Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Costin, A. & Francillon, A. abstract bibtex In this paper we investigate (in)security aspects of Automatic Dependent Surveillance-Broadcast (ADS-B) protocol. ADS-B is intended to be widely deployed in Air Traffic Management (ATM) Surveillance systems by 2020. One of the goals of ADS-B is to increase safety of air traffic. While the security of ADS-B was previously questioned, in this paper we demonstrate that attacks are both easy and practically feasible, for a moderately sophisticated attacker. Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying of injection).
@article{costin_ghost_nodate,
title = {Ghost in the {Air}({Traffic}): {On} insecurity of {ADS}-{B} protocol and practical attacks on {ADS}-{B} devices},
abstract = {In this paper we investigate (in)security aspects of Automatic Dependent Surveillance-Broadcast (ADS-B) protocol. ADS-B is intended to be widely deployed in Air Traffic Management (ATM) Surveillance systems by 2020. One of the goals of ADS-B is to increase safety of air traffic. While the security of ADS-B was previously questioned, in this paper we demonstrate that attacks are both easy and practically feasible, for a moderately sophisticated attacker. Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying of injection).},
language = {en},
author = {Costin, Andrei and Francillon, Aurelien},
pages = {9}
}
Downloads: 0
{"_id":"8n36CZNRG9pv6jCay","bibbaseid":"costin-francillon-ghostintheairtrafconinsecurityofadsbprotocolandpracticalattacksonadsbdevices","authorIDs":[],"author_short":["Costin, A.","Francillon, A."],"bibdata":{"bibtype":"article","type":"article","title":"Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","abstract":"In this paper we investigate (in)security aspects of Automatic Dependent Surveillance-Broadcast (ADS-B) protocol. ADS-B is intended to be widely deployed in Air Traffic Management (ATM) Surveillance systems by 2020. One of the goals of ADS-B is to increase safety of air traffic. While the security of ADS-B was previously questioned, in this paper we demonstrate that attacks are both easy and practically feasible, for a moderately sophisticated attacker. Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying of injection).","language":"en","author":[{"propositions":[],"lastnames":["Costin"],"firstnames":["Andrei"],"suffixes":[]},{"propositions":[],"lastnames":["Francillon"],"firstnames":["Aurelien"],"suffixes":[]}],"pages":"9","bibtex":"@article{costin_ghost_nodate,\n\ttitle = {Ghost in the {Air}({Traffic}): {On} insecurity of {ADS}-{B} protocol and practical attacks on {ADS}-{B} devices},\n\tabstract = {In this paper we investigate (in)security aspects of Automatic Dependent Surveillance-Broadcast (ADS-B) protocol. ADS-B is intended to be widely deployed in Air Traffic Management (ATM) Surveillance systems by 2020. One of the goals of ADS-B is to increase safety of air traffic. While the security of ADS-B was previously questioned, in this paper we demonstrate that attacks are both easy and practically feasible, for a moderately sophisticated attacker. Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying of injection).},\n\tlanguage = {en},\n\tauthor = {Costin, Andrei and Francillon, Aurelien},\n\tpages = {9}\n}\n\n","author_short":["Costin, A.","Francillon, A."],"key":"costin_ghost_nodate","id":"costin_ghost_nodate","bibbaseid":"costin-francillon-ghostintheairtrafconinsecurityofadsbprotocolandpracticalattacksonadsbdevices","role":"author","urls":{},"downloads":0,"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/21h","creationDate":"2020-05-22T18:11:30.348Z","downloads":0,"keywords":[],"search_terms":["ghost","air","traf","insecurity","ads","protocol","practical","attacks","ads","devices","costin","francillon"],"title":"Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","year":null,"dataSources":["NpxDwkFvCjNmGYFSj"]}