ADS-B spoofing attack detection method based on LSTM

17Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The open and shared nature of the Automatic Dependent Surveillance Broadcast (ADS-B) protocol makes its messages extremely vulnerable to various security threats, such as jamming, modification, and injection. This paper proposes a long short-term memory (LSTM)-based ADS-B spoofing attack detection method from the perspective of data. First, the message sequence is preprocessed in the form of a sliding window, and then, an LSTM network is used to perform prediction training on the windows. Finally, the residual set of predicted values and true values is calculated to set a threshold. As a result, we can detect a spoofing attack and further identify which feature was attacked. Experiments show that this method can effectively detect 10 different kinds of simulated manipulated ADS-B messages without further increasing the complexity of airborne applications. Therefore, the method can respond well to the security threats suffered by the ADS-B system.

Cite

CITATION STYLE

APA

Wang, J., Zou, Y., & Ding, J. (2020). ADS-B spoofing attack detection method based on LSTM. Eurasip Journal on Wireless Communications and Networking, 2020(1). https://doi.org/10.1186/s13638-020-01756-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free