z-logo
open-access-imgOpen Access
Threat model and construction strategy on ADS‐B attack data
Author(s) -
Li Tengyao,
Wang Buhong,
Shang Fute,
Tian Jiwei,
Cao Kunrui
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2018.5635
Subject(s) - computer science , computer security , key (lock) , fidelity , focus (optics) , attack model , telecommunications , physics , optics
With the fast increase in airspace density and high‐safety requirements on aviation, automatic dependent surveillance‐broadcast (ADS‐B) is regarded as the primary method in the next generation air traffic surveillance. The ADS‐B data is broadcast with the plain text without sufficient security measures, which results in various attack patterns emerging. However, in terms of constrictions with laws and regulations, ADS‐B attack data is difficult to collect and obtain, which is essential for data security research studies. To deal with the absence of ADS‐B attack data in real environments, the construction strategy on ADS‐B attack data is proposed. For construction fidelity, ADS‐B data features are analysed and modelled at first. Then the popular and classical attack patterns on ADS‐B data are analysed to establish threat models. Based on the original ADS‐B data sets, the construction strategy is designed to focus on attack target selection, key parameter determination, and mixture strategy, reproducing the attack intentions. The constructed ADS‐B attack data sets are hybrid data sets including the normal and attack data. By simulation analyses, the feasibility and availability of the construction strategy were validated with real ADS‐B data.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here