A METHOD ENCODING TRANSMITTED MESSAGES IN THE ADS-B SYSTEM USING A CELLULAR AUTOMATIC
Abstract
The purpose of the study is to develop a method for encoding of transmitted ADS-B messages between aircraft. The open format 1090ES of transmitted data is critical in terms of carrying out various types of attacks that can lead to a violation of the safety of aircraft operations. The work is aimed at using means of encoding and decoding messages with a private key. Research methods are based on the application and development of streaming data encryption using one-dimensional cellular automata. They operate as a generator of pseudo-random sequences that transform the elementary states of a cell of a one-dimensional cellular automaton based on typical hardware-oriented operations. The processes of encoding and decoding data fields are based on an analytical expression using typical logical operations (or, xor). This property allows parallel processing of message data fields. The result is the created method for ensuring the protection of transmitted data, additionally encoding on transmission and decoding on message reception. A distinctive feature of the method is the preservation of the protocol forma. The method uses a one-dimensional cellular automaton that encodes and decodes the target fields (coordinates, heading, etc.) using a pseudo-random number generator. The developed method belongs to the class of hardware-oriented methods. Critical for encoding and decoding properties of periodicity of data fields and key length are eliminated by choosing an initial irrational value and organizing the “streaming” work of the encoder. If the encoding automaton is running in streaming mode, the current value depends on the history of some depth, determining the length of the "automatic key" from the ADS-B message will be algorithmically impossible due to data loss. The linear complexity of the method allows you to perform transformations at the data rate. Conclusion: the development of hardware-oriented methods of data encoding makes it possible to increase the efficiency of using the ADS-B system by counteracting various types of destructive actions.
References
ekonomiki [Air transport in Russia in the context of the globalization of the world economy].
LAP LAMBERT Academic Publishing, 2015, 96 p.
2. Fal'kov E., Shavrin S. AZN-V i informatsionnaya bezopasnost' vozdushnogo dvizheniya
[AZN-V and information security of air traffic], Pervaya milya [The first mile], 2020, Vol. 90,
No. 5, pp. 50-56.
3. Rubtsov E.A., Kalintsev A.S., Grigor'eva E.I. Analiz linii peredachi dannykh avtomaticheskogo
zavisimogo nablyudeniya veshchatel'nogo tipa [Analysis of the data transmission line of automatic
dependent observation of broadcast type], Naukoemkie tekhnologii v kosmicheskikh
issledovaniyakh Zemli [High–tech technologies in space research of the Earth], 2018, Vol. 10,
No. 6, pp. 19-27.
4. Nikolaev K.A. Opisanie sistem avtomaticheskogo zavisimogo nablyudeniya-veshchaniya i ikh
preimushchestva pered radiolokatsiey [Description of automatic dependent surveillancebroadcasting
systems and their advantages over radar], Estestvennye i tekhnicheskie nauki
[Natural and technical sciences], 2018, No. 4, pp. 38-40.
5. Bol'shakov A.A. Metod raspoznavaniya ugrozy aviatsionnogo proisshestviya na baze
iskusstvennogo intellekta [The method of recognizing the threat of an aviation accident based
on artificial intelligence], Matematicheskie metody v tekhnike i tekhnologiyakh [Mathematical
methods in engineering and technology], 2017, Vol. 4, pp. 90-95.
6. Ying X. et al. Detecting ADS-B Spoofing Attacks using Deep Neural Networks, 2019 IEEE
Conference on Communications and Network Security, CNS 2019. Institute of Electrical and
Electronics Engineers Inc., 2019, pp. 187-195.
7. Schäfer M., Lenders V., Martinovic I. Experimental Analysis of Attacks on Next Generation
Air Traffic Communication, Lecture Notes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, Berlin, Heidelberg,
2013, Vol. 7954 LNCS, pp. 253-271.
8. McCallie D., Butts J., Mills R. Security analysis of the ADS-B implementation in the next
generation air transportation system,/ International Journal of Critical Infrastructure Protection,
2011, Vol. 4, No. 2, pp. 78-87.
9. Grover K., Lim A., Yang Q. Jamming and anti-jamming techniques in wireless networks:
A survey, International Journal of Ad Hoc and Ubiquitous Computing, 2014, Vol. 17, No. 4,
pp. 197-215.
10. Riahi Manesh M., Kaabouch N. Analysis of vulnerabilities, attacks, countermeasures and
overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system, International
Journal of Critical Infrastructure Protection, 2017, Vol. 19, pp. 16-31.
