Mohd Ruzeiny Kamaruzzaman;Md Delwar Hossain;Yuzo Taenaka;Youki Kadobayashi
{"title":"Mitigation of ADS-B Spoofing Attack Impact on Departure Sequencing Through Modulated Synchronous Taxiing Approach","authors":"Mohd Ruzeiny Kamaruzzaman;Md Delwar Hossain;Yuzo Taenaka;Youki Kadobayashi","doi":"10.1109/OJITS.2023.3286881","DOIUrl":null,"url":null,"abstract":"Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations. Moreover, if attacks are designed meticulously, departure operations can suffer substantially with extensive flight delays and cancellations. To mitigate this incident, we propose a custom method for taxiing-out which encompasses three key components. First is by establishing situational awareness based on pivotal information about the taxiway and spoofing conditions. Next is application of dedicated algorithms to quickly capitalize available time to initiate aircraft clusters taxiing-out after temporal suspension. Lastly is the function to alternately switching clusters to recommence taxiing-out depending on changes in spoofing pattern. We simulated our proposed ‘Modulated Synchronous Taxiing Approach’ under several attack scenarios coupled with various taxiing-out schedules using a specially built discrete events model. Through a model that is formed based on integrated queues driven by a taxiing-out algorithm, experiment results show that our proposed approach fares better than other conventional taxiing-out approaches with more aircraft managed to get into the runway or closer to the runway. Overall, our proposed approach enhances departure operations resiliency whilst constantly maintaining safety first principle as the utmost priority amid uncertainties caused by cyberattack.","PeriodicalId":100631,"journal":{"name":"IEEE Open Journal of Intelligent Transportation Systems","volume":"4 ","pages":"720-739"},"PeriodicalIF":4.6000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8784355/9999144/10153982.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Open Journal of Intelligent Transportation Systems","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10153982/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Apart from delay to flight arrivals, occurrence of ghost aircraft from ADS-B message injection attack will also cause delay to the departure operations. Moreover, if attacks are designed meticulously, departure operations can suffer substantially with extensive flight delays and cancellations. To mitigate this incident, we propose a custom method for taxiing-out which encompasses three key components. First is by establishing situational awareness based on pivotal information about the taxiway and spoofing conditions. Next is application of dedicated algorithms to quickly capitalize available time to initiate aircraft clusters taxiing-out after temporal suspension. Lastly is the function to alternately switching clusters to recommence taxiing-out depending on changes in spoofing pattern. We simulated our proposed ‘Modulated Synchronous Taxiing Approach’ under several attack scenarios coupled with various taxiing-out schedules using a specially built discrete events model. Through a model that is formed based on integrated queues driven by a taxiing-out algorithm, experiment results show that our proposed approach fares better than other conventional taxiing-out approaches with more aircraft managed to get into the runway or closer to the runway. Overall, our proposed approach enhances departure operations resiliency whilst constantly maintaining safety first principle as the utmost priority amid uncertainties caused by cyberattack.