Mielke, Daniel M. and Gräupl, Thomas (2020) On the Vulnerability of Random Access Channels in Aeronautical Communications. In: 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020. 39th Digital Avionics Systems Conference, 2020-10-11 - 2020-10-16, San Antonio, USA. doi: 10.1109/DASC50938.2020.9256780. ISBN 978-172819825-5. ISSN 2155-7195.
PDF
- Only accessible within DLR
222kB |
Abstract
In the last years, digitization of wireless communications has also reached the field of aviation. Furthermore, unmanned aircraft are entering the skies. The absence of a crew onboard these aircrafts requires a reliable data connection between the remote pilots and the air vehicle to allow a controlled operation under any circumstances. One critical part of all digital communication systems is the initial login of a new user. In many communication systems, also in aviation, this is realized by a Random Access Channel (RACH), that unregistered aircraft can use to inform the base station about their presence. In case the base station never successfully receives a new users registration message on the random access channel, no information exchange between this user and the base station is possible and the new user is never considered for resource assignment. Therefore, the random access channel is an attractive target for an attacker: it is sufficient to only attack the random access channel, a small fraction of the overall communications systems, to disturb communications inside the whole network. In this paper, we analyze the effect several targeted jamming attack on the random access channel can have on the network performance in a terrestrial-based communications system designed for air-ground/ground-air communications in aviation. We show, that pulsed jammers with very low duty cycles can achieve similar jamming performance as simple Continouous Wave (CW) jamming attacks, by outperforming the CW jammers by far in terms of energy efficiency.
Item URL in elib: | https://elib.dlr.de/135183/ | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Document Type: | Conference or Workshop Item (Lecture) | ||||||||||||
Title: | On the Vulnerability of Random Access Channels in Aeronautical Communications | ||||||||||||
Authors: |
| ||||||||||||
Date: | October 2020 | ||||||||||||
Journal or Publication Title: | 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020 | ||||||||||||
Refereed publication: | Yes | ||||||||||||
Open Access: | No | ||||||||||||
Gold Open Access: | No | ||||||||||||
In SCOPUS: | Yes | ||||||||||||
In ISI Web of Science: | No | ||||||||||||
DOI: | 10.1109/DASC50938.2020.9256780 | ||||||||||||
ISSN: | 2155-7195 | ||||||||||||
ISBN: | 978-172819825-5 | ||||||||||||
Status: | Published | ||||||||||||
Keywords: | wireless communications, jamming, aeronatucial communications, denial of service | ||||||||||||
Event Title: | 39th Digital Avionics Systems Conference | ||||||||||||
Event Location: | San Antonio, USA | ||||||||||||
Event Type: | international Conference | ||||||||||||
Event Start Date: | 11 October 2020 | ||||||||||||
Event End Date: | 16 October 2020 | ||||||||||||
Organizer: | IEEE | ||||||||||||
HGF - Research field: | Aeronautics, Space and Transport | ||||||||||||
HGF - Program: | Aeronautics | ||||||||||||
HGF - Program Themes: | air traffic management and operations | ||||||||||||
DLR - Research area: | Aeronautics | ||||||||||||
DLR - Program: | L AO - Air Traffic Management and Operation | ||||||||||||
DLR - Research theme (Project): | L - Communication, Navigation and Surveillance (old) | ||||||||||||
Location: | Oberpfaffenhofen | ||||||||||||
Institutes and Institutions: | Institute of Communication and Navigation Institute of Communication and Navigation > Communications Systems | ||||||||||||
Deposited By: | Mielke, Daniel M. | ||||||||||||
Deposited On: | 10 Jun 2020 19:06 | ||||||||||||
Last Modified: | 05 Jun 2024 08:07 |
Repository Staff Only: item control page