Aerospace and Electronic Systems Magazine November 2017 - 36

Addressing Vulnerabilities of the CNS Infrastructure to Targeted Radio Interference

TWO DISRUPTION MODELS
In the literature, two terms are often used to categorize unauthorized RF emissions: jamming and spoofing. For assessing CNS vulnerabilities, it is common to have them denote the complexity of an
RFI event and define them as follows. The distinguishing criterion
between jamming and spoofing relates to the interference power at
the user antenna: if the interference signal is above the background
noise, it is usually referred to as jamming, while spoofing tends to
label interferers that work below the noise floor [7]. Note that the
distinction is by no means normative: cases of jamming have been
reported to cause undetected navigation errors [11].

JAMMING
Jamming usually refers to nonspecific interference that can overpower an entire frequency band, leading to a denial of service in
systems operating in that band. Typically, jamming events cause
disruptions in service, but they do not inject misleading information, which typically makes them an availability nuisance, rather
than an integrity hazard. Common sources of jamming are personal
privacy devices that are designed to disrupt GNSS and telecommunication services in a local environment [10].

SPOOFING
Spoofing denotes targeted interference, using signals engineered
to impersonate legitimate sources. This type of event can cause
misleading information to be injected into a system and is a serious
concern for the safety of a system. Spoofing interferers are able
to transmit signals that are less powerful than background noise,
making them particularly difficult to detect.

THREE ILLUSTRATIVE EXAMPLES: SSR, GBAS, AND VDL2
This section takes a closer look at three systems that have been
shown, by other authors, to be vulnerable to RF interference; secondary surveillance radar (SSR), the ground-based augmentation
system (GBAS), and the VHF data link mode 2 (VDL2). For each
system, the weaknesses that allow unauthorized users to manipulate critical CNS information are identified.
With systems that are already operational, making significant
changes are not always feasible, due to backward compatibility.
Wherever possible, methods to mitigate vulnerabilities are proposed, but in other cases, the focus is on concepts to be taken into
consideration when designing future systems, so as to make them
robust to known interference threats.

SSR
Current ATM systems rely heavily on SSR, as it offers several benefits over primary surveillance radar (PSR), in that its range of operation is greater and that the position estimates can have a higher
accuracy [13]. The fundamental difference between PSR and SSR
is that SSR requires users to be equipped with a transponder, while
PSR simply measures the signals transmitted from a ground station
and reflected by an aircraft. In both cases, the distance between an
36

Figure 1.

Operation of SSR.

aircraft and a ground station is estimated by measuring the time of
flight of a radio signal.
SSR works as an interrogation reply system, in which a terrestrial station, or "interrogator," broadcasts signals that prompt a
response from airborne "transponders," as illustrated in Figure 1.
The transponder has three different reply modes available that allow it to broadcast various types of information, including its own
position, velocity, and intent, as well as other information relevant
for ATM. [13] The SSR interrogator transmits its signals at 1030
MHz, while airborne transponders reply at 1090 MHz.
Researchers have shown that an unauthorized user can create
illegitimate SSR messages, e.g., injecting ghost aircraft [1], [6]
into the ATM system, but it is also possible to delete SSR messages
[12]. A critical question to assess is how big an area SSR can be
jammed by an unauthorized user with a given transmit power and
antenna gain, without discussing the attack mechanics.
For interference protection, SSR pulses need to be received at
no less than 12 dB above the noise or interference power [14].
Thus, any user able to broadcast sufficient equivalent isotropically
radiated power (EIRP) can prevent SSR systems from receiving
messages. Given the minimum signal-to-interference ratio (SIR) of
12 dB, it is possible to compute the radius beyond which all interrogations will be lost for a given ground station.

Conceptual Setup of Threat
In general, the results largely depend on the geometry of the setup,
as indicated in Figure 2. The elements are the distance from attacker
to interrogator (dG), the distance from attacker to transponder (d1),
the distance from transponder to interrogator (d2), the altitude of the
d
transponder (h), and the reference angle a, such that tan (a) =   G .
2h

Vulnerability at the Transponder
Assume an attacker is equipped with an asynchronous pulse signal
generator. The EIRP is a function of the transmit power PT( A) in
dBm, the antenna gain G(A) in dBi and a cable loss CL(A) in decibels.
Then, at the attacker
A
EIRP ( A) = PT( A) + G ( A) − CL( ) .

At the interrogator, a similar expression holds
I
EIRP ( I ) = PT( I ) + G ( I ) − CL( ) ,

where the maximum EIRP is up to to 82.5 dBm, as reported in [15].

IEEE A&E SYSTEMS MAGAZINE

NOVEMBER 2017



Table of Contents for the Digital Edition of Aerospace and Electronic Systems Magazine November 2017

