Abstract

The purpose of the study is to develop a method for encoding of transmitted ADS-B messagesbetween aircraft. The open format 1090ES of transmitted data is critical in terms of carryingout various types of attacks that can lead to a violation of the safety of aircraft operations.The work is aimed at using means of encoding and decoding messages with a private key. Researchmethods are based on the application and development of streaming data encryption usingone-dimensional cellular automata. They operate as a generator of pseudo-random sequences thattransform the elementary states of a cell of a one-dimensional cellular automaton based on typicalhardware-oriented operations. The processes of encoding and decoding data fields are based onan analytical expression using typical logical operations (or, xor). This property allows parallelprocessing of message data fields. The result is the created method for ensuring the protection oftransmitted data, additionally encoding on transmission and decoding on message reception.A distinctive feature of the method is the preservation of the protocol forma. The method uses aone-dimensional cellular automaton that encodes and decodes the target fields (coordinates, heading,etc.) using a pseudo-random number generator. The developed method belongs to the class ofhardware-oriented methods. Critical for encoding and decoding properties of periodicity of datafields and key length are eliminated by choosing an initial irrational value and organizing the“streaming” work of the encoder. If the encoding automaton is running in streaming mode, thecurrent value depends on the history of some depth, determining the length of the "automatic key"from the ADS-B message will be algorithmically impossible due to data loss. The linear complexityof the method allows you to perform transformations at the data rate. Conclusion: the developmentof hardware-oriented methods of data encoding makes it possible to increase the efficiency ofusing the ADS-B system by counteracting various types of destructive actions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call