ADS-B serves as a widely adopted protocol in aviation systems, more specifically, among commercial aircraft, transmitting vital information to other aircraft and ground-based receivers. However, the absence of robust security measures and the transmission of unencrypted data render this information susceptible to unauthorized tampering. Exploiting this vulnerability, malicious actors can manipulate the location details within ADS-B transmissions over time, potentially resulting in deviating aircraft from their intended trajectory and even leading to dangerous collisions.
In this paper, we introduce a new approach to identifying instances of aircraft location drifting. Our proposed method capitalizes on the established geographical coordinates of ground-based receivers, randomly positioned across the landscape by a group of dedicated volunteers, who share their data for research purposes. By leveraging these receiver coordinates, we propose a methodology to estimate the anticipated flight path of an aircraft. This projected trajectory is subsequently cross-checked with the trajectory derived from the incoming ADS-B messages, which contain real-time flight data. By conducting this comparison, our method can detect deviations or inconsistencies between the computed expected trajectory and actual flight paths that are derived from the location information in ADS-B messages. This differential analysis enables the prompt identification of potential aircraft trajectory deviating attempts. By integrating receiver-based trajectory estimation and real-time ADS-B data analysis, our approach contributes to enhancing aviation security and safeguarding against potential threats to the integrity of flight information. Our results indicate that our prediction method is valuable, but further improvements in its accuracy are necessary for it to be effectively used as a security validation approach against attacks.
Automatic Dependent Surveillance-Broadcast (ADS-B) is an air surveillance technology that uses GPS to determine an aircraft’s position and then broadcasts this information to air traffic control (ATC) and other aircraft [FAA 2023]. In contrast to conventional ground-based radar, ADS-B offers enhanced accuracy and reliability in surveillance. Considering the advantages, e.g., safety, efficiency, and cost reduction, this surveillance technology has been widely adopted around the world [FAA 2018; EASA 2018]. Although ADS-B provides many benefits, its security is susceptible to various attacks because of its open design, where messages are transmitted without encryption. Researchers have unveiled several attack vectors on the ADS-B system, revealing vulnerabilities such as spoofing, flooding, jamming, virtual trajectory modification, and man-in-the-middle attacks [Schäfer et al. 2013; Strohmeier et al. 2014; Costin and Francillon 2012; Khandker et al. 2022]. The lack of robust security measures and privacy safeguards, (e.g., encryption, authentication) in the ADS-B protocol creates these vulnerabilities, which then allow attackers to intercept broadcasted messages and manipulate them with the intention of diverting an aircraft’s navigation information (e.g., latitude, longitude, altitude, etc.) from its intended path to an alternate trajectory. Such an attack holds the potential to deviate other aircraft from their intended trajectory and could even lead to dangerous collisions between aircraft. To prevent such attacks, various solutions have been proposed, encompassing cryptographic measures and location-verification techniques [Wu et al. 2020; Zha et al. 2020; Jansen et al. 2021]. However, implementing cryptographic solutions may entail a comprehensive overhaul of the existing ADS-B protocol, posing significant implementation and realization challenges. Conversely, many current location verification methods, such as MLAT [Mantilla-Gaviria et al. 2015], necessitate the reception of messages by four or more sensors, a condition that proves challenging to meet. While alternative verification methods [Schäfer et al. 2015; Strohmeier et al. 2015; Schäfer et al. 2016; Moser et al. 2016; Strohmeier et al. 2018; Strohmeier et al. 2023] have been suggested, they often fall short of providing a comprehensive predictive solution that addresses challenges like the number of receptions, altitude considerations, and other pertinent factors. Consequently, there persists a demand for novel prediction methods that can tackle existing challenges without requiring modifications to the ADS-B protocol.
In this paper, we introduce a novel location-prediction approach based on the intersecting coverage areas of receiving sensors. When a specific set of sensors receives a message, our methodology involves identifying the intersection area of this sensor set, and the predicted location is then situated within that determined area. The challenge lies in the selection of this location and determining the parameters crucial for enhancing prediction accuracy.