11. Bol'shakov A.A., Kulik A.A. Povyshenie bezopasnosti poleta vozdushnogo sudna s
ispol'zovaniem metodov iskusstvennogo intellekta [Improving the safety of aircraft flight using
artificial intelligence methods], Matematicheskie metody v tekhnike i tekhnologiyakh [Mathematical
methods in engineering and technology], 2019, Vol. 11, pp. 87-99.
12. Schäfer M., Lenders V., Martinovic I. Experimental Analysis of Attacks on Next Generation
Air Traffic Communication, Lecture Notes in Computer Science (including subseries Lecture
Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, Berlin, Heidelberg,
2013, Vol. 7954 LNCS, pp. 253-271.
13. Leonardi M., di Gregorio L., di Fausto D. Air Traffic Security: Aircraft Classification Using
ADS-B Message’s Phase-Pattern, Aerospace, 2017, Vol. 4, pp. 51.
14. Manesh M.R. et al. Performance Comparison of Machine Learning Algorithms in Detecting
Jamming Attacks on ADS-B Devices, 2019 IEEE International Conference on Electro Information
Technology (EIT). IEEE, 2019, pp. 200-206.
15. Kacem T. et al. ADS-B Attack Classification using Machine Learning Techniques, 2021 IEEE
Intelligent Vehicles Symposium Workshops (IV Workshops). IEEE, 2021, pp. 7-12.
16. Kondakov S.E., Rud' I.S. Model' protsessa provedeniya komp'yuternykh atak s ispol'zovaniem
spetsial'nykh informatsionnykh vozdeystviy [A model of the process of conducting computer
attacks using special information influences], Voprosy kiberbezopasnosti [Cybersecurity issues],
2021, No. 5 (45), pp. 12-20.
17. Fomichev V.M. Metody diskretnoy matematiki v kriptologii [Methods of discrete mathematics
in cryptology]. Moscow: MIFI, 2010, 424 p.
18. Shnayer B. Prikladnaya kriptografiya [Applied cryptography]. Moscow: Triumf, 2002, 816 p.
19. Staver E.V. Algoritm RSA. Shifrovanie i deshifrovanie tekstovykh soobshcheniy [The RSA
algorithm. Encryption and decryption of text messages], Nauchnyy aspect [Scientific aspect],
2012, No. 3, pp. 88-89.
20. Finke C., Butts J., Mills R. ADS-B encryption, Proceedings of the Eighth Annual Cyber Security
and Information Intelligence Research Workshop on - CSIIRW ’13. New York, New York,
USA: ACM Press, 2013, pp. 1.
21. Zhang J., Wei L., Yanbo Z. Study of ADS-B Data Evaluation, Chinese Journal of Aeronautics,
2011, Vol. 24, pp. 461-466.
22. Yang H. et al. A practical and compatible cryptographic solution to ADS-B security, IEEE
Internet of Things Journal. Institute of Electrical and Electronics Engineers Inc., 2019, Vol. 6,
No. 2, pp. 3322-3334.
23. Strohmeier M. et al. On the security of the automatic dependent surveillance-broadcast protocol,
IEEE Communications Surveys & Tutorials, 2015, Vol. 17, No. 2, pp. 1066-1087.
24. Sampigethaya K. et al. Future e-enabled aircraft communications and security: The next 20
years and beyond, Proceedings of the IEEE, 2011, Vol. 99, No. 11, pp. 2040-2055.
25. H. Ren H. et al. Querying in Internet of Things with privacy preserving: Challenges solutions
and opportunities, IEEE Network, 2018, Vol. 32, No. 6, pp. 144-151.
26. Sokolov A.V. Bystrodeystvuyushchiy generator klyuchevykh posledovatel'nostey na osnove
kletochnykh avtomatov [A high-speed generator of key sequences based on cellular automata],
Pratsі Odes'kogo polіtekhnіchnogo unіversitetu [Proceedings of Odessa Polytechnic University],
2014, Vol. 1, No. 43, pp. 180-186.
27. Wolfram S. Random sequence generation by cellular automata, Advances in Applied Mathematics,
1986, Vol. 7, No. 2, pp. 123-169.
28. Cook E. ADS-B, Friend or Foe: ADS-B Message Authentication for NextGen Aircraft, 2015 IEEE
17th International Conference on High Performance Computing and Communications, 2015 IEEE
7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International
Conference on Embedded Software and Systems. IEEE, 2015, pp. 1256-1261.