Title | ||
---|---|---|
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. |
Abstract | ||
---|---|---|
Multilateration techniques have been proposed to verify the integrity of unprotected location claims in wireless localization systems. A common assumption is that the adversary is equipped with only a single device from which it transmits location spoofing signals. In this paper, we consider a more advanced model where the attacker is equipped with multiple devices and performs a geographically distributed coordinated attack on the multilateration system. The feasibility of a distributed multi-device attack is demonstrated experimentally with a self-developed attack implementation based on multiple COTS software-defined radio (SDR) devices. We launch an attack against the OpenSky Network, an air traffic surveillance system that implements a time-difference-of-arrival (TDoA) multi-lateration method for aircraft localization based on ADS-B signals. Our experiments show that the timing errors for distributed spoofed signals are indistinguishable from the multilateration errors of legitimate aircraft signals, indicating that the threat of multi-device spoofing attacks is real in this and other similar systems. In the second part of this work, we investigate physical-layer features that could be used to detect multi-device attacks. We show that the frequency offset and transient phase noise of the attacker's radio devices can be exploited to discriminate between a received signal that has been transmitted by a single (legitimate) transponder or by multiple (malicious) spoofing sources. Based on that, we devise a multi-device spoofing detection system that achieves zero false positives and a false negative rate below 1%. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1145/2973750.2973763 | MobiCom |
Keywords | Field | DocType |
Air traffic control,ADS-B,Multilateration,Spoofing,Physical-layer,Intrusion detection | Protocol spoofing,Wireless,Spoofing attack,IP address spoofing,Computer science,Computer network,Transponder (aeronautics),Multilateration,Adversary,Intrusion detection system | Conference |
Citations | PageRank | References |
7 | 0.51 | 21 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Daniel Moser | 1 | 19 | 3.45 |
Patrick Leu | 2 | 7 | 1.53 |
Vincent Lenders | 3 | 737 | 72.53 |
Aanjhan Ranganathan | 4 | 117 | 12.14 |
F. Ricciato | 5 | 132 | 12.16 |
Srdjan Capkun | 6 | 4970 | 390.04 |