Visible to the public Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures

TitleInvestigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
Publication TypeConference Paper
Year of Publication2016
AuthorsMoser, Daniel, Leu, Patrick, Lenders, Vincent, Ranganathan, Aanjhan, Ricciato, Fabio, Capkun, Srdjan
Conference NameProceedings of the 22Nd Annual International Conference on Mobile Computing and Networking
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4226-1
KeywordsADS-B, Air traffic control, composability, Intrusion detection, Metrics, multilateration, Physical layer, physical layer security, physical-layer, physical-layer security, pubcrawl, Resiliency, Spoofing
Abstract

Multilateration techniques have been proposed to verify the integrity of unprotected location claims in wireless localization systems. A common assumption is that the adversary is equipped with only a single device from which it transmits location spoofing signals. In this paper, we consider a more advanced model where the attacker is equipped with multiple devices and performs a geographically distributed coordinated attack on the multilateration system. The feasibility of a distributed multi-device attack is demonstrated experimentally with a self-developed attack implementation based on multiple COTS software-defined radio (SDR) devices. We launch an attack against the OpenSky Network, an air traffic surveillance system that implements a time-difference-of-arrival (TDoA) multi-lateration method for aircraft localization based on ADS-B signals. Our experiments show that the timing errors for distributed spoofed signals are indistinguishable from the multilateration errors of legitimate aircraft signals, indicating that the threat of multi-device spoofing attacks is real in this and other similar systems. In the second part of this work, we investigate physical-layer features that could be used to detect multi-device attacks. We show that the frequency offset and transient phase noise of the attacker's radio devices can be exploited to discriminate between a received signal that has been transmitted by a single (legitimate) transponder or by multiple (malicious) spoofing sources. Based on that, we devise a multi-device spoofing detection system that achieves zero false positives and a false negative rate below 1%.

URLhttp://doi.acm.org/10.1145/2973750.2973763
DOI10.1145/2973750.2973763
Citation Keymoser_investigation_2016