The primary objectives of this research are as follows:
Accurate Trajectory Derivation: We seek to establish trajectory estimation based on the coordinates provided by ADS-B receivers and information from aircraft signals, such as its time of arrival (ToA) and received signal strength (RSS). Furthermore, we aim to quantify the difference between the trajectory estimation and the trajectory as received.
Accuracy of Attack Detection: We explore how accurately we can detect location-drift attacks using the trajectory estimation method. We discuss and analyze how we can improve the detection process of the attacks. We provide first results, but acknowledge that further improvement is needed by including more data to enhance the prediction result.
ADS-B is an evolving air-surveillance technology with a broad range of potential applications. It has significantly enhanced air traffic management and safety by providing real-time aircraft tracking data. Nevertheless, the emergence of security issues [Costin and Francillon 2012; Strohmeier et al. 2014; Khandker et al. 2022] has raised concerns, leading to various proposed solutions. These solutions primarily fall into two categories: broadcast authentication methods and location verification methods. In the broadcast authentication method, the authenticity and integrity of ADS-B messages are ensured through digital signatures or message authentication codes (MAC) [Wu et al. 2020; Kacem et al. 2015]. Additionally, lightweight encryption techniques, such as Format-preserving Feistel-based encryption (FFX), have been suggested as part of these security solutions [Yang et al. 2019]. However, all these broadcast authentication methods require either adding extra information or changing the current message format, which may introduce complexities and compatibility challenges. On the other hand, location verification methods do not require any modification to the existing ADS-B message format. The latter method focuses on independently verifying the reported location of aircraft using various techniques such as multilateration, time difference of arrival (TDOA), triangulation, secure track verification, secure motion verification using doppler effect, and cross-referencing with different sensor data.
The authors of [Strohmeier et al. 2018] argue that current state-of-the-art methods of aircraft localization such as multilateration are insufficient, in particular for modern crowdsourced air traffic networks with random, unplanned deployment geometry. They utilized a combination of the k-nearest neighbor (kNN) algorithm and the expected TDOA of a received signal between multiple sensors to estimate signal’s origin. During the training phase, the expected TDOAs for each position for the given sensor deployment are measured. At the verification time for each ADS-B signal, the k-NN of the messages’ TDOAs looked up. These neighboring points are then averaged to produce the final estimate of the sender’s location.Their experimental result showed that grid-based k-NN approach can increase the effective air traffic surveillance coverage compared to multilateration by a factor of up to 2.5. In [Yang et al. 2021], the authors proposed a similar scheme called AEALV. This approach leverages a grid to train a kNN regression model by constructing a rectangular grid plane and then dividing it into a large number of squares. Each square is assigned a TDOA vector called a fingerprint, which serves as a unique identifier. When an aircraft claims its location, AEALV first checks if the claimed location is within the airspace. If it is, AEALV then finds the k nearest grid squares to the claimed location. Once the k nearest grid squares have been identified, AEALV calculates the average of the fingerprints of the k nearest grid squares to estimate the aircraft’s actual location.
In [Strohmeier et al. 2015], a TDOA-based lightweight location verification method was proposed. In this method, TDOAs between at least two sensors that received the message are collected and used to verify the claimed position of the signal. In [McDougall et al. 2023], a similar method was used, incorporating geospatial indexing, where the sensor’s receiving range is measured first. Then, for a given ADS-B message, it is determined whether the received signal’s coordinates are within the range. If so, the ADS-B signal is classified as legitimate; otherwise, it is not. Using timestamps in the ADS-B message for location verification was first proposed in [Schäfer et al. 2015]. According to them, for a spoofed signal claiming a false location, propagation delays to different verifiers would not satisfy the expected geometric relationships of the legitimate signal sources, thereby revealing the spoofing attempt. Later, in [Kim et al. 2016], a time-based location verification method called ADS-BT has been proposed. The authors suggest including an 8-bit timestamp in the ADS-B packet. This enables the determination of the distance between the sender and receiver through two methods: firstly, by the time difference, and secondly, by coordinate distance. In the event of spoofing, these two values will mismatch.
