By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan, vvajratiya@gmail.com
Aircraft can now broadcast their position and other data because of Automatic Dependent Surveillance-Broadcast (ADS-B), which has completely changed air traffic surveillance. ADS-B presents cybersecurity issues even as it improves flight safety. This article examines the relationship between cybersecurity and ADS-B technology, examining the possible threats and the precautions that need to be taken to safeguard a vital part of air traffic control.
- Cybersecurity Issues with ADS-B
1. Spoofing and Tampering
Because ADS-B communications are transmitted without encryption, tampering or spoofing is possible. False information sent by malicious actors could result in inaccurate aircraft positions and possible safety hazards [1].
2. Interception and Eavesdropping
Since ADS-B transmissions are sent in clear text, there is a chance that adversaries will intercept and listen in on the conversations. The privacy of flight-related data is at danger because of this [2].
3. Data Integrity
Cyberattacks may modify or introduce erroneous data into the system, impairing situational awareness and resulting in erroneous aircraft tracking [3].
4. Jamming
Attacks that jam ADS-B signals have the potential to interfere with aircraft-to-air traffic control communication, thereby resulting in communication breakdowns [4].
- Ensuring ADS-B security
1. Authentication and Encryption
By limiting illegal access and tampering, encrypting ADS-B signals helps improve security. Adding authentication procedures also guarantees that messages are coming from reputable sources [5].
2. Cybersecurity Standards
It is essential to create and follow cybersecurity standards for ADS-B systems. Adherence to established guidelines guarantees that security is considered throughout the construction and upkeep of systems [6].
3. Network Security Measures
– By using intrusion detection systems and firewalls, network security measures assist shield ADS-B data from cyber threats and unauthorised access. This is especially crucial for systems that use networks to transfer ADS-B data [5].
ADS-B is still essential to the modernization of air traffic surveillance. ADS-B data integrity, confidentiality, and dependability .Stakeholders may work together to improve the cybersecurity posture of ADS-B systems and protect air traffic management in the future from changing cyber threats by encouraging cooperation and information sharing within the aviation sector.
References
- Khandker, S., Turtiainen, H., Costin, A., & Hämäläinen, T. (2021). Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures. IEEE Transactions on Aerospace and Electronic Systems, 58(4), 2702-2719.
- Semenov, S., & Zhang, M. J. (2022). Comparative studies of methods for improving the cyber security of unmanned aerial vehicles with the built-in ADS-B system. Advanced Information Systems, 6(4), 69-73.
- Baraldi Sesso, D., Vismari, L. F., Vieira da Silva Neto, A., Cugnasca, P. S., & Camargo, J. B. (2016). An approach to assess the safety of ads-b-based unmanned aerial systems: Data integrity as a safety issue. Journal of Intelligent & Robotic Systems, 84, 621-638.
- Leonardi, M., Piracci, E., & Galati, G. (2017). ADS-B jamming mitigation: a solution based on a multichannel receiver. IEEE Aerospace and Electronic Systems Magazine, 32(11), 44-51.
- Wu, Z., Guo, A., Yue, M., & Liu, L. (2019). An ADS-B message authentication method based on certificateless short signature. IEEE Transactions on Aerospace and Electronic Systems, 56(3), 1742-1753.
- Amin, S., Clark, T., Offutt, R., & Serenko, K. (2014, April). Design of a cyber security framework for ADS-B based surveillance systems. In 2014 Systems and Information Engineering Design Symposium (SIEDS) (pp. 304-309). IEEE.
- Wang, L., Han, C., Zheng, Y., Peng, X., Yang, M., & Gupta, B. (2023). Search for exploratory and exploitative service innovation in manufacturing firms: The role of ties with service intermediaries. Journal of Innovation & Knowledge, 8(1), 100288.
- Zamzami, I. F., Pathoee, K., Gupta, B. B., Mishra, A., Rawat, D., & Alhalabi, W. (2022). Machine learning algorithms for smart and intelligent healthcare system in Society 5.0. International Journal of Intelligent Systems, 37(12), 11742-11763.
- Chui, K. T., Gupta, B. B., Torres-Ruiz, M., Arya, V., Alhalabi, W., & Zamzami, I. F. (2023). A Convolutional Neural Network-Based Feature Extraction and Weighted Twin Support Vector Machine Algorithm for Context-Aware Human Activity Recognition. Electronics, 12(8), 1915.
- Chaudhary, P., Gupta, B., & Singh, A. K. (2022). Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks. Telecommunication Systems, 81(1), 23-39.
- Colace, F., Guida, C. G., Gupta, B., Lorusso, A., Marongiu, F., & Santaniello, D. (2022, August). A BIM-based approach for decision support system in smart buildings. In Proceedings of Seventh International Congress on Information and Communication Technology: ICICT 2022, London, Volume 1 (pp. 471-481). Singapore: Springer Nature Singapore.
Cite As:
Vajrobol V. (2024) ADS-B system and cyber defences, Insights2Techinfo, pp.1