Citation: | Zhigang SU, Jing GUAN, Jingtang HAO, Bing HAN, Jun ZHOU. Method for Detecting the Delay-forwarding ADS-B Messages and Positioning of Jammer[J]. Journal of Electronics & Information Technology, 2021, 43(2): 329-334. doi: 10.11999/JEIT191006 |
Automatic Dependent Surveillance-Broadcast (ADS-B) technology is faces serious security risk of spoofing due to the characteristics of broadcasting the clear text. In view of the detection of delay-forwarding messages and the positioning of corresponding jammers, according to the distribution characteristics of the interval between radiation positions of messages received by ADS-B ground station, a method is proposed for detecting delay-forwarding messages by using the difference between the instantaneous velocity of sequential messages and the average velocity of interest of period. According to the spatial relationship between the positions of the original messages of those delay-forwarding messages and the jammer, the positions of the delay-forwarding messages received by ADS-B ground station and their received time stamps are used to locate the position of jammer with the multilateration technique. The simulation results show that the difference between the instantaneous velocity and the average velocity can effectively detect the presence or absence of delay-forwarding messages, the positioning accuracy of jammer is related to the timing accuracy of ADS-B ground station, the number of messages used for positioning, the distance between jammer and track and the azimuth of jammer. The better positioning performance of jammer can be obtained by using the message positions in side-looking area. The proposed method can help the ADS-B ground station independently to detect the delay forwarding interference and to locate the corresponding jammer.
王璐, 吴仁彪, 王文益, 等. 基于多天线的GNSS压制式干扰与欺骗式干扰联合抑制方法[J]. 电子与信息学报, 2016, 38(9): 2344–2350. doi: 10.11999/JEIT151295
WANG Lu, WU Renbiao, WANG Wenyi, et al. Joint GNSS interference mitigation approach for jamming and spoofing based on multi-antenna array[J]. Journal of Electronics &Information Technology, 2016, 38(9): 2344–2350. doi: 10.11999/JEIT151295
|
MANESH M R and KAABOUCH N. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the automatic dependent surveillance-broadcast (ADS-B) system[J]. International Journal of Critical Infrastructure Protection, 2017, 19: 16–31. doi: 10.1016/j.ijcip.2017.10.002
|
王文益, 刘慎悦, 吴仁彪, 等. 基于最小色散方法的广播式自动相关监视压制式干扰抑制[J]. 电子与信息学报, 2018, 40(4): 898–904. doi: 10.11999/JEIT170636
WANG Wenyi, LIU Shenyue, WU Renbiao, et al. Jamming suppression for automatic dependent surveillance-broadcast based on minimum dispersion method[J]. Journal of Electronics &Information Technology, 2018, 40(4): 898–904. doi: 10.11999/JEIT170636
|
王珊珊, 刘峥, 谢荣, 等. 有源欺骗干扰环境下的DOA估计[J]. 电子与信息学报, 2019, 41(5): 1040–1046. doi: 10.11999/JEIT180488
WANG Shanshan, LIU Zheng, XIE Rong, et al. DOA estimation under active deception jamming environment[J]. Journal of Electronics &Information Technology, 2019, 41(5): 1040–1046. doi: 10.11999/JEIT180488
|
LIU Ke, WU Wenqi, and WU Zhijia. Using the receiver clock offset abnormal to prove the existence of spoofing signal[C]. The 37th Chinese Control Conference (CCC), Wuhan, China, 2018: 4592–4596. doi: 10.23919/chicc.2018.8483884.
|
LIU Ke, WU Wenqi, TANG Kanghua, et al. Single receiver against repeater deception jamming technology research[C]. The 8th China Satellite Navigation Conference, Shanghai, China, 2017: 23–35. doi: 10.1007/978-981-10-4591-2_3.
|
张建中, 穆贺强, 文树梁, 等. 基于LFM分段脉冲压缩的抗间歇采样转发干扰方法[J]. 电子与信息学报, 2019, 41(7): 1712–1720. doi: 10.11999/JEIT180851
ZHANG Jianzhong, MU Heqiang, WEN Shuliang, et al. Anti-intermittent sampling repeater jamming method based on LFM segmented pulse compression[J]. Journal of Electronics &Information Technology, 2019, 41(7): 1712–1720. doi: 10.11999/JEIT180851
|
RTCA. RTCA DO-260B-2009 DO-260B (2009) minimum operational performance standards for 1090 MHz extended squitter automatic dependent surveillance-broadcast (ADS-B) and traffic information services-broadcast (TIS-B)[S]. Washington DC: Radio Technical Commission for Aeronautics, 2009.
|
STROHMEIER M, SCHÄFER M, PINHEIRO R, et al. On perception and reality in wireless air traffic communication security[J]. IEEE Transactions on Intelligent Transportation Systems, 2017, 18(6): 1338–1357. doi: 10.1109/TITS.2016.2612584
|
FINKE C, BUTTS J, MILLS R, et al. Enhancing the security of aircraft surveillance in the next generation air traffic control system[J]. International Journal of Critical Infrastructure Protection, 2013, 6(1): 3–11. doi: 10.1016/j.ijcip.2013.02.001
|
RECK C, REUTHER M S, JASCH A, et al. Verification of ADS-B positioning by direction of arrival estimation[J]. International Journal of Microwave and Wireless Technologies, 2012, 4(2): 181–186. doi: 10.1017/S1759078712000086
|
WANG Wenyi, CHEN Geng, WU Renbiao, et al. A low-complexity spoofing detection and suppression approach for ADS-B[C]. Integrated Communication, Navigation and Surveillance Conference (ICNS), Herdon, USA, 2015: 1–24. doi: 10.1109/ICNSURV.2015.7121236.
|
CHIANG J T, HAAS J J, CHOI J, et al. Secure location verification using simultaneous multilateration[J]. IEEE Transactions on Wireless Communications, 2012, 11(2): 584–591. doi: 10.1109/TWC.2011.120911.101147
|
LIU Weiyi, WEI Jian, LIANG Mengchen, et al. Multi-sensor fusion and fault detection using hybrid estimation for air traffic surveillance[J]. IEEE Transactions on Aerospace and Electronic Systems, 2013, 49(4): 2323–2339. doi: 10.1109/TAES.2013.6621819
|
中国民航局. 民用航空监视技术应用政策[R]. AC-115-TM-2018-02, 北京: 中国民航局, 2018.
Civil Aviation Administration of China. Civil aviation surveillance technology application policy[R]. AC-115-TM-2018-02, Beijing: Civil Aviation Administration of China, 2018.
|