Enhancing the security of aircraft surveillance in the next generation air traffic control system

https://doi.org/10.1016/j.ijcip.2013.02.001Get rights and content

Abstract

The U.S. air traffic control system is reliant on legacy systems that artificially limit air traffic capacity. With the demand for air transportation increasing each year, the U.S. Federal Aviation Administration has introduced the Next Generation (NextGen) upgrade to modernize the air traffic control system. Automatic Dependent Surveillance-Broadcast (ADS-B), a key component of the NextGen upgrade, enables an aircraft to generate and broadcast digital messages that contain the GPS coordinates of aircraft. The incorporation of ADS-B is intended to provide enhanced accuracy and efficiency of surveillance as well as aircraft safety. The open design of the system, however, introduces some security concerns. This paper evaluates the limitations of the legacy systems currently used in air traffic control and explores the feasibility of employing format-preserving encryption, specifically the FFX algorithm, in the ADS-B environment. The ability of the algorithm to confuse and diffuse predictable message input is examined using message entropy as a metric. Based on the analysis, recommendations are provided that highlight areas which should be examined for inclusion in the ADS-B upgrade plan.

Introduction

Despite the economic turmoil in the United States and abroad, air travel and transportation have only seen modest drops in activity. The most recent U.S. Federal Aviation Administration (FAA) report [1] notes that civil aviation contributes $1.3 trillion annually to the national economy, earning upward of $397 billion or about 5.2% of the gross domestic product. The aviation industry generated more than 10 million jobs in 2009 alone and in excess of 730 million passengers utilized air travel in 2011. Additionally, 26 cargo-only carriers operate within the nation's airspace to transport freight and mail; UPS announced that its aircraft hauled an average of 2.2 million packages in 2012 [20]. The United States is so heavily reliant on the air transport industry that the Department of Homeland Security has identified aviation as a key component of the transportation critical infrastructure sector.

With the constant demand for faster travel and package delivery, the volume of air traffic is expected to increase considerably. In 2011, air traffic control centers handled 41.2 million aircraft, and this number is expected to increase by 50% over the next 20 years, significantly stressing the air traffic control system [7]. For reasons of efficiency and cost savings, flights are expected to bypass the established airline hubs around which the air traffic network is currently structured. The resulting concerns about air traffic safety have provided the impetus to adapt the air traffic network and upgrade legacy air traffic control systems under the Next Generation (NextGen) plan.

The proposed changes include the upgrade to the Automatic Dependent Surveillance-Broadcast (ADS-B) system. The upgrade, however, introduces potential network-wide vulnerabilities. This paper assesses the current state of the air traffic control system, identifies the security risks inherent in the ADS-B upgrade and evaluates a security solution designed to provide confidentiality for aircraft surveillance activities.

Section snippets

Background

The current air traffic control system is antiquated and is in need of an upgrade to meet the expected growth and safety considerations. This section evaluates the current state of the air traffic control system and discusses the FAA's NextGen plan and the associated vulnerabilities.

FFX algorithm

At this time, the National Institute of Standards and Technology (NIST) does not support any format-preserving encryption algorithms. However, the FFX algorithm was proposed to NIST in 2010, and is expected to be ratified although no published use cases currently exist. FFX stands for format-preserving (F), Feistel-based encryption (F) with multiple implementation variances (X) [1].

The FFX-A2 instantiation of FFX is specifically designed for binary strings of 8 to 128 bits. The parameters for

ADS-B application

The format of the airborne position message is shown in Fig. 3. The 112 bits (14 bytes) are divided into five fields: (i) downlink format (DF); (ii) capability (CA); (iii) address announced (AA); (iv) message extended squitter (ME); and (v) parity/identity (PI) [15]. The DF field describes the message format and, as the name implies, is coded as decimal 17 (10001 in binary). These bits must remain unencrypted so that each message may be identified as a position report. The other fields may be

Algorithm evaluation

The goal of encryption is to alter the plain text message in a predetermined manner, obfuscating the content by reducing the recognizable structure of the original message. This is accomplished by implementing confusion (i.e., altering the plain text in a complicated, seemingly unpredictable, manner) and diffusion (i.e., dissipating redundancies and distributing localized changes) [17], [18].

