Air Traffic Security against Cyber Threats

Air Traffic Security against Cyber Threats

Air Traffic Management (ATM) security is amongst major topics of safety critical systems and issues of both civil aviation and military defense units. The dramatic increase in the number of the aircrafts and the innovative technology that provides smaller and sustainable air vehicles make the air communication protocols and methods as a high profile potential target for black hat hackers. There are lots of communication protocols and different systems between air to ground (A2G) station and air to air (A2A). These include set of information such as aircraft communication data, voice information and flight planning which works on some protocols. All of radar detection and chasing systems are also using similar techniques. The Data Distribution Service (DDS) is a protocol for data transfer to each node. The communication systems can be protected from third party system or hackers to some extent. The security is coming from that point. Each components have own security using valid and standard methods. Our approach in this study, enforces reasonable and applicable security concepts and techniques for a robust and resillient air traffic.

___

  • [1] J. Hird, M. Hawley and C. Machin, ”Air Traffic Management Security Research in SESAR,” 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, 2016, pp. 486-492.
  • [2] P. Skaves, ”FAA Aircraft Systems Information Security Protection overview,” 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, VA, 2015, pp. A1-1-A1-17.
  • [3] M. Rusko and M. Finke, ”Using speech analysis in voice communication: A new approach to improve air traffic management security,” 2016 7th IEEE International Conference on Cognitive Infocommunications (CogInfoCom), Wroclaw, 2016, pp. 000181-000186.
  • [4] M. Monteiro, T. Sarmento, A. Barreto, P. Costa and M. Hieb, ”An integrated mission and cyber simulation for Air Traffic Control,” 2016 IEEE 19th International Conference on Intelligent Transportation Systems (ITSC), Rio de Janeiro, 2016, pp. 2687-2692.
  • [5] Dongyoung Koo, Junbeom Hur, Hyunsoo Yoon, Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage, Computers and Electrical Engineering, Volume 39, Issue 1, January 2013, Pages 34-46.
  • [6] S. Pradhan et al., ”Establishing Secure Interactions across Distributed Applications in Satellite Clusters,” 2014 IEEE International Conference on Space Mission Challenges for Information Technology, Laurel MD, 2014, pp. 67-74.
  • [7] Angelo Corsaro, ”The DDS Tutorial” http://download.prismtech.com/docs/Vortex/pdfs/OpenSplice_DDSTutorial.pdf
  • [8] CSFI volunteers, ”CSFI ATC (Air Traffic Control) Cyber security Project”,July 16, 2015, https://scadahacker.com/library/Documents/Case_Studies/CSFI%20-%20ATC%20Cyber%20Security%20Project.pdf
  • [9] Jon Gilbert, Scott Boden, Roger Atkinson, ”Aircraft data and voice communications system and method”, February 13, 2003.
  • [10]https://www.ead.eurocontrol.int/eadcms/eadsite/evolutions/aimsl.html
  • [11] https://arstechnica.com/tech-policy/2015/03/us-air-traffic-control-computer-system-vulnerable-to-terrorist-hackers/
  • [12] http://www.gao.gov/assets/670/668169.pdf
  • [13] https://ecfsapi.fcc.gov/file/7021694523.pdf
  • [14] http://securityaffairs.co/wordpress/40975/hacking/easa-airplane-hacking.html
  • [15] http://securityaffairs.co/wordpress/13625/hacking/hijacking-planes-navigation-system-with-android-reality-or-unnecessary-alarm.html
  • [16] http://www.securityweek.com/fbi-says-researcher-admitted-hacking-airplane-mid-flight
  • [17] http://abcnews.go.com/US/story?id=95993&page=1
  • [18] https://mods-n-hacks.gadgethacks.com/how-to/hack-transistor-radio-hear-air-traffic-control-232754/
  • [19]https://www.npr.org/sections/alltechconsidered/2012/08/16/158758161/could-the-new-air-traffic-control-system-be-hacked
  • [20] https://www.airport-technology.com/features/featureair-traffic-control-easy-target-hackers/
  • [21] https://www.theverge.com/2017/11/23/16694118/mr-robot-hack-report-s3e7-fredrick-tanya