Serial number | Attack type | Purpose of attack | Way of attack |
---|---|---|---|
 |  | Eavesdrop operating status | Obtain ADS-B data of |
1 | Eavesdropping | information of aircraft | corresponding airspace |
 |  | (aircraft reconnaissance) | through ADS-B IN device |
 |  | Jam the transmission of an |  |
 |  | ADS-B message in | By using an ADS-B |
2 | Jamming | a specific airspace | transmitting device |
 |  | (ground station | with sufficiently high |
 |  | flood denial, | transmit power in |
 |  | aircraft flood denial) | the relevant frequency band |
 |  |  | By using a transmitting |
 |  | Inject fake aircraft | device with sufficient |
3 | Message | into specific flight scenarios, | high transmit power in |
 | injection | confusing air traffic | the relevant frequency |
 |  | control systems | band and capable of |
 |  | (aircraft target | generating correct |
 |  | ghost injection/flooding) | modulation and conforming |
 |  |  | to the ADS-B |
 |  |  | message format |
 |  | Delete some or all | By implementation at |
4 | Message | of the information | the physical layer |
 | deletion | contained in a message | through constructive or |
 |  | (aircraft disappearance) | destructive interference |
 |  |  | Realized by overshadowing |
5 | Message | Modify the information | and bit-flipping at the |
 | modification | contained in a message | physical layer of the system |
 |  | (virtual trajectory | and can also be achieved by |
 |  | modification) | combining two attack methods: |
 |  |  | false message injection |
 |  |  | and message deletion |