Entropy is often used in cryptography to quantify the uncertainty of a bit string. It indicates the

Conclusions

The experimental results presented in this paper suggest that a subset of the FFX-A2 algorithm is suitable for encrypting ADS-B messages, and provides sufficient diffusion and confusion to obfuscate inherently redundant message fields. Even with 12 of the 13 message bytes fixed, the entropy of the encrypted output indicates that the algorithm effectively obfuscates message content.

While the findings indicate that the FFX algorithm may be used to provide ADS-B message security, key management is

Acknowledgments

Note that the views expressed in this paper are those of the authors and do not reflect the official policy or position of the U.S. Air Force, U.S. Department of Defense or the U.S. Government.

References (22)

  • M. Bellare, P. Rogaway, T. Spies, The FFX Mode of Operation for Format-Preserving Encryption, Draft 1.1...
  • J. Black, P. Rogaway, Ciphers with arbitrary finite domains, in: Proceedings of the RSA Conference on Topics in...
  • A. Costin, Ghost in the air(traffic): On insecurity of the ADS-B protocol and practical attacks on ADS-B devices,...
  • P. Drouilhet, G. Knittel, V. Orlando, Automatic Dependent Surveillance Air Navigation System, U.S. Patent 5570095,...
  • Federal Aviation Administration, Automatic Dependent Surveillance-Broadcast (ADS-B) Out Performance Requirements to...
  • Federal Aviation Administration, FAA's NextGen Implementation Plan, Washington, DC,...
  • Federal Aviation Administration, FAA Aerospace Forecast Fiscal Years 2012–2032, Washington, DC,...
  • S. Henn, Could the new air traffic control system be hacked? National Public Radio, August 14,...
  • J. Jochum, Encrypted Mode Select ADS-B for Tactical Military Situational Awareness, Master's Thesis, Department of...
  • T. Judd, Automatic dependent surveillance data transfer, in: Proceedings of the AIAA/IEEE Eighth Digital Avionics...
  • D. Magazu, Exploiting the Automatic Dependent Surveillance-Broadcast System via False Target Injection, Master's...
  • Cited by (42)

    • Physical layer protection for ADS-B against spoofing and jamming

      2022, International Journal of Critical Infrastructure Protection
    • Facing airborne attacks on ADS-B data with autoencoders

      2021, Computers and Security
      Citation Excerpt :

      The secure broadcast authentication countermeasures aim to provide data authentication and integrity for the ADS-B protocol, meaning that the receiver of the ADS-B message will be able to confirm its origin and that it was not modified during transit. Such approaches include cryptography (Finke et al., 2013; Perrig et al., 2002), fingerprinting (Zeng et al., 2010) and spread spectrum techniques (Pöpper et al., 2009). However, the techniques in this group are considered to be the most difficult and costly to apply, since they require drastic modification of the current ADS-B system infrastructures (Manesh and Kaabouch, 2017).

    • Actual TDoA-based augmentation system for enhancing cybersecurity in ADS-B

      2021, Chinese Journal of Aeronautics
      Citation Excerpt :

      Numerous studies have been proposed to address ADS-B security issues. Some techniques use authentication/encryption.16–20 Cryptographic techniques require changing the ADS-B protocol, which results in major changes to the related fleet.

    • Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages

      2018, Computers and Security
      Citation Excerpt :

      The ability to exploit the ADS-B system endangers billions of passengers every year, and therefore there have been attempts by academia and industry to develop solutions that address the lack of security. Past research suggested the use of encryption (Finke et al., 2013), aircraft authentication via challenge-response (Kacem et al., 2015), and message authentication (Costin and Francillon, 2012; Feng et al., 2010), in order to provide secured message broadcasting and prevent eavesdropping. Besides securing broadcast communication, additional approaches focused on verifying velocity and location reports via additional sensors or nodes.

    View all citing articles on Scopus
    View full text