Näytä suppeat kuvailutiedot

dc.contributor.authorKhandker, Syed
dc.contributor.authorTurtiainen, Hannu
dc.contributor.authorCostin, Andrei
dc.contributor.authorHämäläinen, Timo
dc.date.accessioned2022-04-27T07:13:37Z
dc.date.available2022-04-27T07:13:37Z
dc.date.issued2022
dc.identifier.citationKhandker, S., Turtiainen, H., Costin, A., & Hämäläinen, T. (2022). On the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems. <i>IEEE Access</i>, <i>10</i>, 37718-37730. <a href="https://doi.org/10.1109/ACCESS.2022.3164704" target="_blank">https://doi.org/10.1109/ACCESS.2022.3164704</a>
dc.identifier.otherCONVID_117637282
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/80743
dc.description.abstractAutomatic dependent surveillance-broadcast (ADS-B) is a key air surveillance technology and a critical component of next-generation air transportation systems. It significantly simplifies aircraft surveillance technology and improves airborne traffic situational awareness. Many types of mobile cockpit information systems (MCISs) are based on ADS-B technology. MCIS gives pilots the flight and traffic-related information they need. MCIS has two parts: an ADS-B transceiver and an electronic flight bag (EFB) application. The ADS-B transceivers transmit and receive the ADS-B radio signals while the EFB applications hosted on mobile phones display the data. Because they are cheap, lightweight, and easy to install, MCISs became very popular. However, because it lacks basic security measures, ADS-B technology is vulnerable to cyberattacks, which makes the MCIS inherently exposed to attacks. This is even more likely because they are power, memory, and computationally constrained. This study explores the cybersecurity posture of various MCIS setups for both types of ADS-B technology: 1090ES and UAT978. Total six portable MCIS devices and 21 EFB applications were tested against radio-link- based attacks by transmission-capable software-defined radio (SDR). Packet-level denial of service (DoS) attacks affected approximately 63% and 37% of 1090ES and UAT978 setups, respectively, while many of them experienced a system crash. Our experiments show that DoS attacks on the reception could meaningfully reduce transmission capacity. Our coordinated attack and fuzz tests also reported worrying issues on the MCIS. The consistency of our results on a very broad range of hardware and software configurations indicate the reliability of our proposed methodology as well as the effectiveness and efficiency of our platform.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.relation.ispartofseriesIEEE Access
dc.rightsCC BY 4.0
dc.subject.otheraircraft
dc.subject.otheraircraft navigation
dc.subject.othertransceivers
dc.subject.othercodes
dc.subject.othercomputer crashes
dc.subject.otheraerospace electronics
dc.subject.othersurveillance
dc.subject.othercybersecurity
dc.subject.otherattacks
dc.subject.otherADS-B
dc.subject.otherATC
dc.subject.otherATM
dc.subject.otherUAT978
dc.subject.other1090ES
dc.subject.otheravailability
dc.subject.otherDoS
dc.titleOn the (In)Security of 1090ES and UAT978 Mobile Cockpit Information Systems : An Attacker Perspective on the Availability of ADS-B Safety- and Mission-Critical Systems
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202204272416
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange37718-37730
dc.relation.issn2169-3536
dc.relation.volume10
dc.type.versionpublishedVersion
dc.rights.copyright© 2022 the Authors
dc.rights.accesslevelopenAccessfi
dc.relation.grantnumber304970
dc.subject.ysoverkkohyökkäykset
dc.subject.ysolentokoneet
dc.subject.ysokyberturvallisuus
dc.subject.ysotietojärjestelmät
dc.subject.ysolentoliikenne
dc.subject.ysolennonjohto
dc.subject.ysolennonvarmistus
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p1053
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p3927
jyx.subject.urihttp://www.yso.fi/onto/yso/p4262
jyx.subject.urihttp://www.yso.fi/onto/yso/p525
jyx.subject.urihttp://www.yso.fi/onto/yso/p14938
dc.rights.urlhttps://creativecommons.org/licenses/by/4.0/
dc.relation.doi10.1109/ACCESS.2022.3164704
dc.relation.funderResearch Council of Finlanden
dc.relation.funderSuomen Akatemiafi
jyx.fundingprogramResearch infrastructures, AoFen
jyx.fundingprogramTutkimusinfrastruktuuri, SAfi
jyx.fundinginformationThis work was supported in part by the Finnish Grid and Cloud Infrastructure (FGCI) in part by the research dean for research funding within the Faculty of Information Technology of the University of Jyväskylä (07.04.2021), and in part by the Finnish Cultural Foundation, grant decision No. 00211119.
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

CC BY 4.0
Ellei muuten mainita, aineiston lisenssi on CC BY 4.0