dc.contributor.author | Khandker, Syed | |
dc.contributor.author | Turtiainen, Hannu | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.author | Hämäläinen, Timo | |
dc.date.accessioned | 2022-02-17T10:08:37Z | |
dc.date.available | 2022-02-17T10:08:37Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Khandker, S., Turtiainen, H., Costin, A., & Hämäläinen, T. (2022). Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures. <i>IEEE Transactions on Aerospace and Electronic Systems</i>, <i>58</i>(4), 2702-2719. <a href="https://doi.org/10.1109/taes.2021.3139559" target="_blank">https://doi.org/10.1109/taes.2021.3139559</a> | |
dc.identifier.other | CONVID_103842967 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/79806 | |
dc.description.abstract | Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 13 hardware devices and 22 software that ran on Android, iOS, Linux, and Windows operating systems, which result in a total of 36 tested configurations. Each of the attacks was successful on various subsets of the tested configurations. In some attacks, we discovered wide qualitative variations and discrepancies in how particular configurations react to and treat ADS-B inputs that contain errors or contradicting flight information, with the main culprit almost always being the software implementation. In some other attacks, we managed to cause Denial of Service (DoS) by remotely crashing/impacting more than 50% of the test-set that corresponded to those attacks. Besides demonstrating successful attacks, we also implemented, investigated, and report herein some practical countermeasures to these attacks. We demonstrated that the strong relationship between the received signal strength and the distance-to-emitter might help verify the aircrafts advertised ADS-B position and distance. For example, our best machine learning models achieved 90% accuracy in detecting spoofed ADS-B signals, which may be effectively used to distinguish ADS-B signals of real aircraft from spoofed signals of attackers. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | |
dc.relation.ispartofseries | IEEE Transactions on Aerospace and Electronic Systems | |
dc.rights | CC BY 4.0 | |
dc.subject.other | ADS-B | |
dc.subject.other | 1090ES | |
dc.subject.other | UAT | |
dc.subject.other | EFB | |
dc.subject.other | 1090MHz | |
dc.subject.other | 978MHz | |
dc.subject.other | aviation | |
dc.subject.other | avionics | |
dc.subject.other | ATC | |
dc.subject.other | ATM | |
dc.subject.other | datalink | |
dc.subject.other | cybersecurity | |
dc.subject.other | vulnerabilities | |
dc.subject.other | pentesting | |
dc.subject.other | experimental platform | |
dc.subject.other | countermeasures | |
dc.title | Cybersecurity attacks on software logic and error handling within ADS-B implementations : systematic testing of resilience and countermeasures | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202202171534 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 2702-2719 | |
dc.relation.issn | 0018-9251 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 58 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © Authors, 2021 | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | lennonjohto | |
dc.subject.yso | lentoliikenne | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | lennonvarmistus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p525 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4262 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p14938 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.1109/taes.2021.3139559 | |
jyx.fundinginformation | Suomen Kulttuurirahasto (Grant Number: 00211119)
SESAR Engage KTN (Grant Number: Engage - 204 - Proof-of-concept: practical, flexib) | |
dc.type.okm | A1 | |