Vulnerability of Radar Protocol and Proposed Mitigation
DOI:
https://doi.org/10.13052/jicts2245-800X.414Keywords:
Air traffic control, Radar, Transport protocol, Vulnerability, MitigationAbstract
The radar system is extremely important. Each government must ensure the safety of passengers and the efficiency of the system. This is why it has to be considered by suitable and high-performance professionals. In this paper, we have focused on the analysis of a protocol used to carry the information of the different flight parameters of an aircraft from the radar sensor to the operation center. This protocol has not developed any security mechanism which, itself, constitutes a major vulnerability. Every country in the world is going down this road, relying just on the security provided by other layer connections that could mean a step forward but definitely still not enough. Here we describe different parts of the protocol and the mitigation politics suggested to improve the security level for such an important system.
Downloads
References
Mathias, A., Heß, M. (2012). “Machine-Readable Encoding Standard Specifications in ATC,” in Proceedings of the IEEE – Digital Communications – Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV), 2011, Tyrrhenian International Workshop.
Schneier, B. Schneier on Security. Available at: https://www.schneier.com
Hunt, C. (1997). “TCP/IP Network Administration”. Sebastopol, CA: O’Reilly & Associates.
Brent Chapman, D. and Zwicky, E. D. (1995). “Building Internet Firewalls”. Sebastopol, CA: O’Reilly & Associates.
DEFCON. DEFCON Conferences. Available at: https://www.youtube.com/channel/UC6Om9kAkl32dWlDSNlDS9Iw
EUROCONTROL-European Organization for the Safety of Air Navigation. Asterix protocol. Available at: https://www.eurocontrol.int/asterix
Ministerio de Defensa de España. Ciberseguridad: Retos y amenazas a la seguridad Nacional en el Ciberespacio. http://bibliotecavirtualdefensa.es/BVMDefensa/i18n/catalogo_imagenes/grupo.cmd?path=17029
Milw0rm Hacker Group. W4rri0r. Available at: http://www.w4rri0r.com/
Samineni, N. R., Barbhuiya, F. A., and Nandi, S. (2012). “Stealth and Semi-Stealth MITM Attacks, Detection and Defense in IPv4 Networks,” in Proceedings of the IEEE – Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference.
RenderMan. RenderLab. Available at: http://renderlab.net/
Chen, Z., Guo, S., Zheng, K., and Yang, Y. (2007). “Modeling of Man-in-the-Middle Attack in the Wireless Networks,” in Proceedings of the IEEE – Wireless Communications, Networking and Mobile Computing, 2007. WiCom2007. International Conference.
ADS-B Technologies Website. Available at: http://www.ads-b.com/
ADS-B and Asterix application for Eda. Availble at: http://era.aero/technology/ads-b-2/