Performing Sniffing and Spoofing Attack Against ADS‐B and Mode S using Software Define Radio - volodymyr-sokolov/publications GitHub Wiki

Conference Paper

Mahyar TajDini , Volodymyr Sokolov , Pavlo Skladannyi

Abstract

This paper discusses the aviation Automatic Dependent Surveillance-Broadcast Vulnerabilities such as Sniffing and Spoofing over it with the help of Software Defined Radio (SDR) by looking at data frame structure and no encryption on this kind of message, we were able to capture 1090 MHz and 978 MHz signals and decoding them and gather all necessary information from it. Then we tried to have visual information by using Virtual Radar and online aviation databases. So we successfully could regenerate and encode messages with our data input and resend them at the same frequency as we captured 1090 MHz. That led us to a spoofing attack, which we could confirm by receiving our own generated messages. And in the end, we had an idea to use Long ShortTerm Memory (LSTM) neural network to detect such spoofing attacks.

https://ieeexplore.ieee.org/document/9716665 | 10.1109/UkrMiCo52950.2021.9716665

Keywords

ADS-B; Mode S; SDR; sniffing; software-defined radio; spoofing

SciVal Topics

Traffic Control; Deceleration; Network Security


Publisher

2021 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo)

29 November 2021 — 3 December 2021 Odesa, Ukraine

First Online: 24 February 2022


Indices

  • INSPEC: 21706827

  • KUBG: 40894


Cite

CEUR-WS

M. TajDini, V. Sokolov, P. Skladannyi, Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio, in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (2021) 7–11. doi: 10.1109/UkrMiCo52950.2021.9716665.

⚠️ **GitHub.com Fallback** ⚠️