Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures
Title | Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Moser, Daniel, Leu, Patrick, Lenders, Vincent, Ranganathan, Aanjhan, Ricciato, Fabio, Capkun, Srdjan |
Conference Name | Proceedings of the 22Nd Annual International Conference on Mobile Computing and Networking |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4226-1 |
Keywords | ADS-B, Air traffic control, composability, Intrusion detection, Metrics, multilateration, Physical layer, physical layer security, physical-layer, physical-layer security, pubcrawl, Resiliency, Spoofing |
Abstract | Multilateration techniques have been proposed to verify the integrity of unprotected location claims in wireless localization systems. A common assumption is that the adversary is equipped with only a single device from which it transmits location spoofing signals. In this paper, we consider a more advanced model where the attacker is equipped with multiple devices and performs a geographically distributed coordinated attack on the multilateration system. The feasibility of a distributed multi-device attack is demonstrated experimentally with a self-developed attack implementation based on multiple COTS software-defined radio (SDR) devices. We launch an attack against the OpenSky Network, an air traffic surveillance system that implements a time-difference-of-arrival (TDoA) multi-lateration method for aircraft localization based on ADS-B signals. Our experiments show that the timing errors for distributed spoofed signals are indistinguishable from the multilateration errors of legitimate aircraft signals, indicating that the threat of multi-device spoofing attacks is real in this and other similar systems. In the second part of this work, we investigate physical-layer features that could be used to detect multi-device attacks. We show that the frequency offset and transient phase noise of the attacker's radio devices can be exploited to discriminate between a received signal that has been transmitted by a single (legitimate) transponder or by multiple (malicious) spoofing sources. Based on that, we devise a multi-device spoofing detection system that achieves zero false positives and a false negative rate below 1%. |
URL | http://doi.acm.org/10.1145/2973750.2973763 |
DOI | 10.1145/2973750.2973763 |
Citation Key | moser_investigation_2016 |