Back to Search Start Over

Threat model and construction strategy on ADS‐B attack data.

Authors :
Li, Tengyao
Wang, Buhong
Shang, Fute
Tian, Jiwei
Cao, Kunrui
Source :
IET Information Security (Wiley-Blackwell); Sep2020, Vol. 14 Issue 5, p542-552, 11p
Publication Year :
2020

Abstract

With the fast increase in airspace density and high‐safety requirements on aviation, automatic dependent surveillance‐broadcast (ADS‐B) is regarded as the primary method in the next generation air traffic surveillance. The ADS‐B data is broadcast with the plain text without sufficient security measures, which results in various attack patterns emerging. However, in terms of constrictions with laws and regulations, ADS‐B attack data is difficult to collect and obtain, which is essential for data security research studies. To deal with the absence of ADS‐B attack data in real environments, the construction strategy on ADS‐B attack data is proposed. For construction fidelity, ADS‐B data features are analysed and modelled at first. Then the popular and classical attack patterns on ADS‐B data are analysed to establish threat models. Based on the original ADS‐B data sets, the construction strategy is designed to focus on attack target selection, key parameter determination, and mixture strategy, reproducing the attack intentions. The constructed ADS‐B attack data sets are hybrid data sets including the normal and attack data. By simulation analyses, the feasibility and availability of the construction strategy were validated with real ADS‐B data. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
17518709
Volume :
14
Issue :
5
Database :
Complementary Index
Journal :
IET Information Security (Wiley-Blackwell)
Publication Type :
Academic Journal
Accession number :
148066422
Full Text :
https://doi.org/10.1049/iet-ifs.2018.5635