Secondary Surveillance Radars are Air Traffic Control systems used to obtain identity and altitude of the cooperative airplanes and, together with the Primary Radar, allow a safe air traffic flow. The Secondary Surveillance Radar protocol is also used for Traffic Alert and Collision Avoidance System and Automatic Dependent Surveillance Systems: In these applications, the aircraft transmit their own information (identity, position, velocity etc.) to any equipped listener for anti-collision and surveillance scope without the interrogation of the SSR Radar. The simple Secondary Surveillance Radar protocol doesn't provide any kind of authentication and encryption, making it vulnerable to many types of cyber-attacks. In the paper, it is proposed the use of the airplane/transmitter carrier phase as a feature to perform a classification of the aircraft and, therefore, distinguish legitimate messages from fake ones. The feature extraction process is described and different classification methods are tested by the use of real data
Leonardi, M., Di Fausto, D.d. (2018). Secondary surveillance radar transponders classification by RF fingerprinting. In Proceedings International Radar Symposium (pp.1-10). IEEE [10.23919/IRS.2018.8448244].
Secondary surveillance radar transponders classification by RF fingerprinting
Leonardi M.
;
2018-06-01
Abstract
Secondary Surveillance Radars are Air Traffic Control systems used to obtain identity and altitude of the cooperative airplanes and, together with the Primary Radar, allow a safe air traffic flow. The Secondary Surveillance Radar protocol is also used for Traffic Alert and Collision Avoidance System and Automatic Dependent Surveillance Systems: In these applications, the aircraft transmit their own information (identity, position, velocity etc.) to any equipped listener for anti-collision and surveillance scope without the interrogation of the SSR Radar. The simple Secondary Surveillance Radar protocol doesn't provide any kind of authentication and encryption, making it vulnerable to many types of cyber-attacks. In the paper, it is proposed the use of the airplane/transmitter carrier phase as a feature to perform a classification of the aircraft and, therefore, distinguish legitimate messages from fake ones. The feature extraction process is described and different classification methods are tested by the use of real dataFile | Dimensione | Formato | |
---|---|---|---|
08448244.pdf
solo utenti autorizzati
Licenza:
Copyright dell'editore
Dimensione
7.22 MB
Formato
Adobe PDF
|
7.22 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.