ADS-B classification using multivariate long short-term memory–fully convolutional networks and data reduction techniques

  • Open access
  • Published: 12 August 2022
  • Volume 79 , pages 2281–2307, ( 2023 )

Cite this article

You have full access to this open access article

ads b thesis

  • Sarah Bolton   ORCID: orcid.org/0000-0001-8850-7778 1 ,
  • Richard Dill 1   na1 ,
  • Michael R. Grimaila 2   na1 &
  • Douglas Hodson 1   na1  

1683 Accesses

5 Citations

Explore all metrics

Researchers typically increase training data to improve neural net predictive capabilities, but this method is infeasible when data or compute resources are limited. This paper extends previous research that used long short-term memory–fully convolutional networks to identify aircraft engine types from publicly available automatic dependent surveillance-broadcast (ADS-B) data. This research designs two experiments that vary the amount of training data samples and input features to determine the impact on the predictive power of the ADS-B classification model. The first experiment varies the number of training data observations from a limited feature set and results in 83.9% accuracy (within 10% of previous efforts with only 25% of the data). The findings show that feature selection and data quality lead to higher classification accuracy than data quantity. The second experiment accepted all ADS-B feature combinations and determined that airspeed, barometric pressure, and vertical speed had the most impact on aircraft engine type prediction.

Similar content being viewed by others

ads b thesis

Mobile Neural Architecture Search Network and Convolutional Long Short-Term Memory-Based Deep Features Toward Detecting Violence from Video

ads b thesis

Investigation of the Capabilities of Artificial Neural Networks in the Problem of Classifying Objects with Dynamic Features

ads b thesis

Real-Time Spatiotemporal Air Pollution Prediction with Deep Convolutional LSTM Through Satellite Image Analysis

Avoid common mistakes on your manuscript.

1 Introduction

Over the last three decades, storage on the internet increased by over 40,000% from 15.8 exabytes in 1993 to 6.8 zettabytes in 2020 [ 1 ]. While it is difficult to determine the exact number, as of February 2022, the size of the internet is estimated to be about 21 zettabytes and is doubling every two years [ 2 ]. If we assume the average personal computer (PC) has a hard drive of one terabyte, 21 zettabytes is equivalent to 21 billion PCs, essentially three PCs for every person in the world. While a lot of this data is personal data, a large portion of it is considered publicly available information (PAI) and can be utilized by any internet user or organization.

This increase in available data has resulted in the study of identifying trends (i.e., data analytics), becoming more and more prevalent in multiple facets of society to include commerce and government. Researchers and major corporations have considered multiple ways to best utilize this massive resource, aptly referred to as ‘Big Data.’ Some areas that have shown promise include Internet of Things (IoT) analysis [ 3 , 4 , 5 ], traffic modeling [ 6 ], flight and maritime movement [ 7 , 8 , 9 , 10 , 11 ], image recognition [ 12 ], search engines [ 12 ] and natural language processing [ 12 ].

The increased focus on PAI and data analytics is recognized by military defense strategists who are responsible for making sound defense decisions. By incorporating PAI with the plethora of sensor data at their disposal, such as data from intelligence, surveillance, and reconnaissance platforms, it is possible to improve the predictive power of those resources. The need for data analytics is apparent in the United States Air Force and Space Force where multi-domain operations are integral to their defense strategies. In fact, the FY22 Posture Statement calls out Command and Control’s need for the translation and sharing of data to provide ‘real-time dissemination of actionable information’ to provide ‘joint warfighting across all domains at a pace faster than our competitors’ [ 13 ]. Without recent advances in technology, artificial intelligence, and machine learning, this goal would be virtually impossible. Fortunately, new techniques can be used to filter the noise in big data much faster than human speed to quickly make inferences that are important to military decision makers.

To aid military leaders with analyzing the immense data at their disposal, we seek to improve military operations by providing enhanced capabilities for a major user of big data: intelligence analysts. One focus area important to intelligence analysts is pattern-of-life (POL) modeling. Some researchers seek to improve POL modeling via machine learning [ 14 , 15 , 16 , 17 , 18 ]. Recent research interests suggest analyzing ground-based and onboard aircraft sensors with deep learning to predict aircraft characteristics.

One stream of research for POL modeling is focused on exploiting automatic dependent surveillance-broadcast (ADS-B) data to make predictions about aircraft [ 6 , 8 , 11 , 19 ]. Aircraft within certain airspace are required to broadcast ADS-B Out via an onboard transponder. The benefit of using ADS-B data for classification problems is that it is publicly available and aircraft flying in the USA and Europe are required to broadcast it in most classes of airspace [ 20 , 21 ]. ADS-B data is collected from various sites worldwide where hobbyists and researchers maintain a receiver to collect it. ADS-B collectors submit their data to centralized repositories, such as the ADS-B Exchange [ 22 ], that aggregate the data for public use. In these repositories, both statistical and kinematic information about the broadcasting aircraft is available.

