ADS-B system and cyber defences

By: Vajratiya Vajrobol, International Center for AI and Cyber Security Research and Innovations (CCRI), Asia University, Taiwan,

Aircraft can now broadcast their position and other data because of Automatic Dependent Surveillance-Broadcast (ADS-B), which has completely changed air traffic surveillance. ADS-B presents cybersecurity issues even as it improves flight safety. This article examines the relationship between cybersecurity and ADS-B technology, examining the possible threats and the precautions that need to be taken to safeguard a vital part of air traffic control.

  • Cybersecurity Issues with ADS-B

1. Spoofing and Tampering

Because ADS-B communications are transmitted without encryption, tampering or spoofing is possible. False information sent by malicious actors could result in inaccurate aircraft positions and possible safety hazards [1].

2. Interception and Eavesdropping

Since ADS-B transmissions are sent in clear text, there is a chance that adversaries will intercept and listen in on the conversations. The privacy of flight-related data is at danger because of this [2].

3. Data Integrity

Cyberattacks may modify or introduce erroneous data into the system, impairing situational awareness and resulting in erroneous aircraft tracking [3].

4. Jamming

Attacks that jam ADS-B signals have the potential to interfere with aircraft-to-air traffic control communication, thereby resulting in communication breakdowns [4].

  • Ensuring ADS-B security

1. Authentication and Encryption

By limiting illegal access and tampering, encrypting ADS-B signals helps improve security. Adding authentication procedures also guarantees that messages are coming from reputable sources [5].

2. Cybersecurity Standards

It is essential to create and follow cybersecurity standards for ADS-B systems. Adherence to established guidelines guarantees that security is considered throughout the construction and upkeep of systems [6].

3. Network Security Measures

– By using intrusion detection systems and firewalls, network security measures assist shield ADS-B data from cyber threats and unauthorised access. This is especially crucial for systems that use networks to transfer ADS-B data [5].

ADS-B is still essential to the modernization of air traffic surveillance. ADS-B data integrity, confidentiality, and dependability .Stakeholders may work together to improve the cybersecurity posture of ADS-B systems and protect air traffic management in the future from changing cyber threats by encouraging cooperation and information sharing within the aviation sector.


  1. Khandker, S., Turtiainen, H., Costin, A., & Hämäläinen, T. (2021). Cybersecurity attacks on software logic and error handling within ADS-B implementations: Systematic testing of resilience and countermeasures. IEEE Transactions on Aerospace and Electronic Systems, 58(4), 2702-2719.
  2. Semenov, S., & Zhang, M. J. (2022). Comparative studies of methods for improving the cyber security of unmanned aerial vehicles with the built-in ADS-B system. Advanced Information Systems, 6(4), 69-73.
  3. Baraldi Sesso, D., Vismari, L. F., Vieira da Silva Neto, A., Cugnasca, P. S., & Camargo, J. B. (2016). An approach to assess the safety of ads-b-based unmanned aerial systems: Data integrity as a safety issue. Journal of Intelligent & Robotic Systems, 84, 621-638.
  4. Leonardi, M., Piracci, E., & Galati, G. (2017). ADS-B jamming mitigation: a solution based on a multichannel receiver. IEEE Aerospace and Electronic Systems Magazine, 32(11), 44-51.
  5. Wu, Z., Guo, A., Yue, M., & Liu, L. (2019). An ADS-B message authentication method based on certificateless short signature. IEEE Transactions on Aerospace and Electronic Systems, 56(3), 1742-1753.
  6. Amin, S., Clark, T., Offutt, R., & Serenko, K. (2014, April). Design of a cyber security framework for ADS-B based surveillance systems. In 2014 Systems and Information Engineering Design Symposium (SIEDS) (pp. 304-309). IEEE.
  7. Wang, L., Han, C., Zheng, Y., Peng, X., Yang, M., & Gupta, B. (2023). Search for exploratory and exploitative service innovation in manufacturing firms: The role of ties with service intermediaries. Journal of Innovation & Knowledge8(1), 100288.
  8. Zamzami, I. F., Pathoee, K., Gupta, B. B., Mishra, A., Rawat, D., & Alhalabi, W. (2022). Machine learning algorithms for smart and intelligent healthcare system in Society 5.0. International Journal of Intelligent Systems37(12), 11742-11763.
  9. Chui, K. T., Gupta, B. B., Torres-Ruiz, M., Arya, V., Alhalabi, W., & Zamzami, I. F. (2023). A Convolutional Neural Network-Based Feature Extraction and Weighted Twin Support Vector Machine Algorithm for Context-Aware Human Activity Recognition. Electronics12(8), 1915.
  10. Chaudhary, P., Gupta, B., & Singh, A. K. (2022). Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks. Telecommunication Systems81(1), 23-39.
  11. Colace, F., Guida, C. G., Gupta, B., Lorusso, A., Marongiu, F., & Santaniello, D. (2022, August). A BIM-based approach for decision support system in smart buildings. In Proceedings of Seventh International Congress on Information and Communication Technology: ICICT 2022, London, Volume 1 (pp. 471-481). Singapore: Springer Nature Singapore.

Cite As:

Vajrobol V. (2024) ADS-B system and cyber defences, Insights2Techinfo, pp.1

67010cookie-checkADS-B system and cyber defences
Share this:

Leave a Reply

Your email address will not be published.