We consider active attacks where the attacker manipulates ADS-B messages, impersonates legitimate senders, and broadcasts ADS-B messages with spoofed locations to divert the aircraft from its main trajectory. We assume that the attacker cannot change which receivers should receive a message; they can only spoof the location information as part of a spoofed message.
The attacker may be stationary or mobile. We consider two cases: (1) Stationary Attacker: The attacker remains in a fixed location and attempts to spoof messages within their range; in this case, the attacker’s goal is to spoof the location of aircraft passing through the area covered by the attacker. (2) Mobile Attacker: The attacker is moving, using a ground vehicle (e.g., a car) or drone that moves at a speed different from the aircraft, or is on the same aircraft, moving at the same speed as it. Given an attacker with the described capabilities, we consider two categories of location-drifting attacks:
Random Drifter Attack: The adversary introduces random and unpredictable deviations from the original flight path.
Targeted Precision Drifter Attack: The attack starts from the actual location of the aircraft and makes the calculated location gradually drift away from the actual aircraft flight path. This type of attack involves precise planning by the attacker to execute subtle alterations that minimize the likelihood of detection.
Our approach for identifying location-drifting attacks relies on the geographical positioning of receivers on the ground. Messages transmitted from aircraft are picked up by a group of sensors positioned within the aircraft’s Line of Sight (LoS) at the time of message transmission. Each of these sensors is capable of receiving messages originating from various locations.
The methodology we propose for detecting location-drifting attacks is structured into three key phases:
Phase 1: Deriving Sensor Coverage and Sensor Locations: In the initial step, we determine the coverage area of each individual sensor based on the data received by these sensors.
We process and assess approximately 3 million messages extracted from OpenSky data [Schäfer et al. 2014]. Each message contains essential data, including the aircraft’s geographic coordinates (latitude and longitude), the list of sensors (receivers) that received the message, the arrival time, and the received signal strength at each receiver.
From this data, we extract the locations in received ADS-B messages per sensor and ultimately create the coverage area for each sensor. The convex hull of a set of locations is the smallest convex polygon that contains all the locations in . Let be the set of locations detected by sensor . We refer to the convex hull of by We presume that the sensors exhibit a spherical coverage pattern, with their locations centralized within this area.
Phase 2: Predicting Aircraft Location: Next, we use the sensor coverage information obtained in the first step to predict the aircraft’s location.
For each received message, we compile a list of sensors that received that message and determine the intersection area of these sensor coverage boundaries. From this area, we derive the predicted aircraft location. To predict the aircraft location, we explore two methods and evaluate their accuracy:
Central Localization: This method involves identifying the central point of the intersection area, without considering other factors. Assume the message was received by a set of sensors and each sensor is located at coordinates . Each sensor has a boundary or coverage area, and the intersection area of all boundaries is defined as: where is a polyshape (polygon) with vertices for each sensor in :
Let be the set of vertices defining the boundary of the intersection area . The central point of the intersection area is the centroid of the polygon defined by . If , the centroid coordinates are calculated as:
Weighted Localization: In this method, we establish a mesh network that represents a grid of potential locations:
To enhance the accuracy of our predictions, we leverage available data, including ToA and RSS for each message received by every receiver in our sensor network. We take these parameters into account to assign weights to individual points within the grid. Let be the Time of Arrival and be the Received Signal Strength for the message received by sensor . We order the receivers based on their ToA or RSS values. Let be the coordinates of the first receiver in the ordered list, we call this receiver the reference sensor. Then we assign a weight to each potential location using the weight function : where is the Euclidean distance from each potential location in the grid to the reference sensor :
We factor in the distance from a reference sensor. The reference sensor’s proximity to the message source enhances the accuracy of our calculations. The location with the highest weight is selected as the final predicted location of the aircraft.
This method for location prediction focuses on leveraging multiple data sources and refining the results based on specific criteria, making it a valuable component of our location-drifting attack detection system. We emphasize that while this method holds significant promise, it may require additional testing and refinement to reach its full potential.
