Multidevice False Data Injection Attack Models of ADS-B Multilateration Systems

被引:9
|
作者
Shang, Fute [1 ]
Wang, Buhong [1 ]
Yan, Fuhu [1 ]
Li, Tengyao [1 ]
机构
[1] Air Force Engn Univ, Sch Informat & Nav, Xian, Shaanxi, Peoples R China
关键词
Anomaly detection;
D O I
10.1155/2019/8936784
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Location verification is a promising approach among various ADS-B security mechanisms, which can monitor announced positions in ADS-B messages with estimated positions. Based on common assumption that the attacker is equipped with only a single device, this mechanism can estimate the position state through analysis of time measurements of messages using multilateration algorithm. In this paper, we propose the formal model of multidevice false data injection attacks in the ATC system against the location verification. Assuming that attackers equipped with multiple devices can manipulate the ADS-B messages in distributed receivers without any mutual interference, such attacker can efficiently construct attack vectors to change the results of multilateration. The feasibility of a multidevice false data injection attack is demonstrated experimentally. Compared with previous multidevice attacks, the multidevice false data injection attacks can offer lower cost and more covert attacks. The simulation results show that the proposed attack can reduce the attackers' cost by half and achieve better time synchronization to bypass the existing anomaly detection. Finally, we discuss the real-world constraints that limit their effectiveness and the countermeasures of these attacks.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] Multilateration With ADS-B a Boon in Civil Aviation Application
    Rayapu, Murali Krishna
    Talari, Sneha
    Darshini, G. Indira Priya
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), 2017, : 545 - 550
  • [2] A Resilient Recovery Method on ADS-B Attack Data
    Li Tengyao
    Wang Buhong
    Shang Fuse
    Tian Jiwei
    Cao Kunrui
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (10) : 2365 - 2373
  • [3] A Resilient Recovery Method on ADS-B Attack Data
    Li T.
    Wang B.
    Shang F.
    Tian J.
    Cao K.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (10): : 2365 - 2373
  • [4] Anomaly detection system for ADS-B data: Attack vectors and machine learning models
    Cevik, Nursah
    Akleylek, Sedat
    INTERNET OF THINGS, 2025, 29
  • [5] Sequential collaborative detection strategy on ADS-B data attack
    Li, Tengyao
    Wang, Buhong
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 24 : 78 - 99
  • [6] A technical assessment of ADS-B and multilateration technology in the Gulf of Mexico
    Daskalakis, A
    Martone, P
    PROCEEDINGS OF THE 2003 IEEE RADAR CONFERENCE, 2003, : 370 - 378
  • [7] Threat model and construction strategy on ADS-B attack data
    Li, Tengyao
    Wang, Buhong
    Shang, Fute
    Tian, Jiwei
    Cao, Kunrui
    IET INFORMATION SECURITY, 2020, 14 (05) : 542 - 552
  • [8] A Preliminary Effort toward Investigating the Impacts of ADS-B Message Injection Attack
    Manesh, Mohsen Riahi
    Mullins, Michael
    Foerster, Kyle
    Kaabouch, Naima
    2018 IEEE AEROSPACE CONFERENCE, 2018,
  • [9] DETECTING MALICIOUS ADS-B BROADCASTS USING WIDE AREA MULTILATERATION
    Monteiro, Marcio
    Barreto, Alexandre
    Kacem, Thabet
    Carvalho, Jeronymo
    Wijesekera, Duminda
    Costa, Paulo
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [10] Multiradar Tracking in PHOENIX and its Extension to Fusion with ADS-B and Multilateration
    Heidger, Ralf
    Mathias, Adolf
    2008 EUROPEAN RADAR CONFERENCE, 2008, : 188 - 191