8th Sem Tech Sem...
8th Sem Tech Sem...
CHAPTER 1
INTRODUCTION
In this section, we formalize the system model, present a realistic threat model by
identifying various kinds of attacks, and define our design goals. System model .As
illustrated in Fig.1, our system model is abstracted from key components of general ADS-B
systems, where aircraft determine their own positional information obtained from the global
navigation satellite system such as GPS. Transponders continuously broadcast ADS-B
messages, including position, velocity, intent etc.
Increase the reliability of the unmanned aerial system (UAS) networks and mitigate
the effect of jamming attacks on these systems.
Analyze formally the security of our schemes, comprehensively achieving the
confidentiality and authenticity.
Performance evaluation of approaches by conducting simulations in
embedded devices and desktop computers respectively.
CHAPTER 2
LITERATURE SURVEY
Addressed security issues for the real ADS-B system and presented a complete
cryptographic solution to comprehensively ensure the privacy and integrity of ADS-B
messages.
Establishing more security for the wireless communication.
Detecting cyber attacks and ensuring security.
Tracking location of the aircraft.
Detecting jamming attack.
CHAPTER 3
SYSTEM DEVELOPMENT
ADS-B, which consists of two different services, "ADS-B Out" and "ADS-B In", could
replace radar as the primary surveillance method for controlling aircraft. ADS-B is an integral
component of the Next-Gen national airspace strategy for upgrading and enhancing aviation
infrastructure and operations, the ADS-B system can provide traffic and government-generated
graphical weather information at no cost through TISB and FIS-B applications. ADS-B enhances
safety by making an aircraft visible, real-time, to air traffic control (ATC) and to other
appropriately equipped ADS-B aircraft with position and velocity data transmitted every second.
ADS-B data can be recorded and downloaded for post-flight analysis. ADS-B also provides the
data infrastructure for inexpensive flight tracking, planning, and dispatch.
Using "ADS-B Out", each aircraft periodically broadcasts information about itself, such
as identification, current position, altitude and velocity, through an onboard transmitter. ADS-B
Out provides air traffic controllers with real-time position information that is, in most cases,
more accurate than the information available with current radar-based systems. With more
accurate information, ATC will be able to position and separate aircraft with improved precision
and timing.
"ADS-B In" is the reception by aircraft of FIS-B and TIS-B data and other ADS-B data
such as direct communication from nearby aircraft. The ground station broadcast data is typically
only made available in the presence of an ADS-B Out broadcasting aircraft, limiting the
usefulness of purely ADS-B In devices.
The dataset is composed of a high number of received ADSB messages from which a
number of features are extracted. The dataset is built in the presence and absence of the jamming
signals to account for the fake and legitimate portions of the dataset.
CHAPTER 4
SYSTEM DESIGN
The purpose of the design phase is to plan a solution of the problem specified by the
requirements document. This phase is the first step in moving from the problem domain to the
solution domain. The design of a system is perhaps the most critical factor affecting the quality
of the software; it has a major impact on the later phases particularly testing and maintenance.
The design activity often results in three separate outputs –
Architecture design.
High level design.
Detailed design.
Architecture Design:
In high level design identifies the modules that should be built for developing the system
and the specifications of these modules. At the end of system design all major data structures,
file format, output formats, etc., are also fixed. The focus is on identifying the modules. In other
words, the attention is on what modules are needed.
Detailed Design:
In the detailed design the internal logic of each of the modules is specified. The focus is
on designing the logic for each of the modules. In other words how modules can be implemented
CHAPTER 5
SYSTEM IMPLEMENTATION
Logistic Regression: Logistic Regression is the method of classifying data into two
classes using a sigmoid (logistic) function, which is limited to values between 0 and 1. This
method typically states where the boundary between the classes exists and determines the class
probabilities. The classification is based on the use of one or several predictors.
Support Vector Machine: This algorithm calculates the similarity between the trained data
and new data. Different similarity kernels can be used. In binary classification problems, SVM
divides the data into two classes by making a hyper plane between the data. SVM aims to
maximize the distance of this hyper plane with the data classes to separate the data.
k-Nearest Neighbor: The kNN algorithm works by looking at the nearest trained dataset
points to the new data point [28]. It uses the idea that the points with similar properties stay in
close proximity of each other.
Decision Tree: This algorithm is composed of a tree in which each node represents a feature
and each leaf denotes an outcome. The connections of the input nodes and the resulted outcomes
are done via tree branches.
CHAPTER 6
The goal is to maximize the accuracy and probability of detection while minimizing the
probability of false alarm. The accuracy of the kNN algorithm as a function of the number of
neighbors when different distance metrics are used. The distance is calculated using three
methods: Euclidean, Chebyshev, and Mahalanobis. The number of neighbors analyzed range
from 1 to 40. After a certain number of neighbors, the accuracy does not significantly change
when the number increases. Mahalanobis distance metric provides the best performance
compared to the other distance metrics and degrades the least overall as more neighbors are used
to calculate distances. With a number of neighbors equal to 1, the Mahalanobis distance
algorithm can achieve the highest accuracy.
CONCLUSION
REFERENCES
[2] M. Strohmeier, V. Lenders, and I. Martinovic. "On the security of the automatic dependent
surveillance-broadcast protocol." IEEE Communications Surveys & Tutorials 17, no. 2, pp.
1066-1087, 2015.
[3] A. Costin and A. Francillon. "Ghost in the Air (Traffic): On insecurity of ADS-B protocol
and practical attacks on ADS-B devices." Black Hat USA, pp. 1-12, 2012.
[4] H. Reyes, Hector, N. Kaabouch, W. Semke, and S. Salle, "Fuzzy logic method for link loss
detection during unmanned aerial vehicle flights," In Infotech@ Aerospace, p. 2574. 2012.
[5] K. Grover, A. Lim, and Q. Yang, "Jamming and anti–jamming techniques in wireless
networks: a survey," International Journal of Ad Hoc and Ubiquitous Computing 17, no. 4,
pp.197-215, 2014. [5] M. Schäfer, V. Lenders, and I. Martinovic. "Experimental analysis of
attacks on next generation air traffic communication." In International Conference on Applied
Cryptography and Network Security, pp. 253-271, 2013.
[6]Johansson, Ronnie, Peter Hammar, and Patrik Thorén. "On simulation based adaptive UAS
behavior during jamming." In Research, Education and Development of Unmanned Aerial
Systems (RED-UAS), 2017 Workshop on, pp. 78-83. IEEE, 2017