Mielke, Daniel M. und Gräupl, Thomas (2020) On the Vulnerability of Random Access Channels in Aeronautical Communications. In: 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020. 39th Digital Avionics Systems Conference, 2020-10-11 - 2020-10-16, San Antonio, USA. doi: 10.1109/DASC50938.2020.9256780. ISBN 978-172819825-5. ISSN 2155-7195.
PDF
- Nur DLR-intern zugänglich
222kB |
Kurzfassung
In the last years, digitization of wireless communications has also reached the field of aviation. Furthermore, unmanned aircraft are entering the skies. The absence of a crew onboard these aircrafts requires a reliable data connection between the remote pilots and the air vehicle to allow a controlled operation under any circumstances. One critical part of all digital communication systems is the initial login of a new user. In many communication systems, also in aviation, this is realized by a Random Access Channel (RACH), that unregistered aircraft can use to inform the base station about their presence. In case the base station never successfully receives a new users registration message on the random access channel, no information exchange between this user and the base station is possible and the new user is never considered for resource assignment. Therefore, the random access channel is an attractive target for an attacker: it is sufficient to only attack the random access channel, a small fraction of the overall communications systems, to disturb communications inside the whole network. In this paper, we analyze the effect several targeted jamming attack on the random access channel can have on the network performance in a terrestrial-based communications system designed for air-ground/ground-air communications in aviation. We show, that pulsed jammers with very low duty cycles can achieve similar jamming performance as simple Continouous Wave (CW) jamming attacks, by outperforming the CW jammers by far in terms of energy efficiency.
elib-URL des Eintrags: | https://elib.dlr.de/135183/ | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dokumentart: | Konferenzbeitrag (Vorlesung) | ||||||||||||
Titel: | On the Vulnerability of Random Access Channels in Aeronautical Communications | ||||||||||||
Autoren: |
| ||||||||||||
Datum: | Oktober 2020 | ||||||||||||
Erschienen in: | 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020 | ||||||||||||
Referierte Publikation: | Ja | ||||||||||||
Open Access: | Nein | ||||||||||||
Gold Open Access: | Nein | ||||||||||||
In SCOPUS: | Ja | ||||||||||||
In ISI Web of Science: | Nein | ||||||||||||
DOI: | 10.1109/DASC50938.2020.9256780 | ||||||||||||
ISSN: | 2155-7195 | ||||||||||||
ISBN: | 978-172819825-5 | ||||||||||||
Status: | veröffentlicht | ||||||||||||
Stichwörter: | wireless communications, jamming, aeronatucial communications, denial of service | ||||||||||||
Veranstaltungstitel: | 39th Digital Avionics Systems Conference | ||||||||||||
Veranstaltungsort: | San Antonio, USA | ||||||||||||
Veranstaltungsart: | internationale Konferenz | ||||||||||||
Veranstaltungsbeginn: | 11 Oktober 2020 | ||||||||||||
Veranstaltungsende: | 16 Oktober 2020 | ||||||||||||
Veranstalter : | IEEE | ||||||||||||
HGF - Forschungsbereich: | Luftfahrt, Raumfahrt und Verkehr | ||||||||||||
HGF - Programm: | Luftfahrt | ||||||||||||
HGF - Programmthema: | Luftverkehrsmanagement und Flugbetrieb | ||||||||||||
DLR - Schwerpunkt: | Luftfahrt | ||||||||||||
DLR - Forschungsgebiet: | L AO - Air Traffic Management and Operation | ||||||||||||
DLR - Teilgebiet (Projekt, Vorhaben): | L - Kommunikation, Navigation und Überwachung (alt) | ||||||||||||
Standort: | Oberpfaffenhofen | ||||||||||||
Institute & Einrichtungen: | Institut für Kommunikation und Navigation Institut für Kommunikation und Navigation > Nachrichtensysteme | ||||||||||||
Hinterlegt von: | Mielke, Daniel M. | ||||||||||||
Hinterlegt am: | 10 Jun 2020 19:06 | ||||||||||||
Letzte Änderung: | 05 Jun 2024 08:07 |
Nur für Mitarbeiter des Archivs: Kontrollseite des Eintrags