ADS-B system and cyber defences

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan, vvajratiya@gmail.com

Aircraft can now broadcast their position and other data because of Automatic Dependent Surveillance-Broadcast (ADS-B), which has completely changed air traffic surveillance. ADS-B presents cybersecurity issues even as it improves flight safety. This article examines the relationship between cybersecurity and ADS-B technology, examining the possible threats and the precautions that need to be taken to safeguard a vital part of air traffic control.

  • Cybersecurity Issues with ADS-B

1. Spoofing and Tampering

Because ADS-B communications are transmitted without encryption, tampering or spoofing is possible. False information sent by malicious actors could result in inaccurate aircraft positions and possible safety hazards [1].

2. Interception and Eavesdropping

Since ADS-B transmissions are sent in clear text, there is a chance that adversaries will intercept and listen in on the conversations. The privacy of flight-related data is at danger because of this [2].

3. Data Integrity

Cyberattacks may modify or introduce erroneous data into the system, impairing situational awareness and resulting in erroneous aircraft tracking [3].

4. Jamming

Attacks that jam ADS-B signals have the potential to interfere with aircraft-to-air traffic control communication, thereby resulting in communication breakdowns [4].

  • Ensuring ADS-B security

1. Authentication and Encryption

By limiting illegal access and tampering, encrypting ADS-B signals helps improve security. Adding authentication procedures also guarantees that messages are coming from reputable sources [5].

2. Cybersecurity Standards

It is essential to create and follow cybersecurity standards for ADS-B systems. Adherence to established guidelines guarantees that security is considered throughout the construction and upkeep of systems [6].

3. Network Security Measures

– By using intrusion detection systems and firewalls, network security measures assist shield ADS-B data from cyber threats and unauthorised access. This is especially crucial for systems that use networks to transfer ADS-B data [5].

ADS-B is still essential to the modernization of air traffic surveillance. ADS-B data integrity, confidentiality, and dependability .Stakeholders may work together to improve the cybersecurity posture of ADS-B systems and protect air traffic management in the future from changing cyber threats by encouraging cooperation and information sharing within the aviation sector.

References

  1. Khandker, S., Turtiainen, H., Costin, A., & Hämäläinen, T. (2021). Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures. IEEE Transactions on Aerospace and Electronic Systems, 58(4), 2702-2719.
  2. Semenov, S., & Zhang, M. J. (2022). Comparative studies of methods for improving the cyber security of unmanned aerial vehicles with the built-in ADS-B system. Advanced Information Systems, 6(4), 69-73.
  3. Baraldi Sesso, D., Vismari, L. F., Vieira da Silva Neto, A., Cugnasca, P. S., & Camargo, J. B. (2016). An approach to assess the safety of ads-b-based unmanned aerial systems: Data integrity as a safety issue. Journal of Intelligent & Robotic Systems, 84, 621-638.
  4. Leonardi, M., Piracci, E., & Galati, G. (2017). ADS-B jamming mitigation: a solution based on a multichannel receiver. IEEE Aerospace and Electronic Systems Magazine, 32(11), 44-51.
  5. Wu, Z., Guo, A., Yue, M., & Liu, L. (2019). An ADS-B message authentication method based on certificateless short signature. IEEE Transactions on Aerospace and Electronic Systems, 56(3), 1742-1753.
  6. Amin, S., Clark, T., Offutt, R., & Serenko, K. (2014, April). Design of a cyber security framework for ADS-B based surveillance systems. In 2014 Systems and Information Engineering Design Symposium (SIEDS) (pp. 304-309). IEEE.
  7. Wang, L., Han, C., Zheng, Y., Peng, X., Yang, M., & Gupta, B. (2023). Search for exploratory and exploitative service innovation in manufacturing firms: The role of ties with service intermediaries. Journal of Innovation & Knowledge8(1), 100288.
  8. Zamzami, I. F., Pathoee, K., Gupta, B. B., Mishra, A., Rawat, D., & Alhalabi, W. (2022). Machine learning algorithms for smart and intelligent healthcare system in Society 5.0. International Journal of Intelligent Systems37(12), 11742-11763.
  9. Chui, K. T., Gupta, B. B., Torres-Ruiz, M., Arya, V., Alhalabi, W., & Zamzami, I. F. (2023). A Convolutional Neural Network-Based Feature Extraction and Weighted Twin Support Vector Machine Algorithm for Context-Aware Human Activity Recognition. Electronics12(8), 1915.
  10. Chaudhary, P., Gupta, B., & Singh, A. K. (2022). Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks. Telecommunication Systems81(1), 23-39.
  11. Colace, F., Guida, C. G., Gupta, B., Lorusso, A., Marongiu, F., & Santaniello, D. (2022, August). A BIM-based approach for decision support system in smart buildings. In Proceedings of Seventh International Congress on Information and Communication Technology: ICICT 2022, London, Volume 1 (pp. 471-481). Singapore: Springer Nature Singapore.

Cite As:

Vajrobol V. (2024) ADS-B system and cyber defences, Insights2Techinfo, pp.1

67010cookie-checkADS-B system and cyber defences
Share this:

Leave a Reply

Your email address will not be published.