SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Smith M, Strohmeier M, Lenders V, Martinovic I. J. Transp. Secur. 2022; 15(1): 87-118.

Copyright

(Copyright © 2022, Holtzbrinck Springer Nature Publishing Group)

DOI

10.1007/s12198-021-00238-2

PMID

unavailable

Abstract

Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions. Recent years have seen security research increasingly focus on aviation, identifying that key wireless links--some of which are used in collision avoidance--are vulnerable to attack. In this paper, we go one step further to understand whether an attacker can remotely trigger false collision avoidance alarms. Primarily considering the next-generation Airborne Collision Avoidance System X (ACAS X), we adopt a modelling approach to extract attacker constraints from technical standards before simulating collision avoidance attacks against standardized ACAS X code. We find that in 44% of cases, an attacker can successfully trigger a collision avoidance alert which on average results in a 590 ft altitude deviation; when the aircraft is at lower altitudes, this success rate rises considerably to 79%. Furthermore, we show how our simulation approach can be used to help defend against attacks by identifying where attackers are most likely to be successful.


Language: en

Keywords

Air traffic control; Aviation security; Collision avoidance; Cyber security

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print