elib
DLR-Header
DLR-Logo -> http://www.dlr.de
DLR Portal Home | Impressum | Datenschutz | Kontakt | English
Schriftgröße: [-] Text [+]

On the Vulnerability of Random Access Channels in Aeronautical Communications

Mielke, Daniel M. und Gräupl, Thomas (2020) On the Vulnerability of Random Access Channels in Aeronautical Communications. In: 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020. 39th Digital Avionics Systems Conference, San Antonio, USA. doi: 10.1109/DASC50938.2020.9256780. ISBN 978-172819825-5. ISSN 2155-7195.

[img] PDF - Nur DLR-intern zugänglich
222kB

Kurzfassung

In the last years, digitization of wireless communications has also reached the field of aviation. Furthermore, unmanned aircraft are entering the skies. The absence of a crew onboard these aircrafts requires a reliable data connection between the remote pilots and the air vehicle to allow a controlled operation under any circumstances. One critical part of all digital communication systems is the initial login of a new user. In many communication systems, also in aviation, this is realized by a Random Access Channel (RACH), that unregistered aircraft can use to inform the base station about their presence. In case the base station never successfully receives a new users registration message on the random access channel, no information exchange between this user and the base station is possible and the new user is never considered for resource assignment. Therefore, the random access channel is an attractive target for an attacker: it is sufficient to only attack the random access channel, a small fraction of the overall communications systems, to disturb communications inside the whole network. In this paper, we analyze the effect several targeted jamming attack on the random access channel can have on the network performance in a terrestrial-based communications system designed for air-ground/ground-air communications in aviation. We show, that pulsed jammers with very low duty cycles can achieve similar jamming performance as simple Continouous Wave (CW) jamming attacks, by outperforming the CW jammers by far in terms of energy efficiency.

elib-URL des Eintrags:https://elib.dlr.de/135183/
Dokumentart:Konferenzbeitrag (Vorlesung)
Titel:On the Vulnerability of Random Access Channels in Aeronautical Communications
Autoren:
AutorenInstitution oder E-Mail-AdresseAutoren-ORCID-iDORCID Put Code
Mielke, Daniel M.Daniel.Mielke (at) dlr.dehttps://orcid.org/0000-0003-0625-8910NICHT SPEZIFIZIERT
Gräupl, ThomasThomas.Graeupl (at) dlr.dehttps://orcid.org/0000-0002-7864-774XNICHT SPEZIFIZIERT
Datum:Oktober 2020
Erschienen in:39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020
Referierte Publikation:Ja
Open Access:Nein
Gold Open Access:Nein
In SCOPUS:Ja
In ISI Web of Science:Nein
DOI:10.1109/DASC50938.2020.9256780
ISSN:2155-7195
ISBN:978-172819825-5
Status:veröffentlicht
Stichwörter:wireless communications, jamming, aeronatucial communications, denial of service
Veranstaltungstitel:39th Digital Avionics Systems Conference
Veranstaltungsort:San Antonio, USA
Veranstaltungsart:internationale Konferenz
Veranstalter :IEEE
HGF - Forschungsbereich:Luftfahrt, Raumfahrt und Verkehr
HGF - Programm:Luftfahrt
HGF - Programmthema:Luftverkehrsmanagement und Flugbetrieb
DLR - Schwerpunkt:Luftfahrt
DLR - Forschungsgebiet:L AO - Air Traffic Management and Operation
DLR - Teilgebiet (Projekt, Vorhaben):L - Kommunikation, Navigation und Überwachung (alt)
Standort: Oberpfaffenhofen
Institute & Einrichtungen:Institut für Kommunikation und Navigation
Institut für Kommunikation und Navigation > Nachrichtensysteme
Hinterlegt von: Mielke, Daniel M.
Hinterlegt am:10 Jun 2020 19:06
Letzte Änderung:25 Jul 2023 11:47

Nur für Mitarbeiter des Archivs: Kontrollseite des Eintrags

Blättern
Suchen
Hilfe & Kontakt
Informationen
electronic library verwendet EPrints 3.3.12
Gestaltung Webseite und Datenbank: Copyright © Deutsches Zentrum für Luft- und Raumfahrt (DLR). Alle Rechte vorbehalten.