No label
Aerospace and Electronic Systems Magazine November 2017 - No label
Aerospace and Electronic Systems Magazine November 2017 - Cover2
Aerospace and Electronic Systems Magazine November 2017 - 1
Aerospace and Electronic Systems Magazine November 2017 - 2
Aerospace and Electronic Systems Magazine November 2017 - 3
Aerospace and Electronic Systems Magazine November 2017 - 4
Aerospace and Electronic Systems Magazine November 2017 - 5
Aerospace and Electronic Systems Magazine November 2017 - 6
Aerospace and Electronic Systems Magazine November 2017 - 7
Aerospace and Electronic Systems Magazine November 2017 - 8
Aerospace and Electronic Systems Magazine November 2017 - 9
Aerospace and Electronic Systems Magazine November 2017 - 10
Aerospace and Electronic Systems Magazine November 2017 - 11
Aerospace and Electronic Systems Magazine November 2017 - 12
Aerospace and Electronic Systems Magazine November 2017 - 13
Aerospace and Electronic Systems Magazine November 2017 - 14
Aerospace and Electronic Systems Magazine November 2017 - 15
Aerospace and Electronic Systems Magazine November 2017 - 16
Aerospace and Electronic Systems Magazine November 2017 - 17
Aerospace and Electronic Systems Magazine November 2017 - 18
Aerospace and Electronic Systems Magazine November 2017 - 19
Aerospace and Electronic Systems Magazine November 2017 - 20
Aerospace and Electronic Systems Magazine November 2017 - 21
Aerospace and Electronic Systems Magazine November 2017 - 22
Aerospace and Electronic Systems Magazine November 2017 - 23
Aerospace and Electronic Systems Magazine November 2017 - 24
Aerospace and Electronic Systems Magazine November 2017 - 25
Aerospace and Electronic Systems Magazine November 2017 - 26
Aerospace and Electronic Systems Magazine November 2017 - 27
Aerospace and Electronic Systems Magazine November 2017 - 28
Aerospace and Electronic Systems Magazine November 2017 - 29
Aerospace and Electronic Systems Magazine November 2017 - 30
Aerospace and Electronic Systems Magazine November 2017 - 31
Aerospace and Electronic Systems Magazine November 2017 - 32
Aerospace and Electronic Systems Magazine November 2017 - 33
Aerospace and Electronic Systems Magazine November 2017 - 34
Aerospace and Electronic Systems Magazine November 2017 - 35
Aerospace and Electronic Systems Magazine November 2017 - 36
Aerospace and Electronic Systems Magazine November 2017 - 37
Aerospace and Electronic Systems Magazine November 2017 - 38
Aerospace and Electronic Systems Magazine November 2017 - 39
Aerospace and Electronic Systems Magazine November 2017 - 40
Aerospace and Electronic Systems Magazine November 2017 - 41
Aerospace and Electronic Systems Magazine November 2017 - 42
Aerospace and Electronic Systems Magazine November 2017 - 43
Aerospace and Electronic Systems Magazine November 2017 - 44
Aerospace and Electronic Systems Magazine November 2017 - 45
Aerospace and Electronic Systems Magazine November 2017 - 46
Aerospace and Electronic Systems Magazine November 2017 - 47
Aerospace and Electronic Systems Magazine November 2017 - 48
Aerospace and Electronic Systems Magazine November 2017 - 49
Aerospace and Electronic Systems Magazine November 2017 - 50
Aerospace and Electronic Systems Magazine November 2017 - 51
Aerospace and Electronic Systems Magazine November 2017 - 52
Aerospace and Electronic Systems Magazine November 2017 - 53
Aerospace and Electronic Systems Magazine November 2017 - 54
Aerospace and Electronic Systems Magazine November 2017 - 55
Aerospace and Electronic Systems Magazine November 2017 - 56
Aerospace and Electronic Systems Magazine November 2017 - 57
Aerospace and Electronic Systems Magazine November 2017 - 58
Aerospace and Electronic Systems Magazine November 2017 - 59
Aerospace and Electronic Systems Magazine November 2017 - 60
Aerospace and Electronic Systems Magazine November 2017 - 61
Aerospace and Electronic Systems Magazine November 2017 - 62
Aerospace and Electronic Systems Magazine November 2017 - 63
Aerospace and Electronic Systems Magazine November 2017 - 64
Aerospace and Electronic Systems Magazine November 2017 - Cover3
Aerospace and Electronic Systems Magazine November 2017 - Cover4
http://www.brightcopy.net/allen/aesm/34-2s
http://www.brightcopy.net/allen/aesm/34-2
http://www.brightcopy.net/allen/aesm/34-1
http://www.brightcopy.net/allen/aesm/33-12
http://www.brightcopy.net/allen/aesm/33-11
http://www.brightcopy.net/allen/aesm/33-10
http://www.brightcopy.net/allen/aesm/33-09
http://www.brightcopy.net/allen/aesm/33-8
http://www.brightcopy.net/allen/aesm/33-7
http://www.brightcopy.net/allen/aesm/33-5
http://www.brightcopy.net/allen/aesm/33-4
http://www.brightcopy.net/allen/aesm/33-3
http://www.brightcopy.net/allen/aesm/33-2
http://www.brightcopy.net/allen/aesm/33-1
http://www.brightcopy.net/allen/aesm/32-10
http://www.brightcopy.net/allen/aesm/32-12
http://www.brightcopy.net/allen/aesm/32-9
http://www.brightcopy.net/allen/aesm/32-11
http://www.brightcopy.net/allen/aesm/32-8
http://www.brightcopy.net/allen/aesm/32-7s
http://www.brightcopy.net/allen/aesm/32-7
http://www.brightcopy.net/allen/aesm/32-6
http://www.brightcopy.net/allen/aesm/32-5
http://www.brightcopy.net/allen/aesm/32-4
http://www.brightcopy.net/allen/aesm/32-3
http://www.brightcopy.net/allen/aesm/32-2
http://www.brightcopy.net/allen/aesm/32-1
http://www.brightcopy.net/allen/aesm/31-12
http://www.brightcopy.net/allen/aesm/31-11s
http://www.brightcopy.net/allen/aesm/31-11
http://www.brightcopy.net/allen/aesm/31-10
http://www.brightcopy.net/allen/aesm/31-9
http://www.brightcopy.net/allen/aesm/31-8
http://www.brightcopy.net/allen/aesm/31-7
https://www.nxtbookmedia.com