Analysis of Message Attacks in Aviation Data-Link Communication
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information. Radio-transmitted information can be intercepted or tampered with, leading to the disclosure of private data, illegal control, and hijac...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8086144/ |
id |
doaj-4dc19eda30d3481eb9fb7f4976ea3f90 |
---|---|
record_format |
Article |
spelling |
doaj-4dc19eda30d3481eb9fb7f4976ea3f902021-03-29T20:32:43ZengIEEEIEEE Access2169-35362018-01-01645546310.1109/ACCESS.2017.27670598086144Analysis of Message Attacks in Aviation Data-Link CommunicationRu Zhang0Gongshen Liu1Jianyi Liu2Jan P. Nees3Information Secure Center, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, ChinaInformation Secure Center, Beijing University of Posts and Telecommunications, Beijing, ChinaSchool of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai, ChinaIn aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information. Radio-transmitted information can be intercepted or tampered with, leading to the disclosure of private data, illegal control, and hijacking. This paper analyzed three attack routes of monitoring, entity camouflage, and man-in-the-middle attack. Man-in-the-middle attack was also able to work in next generation aviation communication networks. Two viable experiments were designed to test data-link message attacks including information leakage and the entity camouflage attack. These experiments may also be used as penetration tests of secure of aviation communication system.https://ieeexplore.ieee.org/document/8086144/Message attackmonitoringentity camouflageman-in-the-middle (MITM)aviation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Ru Zhang Gongshen Liu Jianyi Liu Jan P. Nees |
spellingShingle |
Ru Zhang Gongshen Liu Jianyi Liu Jan P. Nees Analysis of Message Attacks in Aviation Data-Link Communication IEEE Access Message attack monitoring entity camouflage man-in-the-middle (MITM) aviation |
author_facet |
Ru Zhang Gongshen Liu Jianyi Liu Jan P. Nees |
author_sort |
Ru Zhang |
title |
Analysis of Message Attacks in Aviation Data-Link Communication |
title_short |
Analysis of Message Attacks in Aviation Data-Link Communication |
title_full |
Analysis of Message Attacks in Aviation Data-Link Communication |
title_fullStr |
Analysis of Message Attacks in Aviation Data-Link Communication |
title_full_unstemmed |
Analysis of Message Attacks in Aviation Data-Link Communication |
title_sort |
analysis of message attacks in aviation data-link communication |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
In aviation communication system, VHF data-link message is used to transmit flight status, airport control instructions as well as the other sensitive information. Radio-transmitted information can be intercepted or tampered with, leading to the disclosure of private data, illegal control, and hijacking. This paper analyzed three attack routes of monitoring, entity camouflage, and man-in-the-middle attack. Man-in-the-middle attack was also able to work in next generation aviation communication networks. Two viable experiments were designed to test data-link message attacks including information leakage and the entity camouflage attack. These experiments may also be used as penetration tests of secure of aviation communication system. |
topic |
Message attack monitoring entity camouflage man-in-the-middle (MITM) aviation |
url |
https://ieeexplore.ieee.org/document/8086144/ |
work_keys_str_mv |
AT ruzhang analysisofmessageattacksinaviationdatalinkcommunication AT gongshenliu analysisofmessageattacksinaviationdatalinkcommunication AT jianyiliu analysisofmessageattacksinaviationdatalinkcommunication AT janpnees analysisofmessageattacksinaviationdatalinkcommunication |
_version_ |
1724194560495583232 |