2022
DOI: 10.3390/s22114259
|View full text |Cite
|
Sign up to set email alerts
|

RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks

Abstract: Radar systems are mainly used for tracking aircraft, missiles, satellites, and watercraft. In many cases, information regarding the objects detected by a radar system is sent to, and used by, a peripheral consuming system, such as a missile system or a graphical user interface used by an operator. Those systems process the data stream and make real-time operational decisions based on the data received. Given this, the reliability and availability of information provided by radar systems have grown in importanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…From a defense perspective, while the literature has already presented some anomaly detection solutions concerning acquisitions by secondary radars [50], [51], to the best of our knowledge no work addresses detection at the polar video level of primary radars.…”
Section: Related Workmentioning
confidence: 99%
“…From a defense perspective, while the literature has already presented some anomaly detection solutions concerning acquisitions by secondary radars [50], [51], to the best of our knowledge no work addresses detection at the polar video level of primary radars.…”
Section: Related Workmentioning
confidence: 99%
“…Cybersecurity and digital privacy aspects of Mode S and ADS-B are increasingly important topics, and recent works extensively addressed them concerning 1090MHz links and implementations [1]- [3], [30]. As 1030MHz Mode S and ADS-B are actively used by radar systems, several works studied the security issues in radar systems [28], [31], while some proposed protective mechanisms for data manipulation in radar systems [32]. However, the cybersecurity studies of the 1030MHz Mode S and ADS-B communications were not performed; therefore, we hope dump1030 can be instrumental for this, and we leave our study of this topic as future work.…”
Section: Related Workmentioning
confidence: 99%
“…Even though the sensor must be relatively close to the ground to achieve good resolution, its sensitivity may enable new applications, such as rapidly clearing brownfield sites or searching for minerals. While the sensor head is remarkably sturdy compared to other devices, the necessary auxiliary hardware is still relatively large and complex [95]. As a result, we anticipate an increase in the number of applications for underground visibility that drives technological advancement, resulting in cost and size reductions.…”
Section: Topological Visibilitymentioning
confidence: 99%