Open Access. Powered by Scholars. Published by Universities.®

Aerospace Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

2021

False injection

Articles 1 - 2 of 2

Full-Text Articles in Aerospace Engineering

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson Nov 2021

Traffic Collision Avoidance System: False Injection Viability, John Hannah, Robert F. Mills, Richard A. Dill, Douglas D. Hodson

Faculty Publications

Safety is a simple concept but an abstract task, specifically with aircraft. One critical safety system, the Traffic Collision Avoidance System II (TCAS), protects against mid-air collisions by predicting the course of other aircraft, determining the possibility of collision, and issuing a resolution advisory for avoidance. Previous research to identify vulnerabilities associated with TCAS’s communication processes discovered that a false injection attack presents the most comprehensive risk to veritable trust in TCAS, allowing for a mid-air collision. This research explores the viability of successfully executing a false injection attack against a target aircraft, triggering a resolution advisory. Monetary constraints precluded …


A Cyber Threat Taxonomy And A Viability Analysis For False Injections In The Tcas, John W. Hannah Mar 2021

A Cyber Threat Taxonomy And A Viability Analysis For False Injections In The Tcas, John W. Hannah

Theses and Dissertations

This thesis provided background information on the Traffic Collision Avoidance System (TCAS). Additionally, the thesis developed a threat taxonomy for TCAS, resulting in the determination that a false injection attack presents the most comprehensive risk. Moreover, the thesis presents the development of a program to determine what ranges, altitudes, and relative bearings are most vulnerable to a false injection attack. The program includes test for all requirements of a successful false injection. Furthermore, the thesis presents an analysis of results and creates threat maps as situational awareness tools. Lastly, the thesis discusses potential solutions to the false injection attack, covers …