2020 AIAA/IEEE 39th Digital Avionics Systems Conference (DASC) 2020
DOI: 10.1109/dasc50938.2020.9256659
|View full text |Cite
|
Sign up to set email alerts
|

Security Concept for Unoccupied Aerial Systems

Abstract: The number of unoccupied aerial systems (UAS) is projected to exponentially increase in the next few decades for a variety of civil and military uses. However, this poses significant challenges with respect to airspace integration. This paper reviews identified security vulnerabilities of the two main options for UAS communication and airspace management, aircraft communications addressing and reporting system (ACARS) and automatic dependent surveillance-broadcast (ADS-B). Based on a comprehensive threat model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…In addition to the findings of Smith et al, practical attack surface against ACARS has been well-established in the recent years. Spoofing attacks have been demonstrated by Zhang, Liu, Liu and Nees (2018), by Bresteau, Guigui, Berthier and Fernandez (2018), by , and by Perner and Schmitt (2020), to name some. These factors warrant the relevance of experimentation using the legacy POA in dissemination of cyberattack vectors.…”
Section: Aircraft Communication Addressing and Reporting Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition to the findings of Smith et al, practical attack surface against ACARS has been well-established in the recent years. Spoofing attacks have been demonstrated by Zhang, Liu, Liu and Nees (2018), by Bresteau, Guigui, Berthier and Fernandez (2018), by , and by Perner and Schmitt (2020), to name some. These factors warrant the relevance of experimentation using the legacy POA in dissemination of cyberattack vectors.…”
Section: Aircraft Communication Addressing and Reporting Systemmentioning
confidence: 99%
“…Implementing the protocol is within the reach of virtually any motivated actor. Additionally, methods for POA signal generation have been published before Zhang et al (2018), by Bresteau et al (2018), by , and by Perner and Schmitt (2020), so the developed methodology has no inherent scientific novelty value. Secondly, the methodology for POA signal generation was made specifically for this study as student work, which promotes its release as a part of this master's thesis.…”
Section: Signal Transmittance Chain Developmentmentioning
confidence: 99%
“…ADS-B's main security issues are its lack of authentication and encryption [69,70]. Since the ADS-B an inherent insecure protocol, it is vulnerable to any kind of cyber-attack [71]. Although the ADS-B transponder broadcasts the message automatically, in some incidents, it was found that the pilot can turn it off [72].…”
Section: Securitymentioning
confidence: 99%
“…Some critiques of ADS-B usage in UAVs arise, such as that there are too many vehicles that are very close to each other, causing a lot of congestion; the communication range near the ground is much shorter; and that interference is caused for airliner pilots during take-off and landing near airports [70]. Another issue related to the insecure protocol is that authentication of detected nearby vehicles comes into question [71].…”
Section: Safetymentioning
confidence: 99%
“…Furthermore, the IPv6 protocol can be part of the future ACARS; however, datalink security remains a major concern [57]. Therefore, the study, [58], proposed a detection and authentication-based safety architecture.…”
Section: A Airplanesmentioning
confidence: 99%