Comparing the results of these two methods is crucial to determining the most accurate approach for predicting aircraft locations, which, in turn, is vital for robust location-drifting attack detection. As we will demonstrate in Section 4.4, the Central Localization method does not consistently provide accurate predictions because the same set of sensors receiving the message at different times would yield the same location, irrespective of other criteria (like the arrival time, distance from receivers, and density of the receivers). So the Weighted Localization method is a better choice.
Phase 3: Cross-Verifying Location Data: Finally, we cross-check the calculated aircraft location with the received location data by using two distinct evaluation methods: Trajectory-based Evaluation and Point-based Evaluation,
Trajectory-based Evaluation:
We begin by observing trajectories for all aircraft in the designated area, relying on received locations from ADS-B receivers. We analyze approximately 3 million messages from ADS-B, we observe 1661 distinct trajectory that are received by 45 sensors. Concurrently, we construct the expected trajectory for each aircraft based on the set of receivers capturing broadcast messages. The Fréchet distance serves as a metric to quantify the similarity between these two trajectories. A Fréchet distance of zero implies identical trajectories, while higher values indicate increasing dissimilarity, tailored to the specific application [Buchin et al. 2008].
Point-based Evaluation:
Our second evaluation focuses on assessing the standard deviation of the Haversine distance between actual and predicted locations. Pairwise comparisons of individual locations quantify their spatial separation, and the average deviation across the entire trajectory is determined.
Given two trajectories, (Received from ADS-B message) and (Computed or predicted), each with coordinates for the -th point. We calculate the Haversine distance between each two points (locations), using the following formula:
where:
is the Haversine distance.
is the Earth’s radius (mean radius = 6371 km).
and are the latitudes of the two points in radians.
and are the longitudes of the two points in radians.
utilizing this comparison to identify and flag any suspicious or anomalous activities that could indicate a potential attack.
Each ADS-B receiver captures messages from aircraft within its range. The range of ADS-B reception can vary widely depending on the specific circumstances and equipment involved. Generally, ADS-B signals are designed for line-of-sight communication, and their effective range can extend up to several hundred nautical miles. However, several factors can influence the actual range, like the altitude of the receiver, the sensitivity of the receiver, and potential obstructions on the way from the aircraft to that receiver.
To assess the actual coverage of these receivers, we gathered one day’s worth of ADS-B data for the geographic region between the range of 44 to 56 latitudes decimal degrees and 1 and 20 longitudes decimal degrees. Analyzing 3 million ADS-B messages received by 45 sensors in this area, we organized the data into clusters based on the receptors. The intersection area of all observed sensors in this region was then determined.
In Figure 7, the coverage area of a set of sensors is illustrated. Notably, receivers may sporadically receive data from distant areas, prompting us to normalize the data and eliminate outlier points for greater precision. Figures 2, 4, and 6 depict the coverage after this normalization process and the removal of outliers from these sensors.
Given our primary focus on sensor location, position accuracy becomes a pivotal factor in achieving precise location estimates. The challenge arises when attempting to acquire the location data for ADS-B receivers. The OpenSky network provided a sample of receiver names and their locations, shared by users themselves, lacking a ground truth for location accuracy.
To address this, we explored estimating receiver locations based on the obtained coverage areas of the convex hull in Section 3.2 and gauged the disparity between estimated and actual locations. Assuming the coverage forms a circular area with the sensor’s location at its center, our initial observation yielded estimates within a standard deviation of 50 km from the actual location. Furthermore, our approach of getting the center of the convex hull of all messages that have been received by that sensor demonstrates commendable accuracy when considering all the available sensors. Figure 10 illustrates the heatmap of the haversine distance between the actual locations and the computed locations using our method. In Figure 8, the distances between each pair of sensors based on the locations received from OpenSky are depicted. The diagonal holds particular significance in this context, representing pairwise distances; the blue color indicates shorter distances, while red signifies greater distances. The diagonal, being the distance of a sensor location from itself, is zero, and we include it in the plot to showcase the disparity between the ideal scenario and the computed distances. This disparity is visualized in Figure 9, where the diagonal exhibits a slight difference from the optimal one, depicted with blue shades in distance.
