require any modifications on aviation systems, it is non-invasive and could be implemented today easing very long certification processes. In contrast to existing solutions for air-traffic verification [10], [21], [22], [26], [37], [38], [52], [60], we do not require the measurement of time, frequency shifts, or any PHY layer features, but only use discrete sensor events.…”
Section: Introductionmentioning
confidence: 99%