SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Revels MA, Ciampa M. J. Transp. Secur. 2018; 11(1): 41-52.

Copyright

(Copyright © 2018, Holtzbrinck Springer Nature Publishing Group)

DOI

10.1007/s12198-018-0188-y

PMID

unavailable

Abstract

Air traffic control is moving from independent primary surveillance radar to the automatic dependent surveillance-broadcast (ADS-B) system. This holds the potential of reducing the total cost of deployment and improving the detection accuracy of aircraft. However, as currently being deployed these systems lack strong security mechanisms and are susceptible to a variety of radio frequency attacks. These attacks have been proffered by attackers at hacker conventions and by academic researchers. And many online sites even provide hacking "how-to" instructions on ADS-B. Is it possible for an attacker to manipulate ADS-B to interfere with an aircraft in flight using readily available tools? Using a basic $200 software defined radio (SDR) transceiver we simulated an ADS-B replay attack. Despite the advancement in SDR we find that the quality of SDR transceivers are still insufficient to perform a replay attack.


Language: en

Keywords

Ads-b; Air traffic control; Automatic dependent surveillance-broadcast; Replay attack; SDR; Software defined radio

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print