As sensor location is crucial in our prediction, especially in our weighted localization method, we observed the error distribution of our sensor location estimation method (Figure 14). However, the results are not optimized, and other techniques like SkyPos [Lizarribar et al. 2024] can achieve much better accuracy. We are still willing to explore other methods that can overcome challenges such as time drifting and offsets in the Time of Arrival (ToA) of the received messages by the receivers. Figure 19 visually represents the locations of a set of sensors alongside the estimated positions. Notably, the estimated positions closely approximate the actual ones. This suggests the potential for developing a method to derive locations based on coverage data rather than relying on users to provide location information. It is worth noting that some users regard their receiver locations as private, emphasizing the need for alternative methods. While our intent is not to compromise privacy, this underscores the feasibility of deriving locations in scenarios where such information is unavailable or lacks ground truth for reliable foundation.
As the aircraft moves from its origin to its destination, it traverses a series of sensors along its route. When a sensor falls within the line of sight of the aircraft, it begins receiving location data, losing contact as the aircraft moves beyond the transmission range. In light of this, we capture the appearance pattern of sensor interactions along the aircraft’s path. By analyzing this pattern, we aim to see observable indications that can subsequently enhance the accuracy of our aircraft location predictions.
As illustrated in Figure 24, the sensor patterns are depicted for four distinct trajectories. The figure delineates the aircraft’s entry into the coverage area of a particular sensor and its departure from that region over time. Analyzing these patterns provides insights that can be leveraged to enhance prediction accuracy. For instance, monitoring the appearance and disappearance of sensors along the aircraft’s trajectory over time can reveal patterns that provide information about the estimated trajectory. Initially, this enhances the accuracy of the expected trajectory and subsequently improves the precision of attack prediction.
We construct the anticipated trajectory after receiving a set of messages and subsequently determine its distances from the received trajectory. This process allows us to measure the accuracy of the derived trajectory and establish threshold values and error margins.
Ensuring prediction accuracy is crucial for later attacker detection, particularly in the context of smart drifter attackers. Our approach involves cross-checking received and predicted locations, and evaluating their proximity through two distinct measures:
Trajectory-based Evaluation:
In our ADS-B application, we observed a maximum coupling measure of 17 for entirely different trajectories. A coupling measure close to zero suggests trajectory similarity, while a value near 17 indicates dissimilarity. Spotted results reveal a coupling measure of 0.8 for the central localization method, with the weighted localization method yielding improved results by reducing the coupling measure to 0.4.
Point-based Evaluation:
The Central Localization method yields a standard deviation of 20 km, while the weighted localization method demonstrates a slight improvement with an standard deviation of 19 km. Although the difference is modest, the weighted localization method holds potential for enhancement, given its reliance on a grid of points rather than a singular central point.
These evaluations collectively contribute to the refinement of our prediction methods, with a focus on enhancing accuracy for effective attacker detection. Figure 29 illustrates the error distribution of our localization approach using point-based evaluation. Figures 25 and 26 depict the variance in distance between the reported and estimated locations for entire trajectories using the Central and Weighted Localization methods, respectively. Since this evaluation focuses on individual points, we combined all received locations to derive the overall error distribution based on the two localization methods, which are reflected in Figures 27 and 28. Table 1 summarizes the comparison between the two proposed methods.
Trajectory based | Point based | |
---|---|---|
Central Localization Method | 0.8 (Coupling Measure) | 20 km |
Weighted Localization Method | 0.4 (Coupling Measure) | 19 km |
The proposed approach involves estimating the predicted location and subsequently cross-referencing it with the received location to assist in whether the location within the ADS-B message has been altered. The predicted value serves as an indicator of the effectiveness of this approach in identifying potential attackers.
The attacker’s location is a key factor in this context. The attacker may eavesdrop on communication between the aircraft and ground sensors, modify the location, and then re-transmit the new message. Several considerations arise:
The attacker cannot change which sensor receives the message; their manipulation is confined to modifying the location and re-transmitting the message.
