elib
DLR-Header
DLR-Logo -> http://www.dlr.de
DLR Portal Home | Imprint | Privacy Policy | Contact | Deutsch
Fontsize: [-] Text [+]

On the Vulnerability of Random Access Channels in Aeronautical Communications

Mielke, Daniel M. and Gräupl, Thomas (2020) On the Vulnerability of Random Access Channels in Aeronautical Communications. In: 39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020. 39th Digital Avionics Systems Conference, 2020-10-11 - 2020-10-16, San Antonio, USA. doi: 10.1109/DASC50938.2020.9256780. ISBN 978-172819825-5. ISSN 2155-7195.

[img] PDF - Only accessible within DLR
222kB

Abstract

In the last years, digitization of wireless communications has also reached the field of aviation. Furthermore, unmanned aircraft are entering the skies. The absence of a crew onboard these aircrafts requires a reliable data connection between the remote pilots and the air vehicle to allow a controlled operation under any circumstances. One critical part of all digital communication systems is the initial login of a new user. In many communication systems, also in aviation, this is realized by a Random Access Channel (RACH), that unregistered aircraft can use to inform the base station about their presence. In case the base station never successfully receives a new users registration message on the random access channel, no information exchange between this user and the base station is possible and the new user is never considered for resource assignment. Therefore, the random access channel is an attractive target for an attacker: it is sufficient to only attack the random access channel, a small fraction of the overall communications systems, to disturb communications inside the whole network. In this paper, we analyze the effect several targeted jamming attack on the random access channel can have on the network performance in a terrestrial-based communications system designed for air-ground/ground-air communications in aviation. We show, that pulsed jammers with very low duty cycles can achieve similar jamming performance as simple Continouous Wave (CW) jamming attacks, by outperforming the CW jammers by far in terms of energy efficiency.

Item URL in elib:https://elib.dlr.de/135183/
Document Type:Conference or Workshop Item (Lecture)
Title:On the Vulnerability of Random Access Channels in Aeronautical Communications
Authors:
AuthorsInstitution or Email of AuthorsAuthor's ORCID iDORCID Put Code
Mielke, Daniel M.UNSPECIFIEDhttps://orcid.org/0000-0003-0625-8910UNSPECIFIED
Gräupl, ThomasUNSPECIFIEDhttps://orcid.org/0000-0002-7864-774XUNSPECIFIED
Date:October 2020
Journal or Publication Title:39th AIAA/IEEE Digital Avionics Systems Conference, DASC 2020
Refereed publication:Yes
Open Access:No
Gold Open Access:No
In SCOPUS:Yes
In ISI Web of Science:No
DOI:10.1109/DASC50938.2020.9256780
ISSN:2155-7195
ISBN:978-172819825-5
Status:Published
Keywords:wireless communications, jamming, aeronatucial communications, denial of service
Event Title:39th Digital Avionics Systems Conference
Event Location:San Antonio, USA
Event Type:international Conference
Event Start Date:11 October 2020
Event End Date:16 October 2020
Organizer:IEEE
HGF - Research field:Aeronautics, Space and Transport
HGF - Program:Aeronautics
HGF - Program Themes:air traffic management and operations
DLR - Research area:Aeronautics
DLR - Program:L AO - Air Traffic Management and Operation
DLR - Research theme (Project):L - Communication, Navigation and Surveillance (old)
Location: Oberpfaffenhofen
Institutes and Institutions:Institute of Communication and Navigation
Institute of Communication and Navigation > Communications Systems
Deposited By: Mielke, Daniel M.
Deposited On:10 Jun 2020 19:06
Last Modified:05 Jun 2024 08:07

Repository Staff Only: item control page

Browse
Search
Help & Contact
Information
electronic library is running on EPrints 3.3.12
Website and database design: Copyright © German Aerospace Center (DLR). All rights reserved.