Spoofing in aviation: Security threats on GPS and ADS-B systems

نویسندگان

چکیده

Introduction/purpose: The paper provides a review of recent research in the field GPS and ADS-B spoofing. Systems that rely on satellite positioning technology can be targeted by spoofing order to generate incorrect positioning/timing, which is accomplished inserting false signals into "victim's" receiver. Attackers try insert information systems that, for example, provide navigation airplanes or drones purpose hijacking distracting security/safety airspace surveillance. New concepts ATC will thus necessary. Methods: Using scientific approach, gives an evaluation spoofing/antispoofing how affects cyber security aviation systems. Results: Based methodological analysis used, importance studying spoofing/anti-spoofing shown. Conclusion: Although only potential threat, its technical feasibility realistic considerable; it becomes more flexible cheaper due very rapid advancement SDR technologies. real risk, time come, are attacks could occur from air, using drones. However, aircraft not exposed without any defense; receivers detect applying various anti-spufing techniques. Also, pilots able solve problems at every stage flight. possibility sophisticated attacks, international organizations such as ICAO proactively working increase robustness

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ADS-B based separation support for general aviation

In this paper we present a study for the development of a new tool to support separation for General Aviation based on ADS-B technology. The tool aims at developing a device to support General Aviation pilots in the process of conflict detection and resolution as well as in the flight routing. The introduction of such a tool, based on ADS-B technology and a Game Theory collaborative algorithm, ...

متن کامل

SPREE: Spoofing Resistant GPS Receiver

Global Positioning System (GPS) is used ubiquitously in a wide variety of applications ranging from navigation and tracking to modern smart grids and communication networks. However, it has been demonstrated that modern GPS receivers are vulnerable to signal spoofing attacks. For example, today it is possible to change the course of a ship or force a drone to land in an hostile area by simply s...

متن کامل

Delay Spoofing Reduction in GPS Navigation System based on Time and Transform Domain Adaptive Filtering

Due to widespread use of Global Positioning System (GPS) in different applications, the issue of GPS signal interference cancelation is becoming an increasing concern. One of the most important intentional interferences is spoofing signals. An effective interference (delay spoof) reduction method based on adaptive filtering is developed in this paper. The principle of method is using adaptive f...

متن کامل

Classification of Security Threats in Information Systems

Information systems are frequently exposed to various types of threats which can cause different types of damages that might lead to significant financial losses. Information security damages can range from small losses to entire information system destruction. The effects of various threats vary considerably: some affect the confidentiality or integrity of data while others affect the availabi...

متن کامل

Security Requirements Analysis of ADS-B Networks

Due to their many advantages over their hardwarebased counterparts, Software Defined Radios are becoming the new paradigm for radio and radar applications. In particular, Automatic Dependent Surveillance-Broadcast (ADS-B) is an emerging software defined radar technology, which has been already deployed in Europe and Australia. Deployment in the US is underway as part of the Next Generation Tran...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Vojnotehni?ki Glasnik

سال: 2021

ISSN: ['0042-8469', '2217-4753']

DOI: https://doi.org/10.5937/vojtehg69-30119