Detecting a stable attacker becomes more straightforward as the aircraft moves and encounters different sets of sensors along its route. A stable attacker, however, will consistently involve the same set of receivers receiving the message, providing an opportunity for a better detection process by emphasizing sensor diversity across the trajectory. This is because as the aircraft moves, sensor coverage changes, making it difficult for the stable attacker to consistently target the same aircraft.
If the attacker is mobile on the ground via a terrestrial vehicle, tracking its speed may not match the aircraft’s speed. Detection might take longer, but it will eventually occur as the aircraft enters different geographical zones.
An attacker on the same aircraft, moving at the same speed, relies on the attacker’s ability to modify packets within the aircraft and her speed to modify the location.
As the current accuracy of our method hovers around 20 km for both prediction methods, We cannot use these results for attack detection at this moment, as more accurate predictions are required. However, we demonstrate that our approach introduces a new method of detection that is worth considering. Ongoing efforts focus on refining accuracy, consolidating results, and exploring early-stage detection capabilities for subtle drifting scenarios.
Precise Location: The accuracy of our method hinges on the precise locations of sensors, particularly for method two. However, obtaining the ground truth for these locations poses a significant challenge. Some owners of ADS-B receivers consider this information private, which hinders our access to this crucial data. We managed to obtain the location of a limited set of existing receivers from the OpenSky network, though without knowledge of the owners’ identities. The accuracy of these shared locations remains uncertain, as it depends on the owners’ willingness to disclose accurate information, leaving us without a reliable ground truth for these locations.
Our goal is to utilize the coordinates of ADS-B ground receivers to formulate an anticipated aircraft trajectory, allowing for a comparison with the trajectory derived from received data.
Ironically, increasing the number of receivers results in a smaller area of intersection which enhances the precision of trajectory estimation. However, this depends on how the receivers are spread and placed on the ground. Relying solely on the set of locations where sensors receive messages proves insufficient for attaining high accuracy.
To enhance prediction accuracy and overcome the challenges discussed, it becomes imperative to consider additional parameters, like sensor pattern, sensor ranking, ToA, and signal propagation speed. Future efforts will involve analyzing the impact of these parameters on prediction accuracy, with the aim of improving the success rate of attack detection.
Our primary focus in this work is on presenting the prediction concept and assessing potential ways for accuracy enhancement and we are not actively conducting the attack. This phase of the research is preliminary, and our emphasis is on refining accuracy and evaluating the resilience of the proposed method against the outlined attacks. Future work will involve further testing and validation to ensure the robustness of the approach in the face of potential attacks.
The inherent openness of ADS-B messages renders them susceptible to various forms of drifting attacks. Consequently, there is a pressing need to either safeguard against or identify such attack vectors. In this study, we introduce a novel approach that involves cross-verifying the received location extracted from ADS-B messages with the predicted location generated by our methodology.
Our prediction technique is built on the premise that the message is received by a set of receivers whose coverage areas intersect. As a result, the predicted location should fall within this intersecting region. Two distinct prediction methods have been put forth: the central localization method and the weighted localization method. While the latter exhibits greater accuracy, there remains a requirement to enhance the precision of both methods by incorporating additional parameters. Our forthcoming efforts will focus on analyzing the impact of these parameters, to refine prediction accuracy and fortify the overall attack detection process.
To ensure the reproducibility of our results, we provide the complete codebase and information about the dataset used in this study. The code, written in Matlab, is fully documented and includes detailed instructions for installation and usage. We have utilized OpenSky data, which is freely available online for researchers. The dataset can be downloaded from the OpenSky website (https://opensky-network.org/). For our test, we used these data, which are available for download . However, information about sensor locations was shared with us privately upon request, and we received sample data to test our approach. Additionally, we provide the exact functions and evaluation tests used in our experiments. The code is available for download in the GitHub repository (https://github.com/afd1479/OpenSky2023). All scripts necessary to reproduce the figures presented in this paper are included.