1.1 Problem description/objective

Pattern-of-life (POL) modeling is a research area with many techniques and best practices [ 14 , 15 , 16 , 17 , 18 ]. Military and defense personnel have an interest in POL modeling that includes more than modeling human day-to-day activities. For example, unattributed data from aircraft sensors, such as those collected from Air Traffic Control’s (ATC) primary radar, can allow inferences to be made about the transmitting aircraft with some analysis. ATC’s primary radar collects kinematic information such as location and airspeed, but is unable to obtain an aircraft’s identification without the aircraft providing it via its transponder. With this basic kinematic aircraft data, models can predict information such as aircraft model or engine type without it being directly stated in the original dataset. The benefit of ADS-B data is that these features are present in the dataset and can be used as truth data to build models for datasets that do not have the truth data.

Since this type of processing can be resource intensive, it can be difficult or, in some cases, impossible to train a deep learning model when dealing with limited computing resources. The amount of computing resources required to train a model is heavily influenced by the size of the training data. For this reason, it is important to understand how to best utilize the available resources by minimizing the data used to train the model. There are two ways to minimize the data: limit the number of features or reduce the number of training samples. In this research, using aircraft kinematic data, we examine the impact of varying these factors when predicting engine type. Since reducing the training data will inevitably reduce the accuracy of the resulting model, for the purpose of this paper, we define an acceptable model as one that predicts within 10% of the previous baseline research results of 89.2% accuracy [ 23 ]. Therefore, models that can achieve at least a 79.2% accuracy will be considered ‘acceptable.’

1.2 Research contribution

The research contribution of this paper can be summed up in the following points:

Since there is no definitive guideline for minimum dataset size for deep learning classification problems, this research aims to determine a baseline for aircraft prediction models.

This paper determines the baseline features to identify an aircraft with kinematic data: Speed, barometric pressure, and vertical speed

This paper analyzes and reiterates the importance of selecting appropriate features. The ‘noise’ feature within this dataset severely limited the classification power of the network.

1.3 Organization

The rest of this paper is organized as follows: An exhaustive literature review and background information on ADS-B is provided in section two. In the third section, the methodology and process used to develop and evaluate each model is discussed. The fourth section presents the results. The conclusion is provided in the fifth section.

2 Background and literature review

This section describes automatic dependent surveillance-broadcast (ADS-B) data; previous attempts to classify engine type from it; relevant deep learning techniques; and the recommendations for dataset size when building a neural network model. Table 1 outlines the papers discussed in this section.

2.1 Automatic dependent surveillance-broadcast (ADS-B)

Automatic dependent surveillance-broadcast (ADS-B) is an aircraft sensor used throughout many regions of the world. Several researchers have utilized ADS-B data to identify flight patterns [ 8 , 11 , 24 , 25 ], improve aircraft operations [ 26 , 27 ], increase ADS-B transmission security [ 28 , 29 ] and classify targets [ 7 ]. The transmissions are openly broadcast via an ADS-B Out transponder at 1090 MHz in many countries worldwide and at both 1090 MHz and 978 MHz within the USA. ADS-B data is received and collected via various methods to include other aircraft, ground stations, and satellites. Figure  1 depicts an ADS-B communications network.

figure 1

ADS-B high-level operational concept graphic

Ground stations consist of sites where antennas collect ADS-B transmissions from passing aircraft. The ground stations are typically managed by commercial or government organizations, but hobbyists also collect the broadcasts. In the case of hobbyists, the aircraft transmissions are collected on a nearby device and transferred to one or multiple organizations that host the data for public use (e.g., the ADS-B Exchange [ 22 ]).

The ADS-B Exchange and similar services save the incoming data to their servers in two- to five-second intervals as a JavaScript Object Notation (JSON) file. Per the USA’s DO-260B standard and Europe’s ED-102A standard, each broadcast contains up to 70 features about the transmitting aircraft including the International Civil Aviation Organization (ICAO) identifier, altitude, airspeed, vertical speed, directional heading, position time, latitude, longitude, and ground status [ 22 , 30 ].

Table  2 provides details on the countries that have an ADS-B mandate and the date when the mandate began or is projected to start. The chart shows that most countries, including the USA, Australia, the European Union Aviation Safety Agency (EASA), and many East Asia and Pacific island countries, began their mandate on or before 2020 which forces aircraft that fly within those regions to install the appropriate ADS-B Out equipment.

Within the USA, the mandate is not required for low flying aircraft and aircraft operating out of rural airports. Table  3 explains the US requirements in more detail. Within the USA, ADS-B Out is required for aircraft flying above 10,000 feet MSL and aircraft operating in locations near airports classified by Class B or Class C airspace.

2.2 Multivariate long short-term memory–fully convolutional neural networks

Artificial neural networks (ANNs) have been shown to be successful at classifying a variety of datatypes. Many ANN variations have been developed over the years to classify the infinite number of datatypes researchers encounter. Long short-term memory (LSTM) networks were developed to classify time series data and convolutional neural networks were developed to classify images. Combining these two networks, the multivariate long short-term memory–fully convolutional network (MLSTM–FCN) is shown to improve upon previous methods to classify time series data [ 31 ]. The algorithm, developed by Karim et al., combined fully convolutional networks (FCN), LSTM networks, and squeeze-and-excite blocks. FCNs were utilized to allow for the CNN benefit of class action maps without the requirement of extensive hyperparameter preprocessing that is normally required by a CNN. LSTMs were selected to detect the importance of sequences of observations in time series data. Squeeze-and-excite blocks were added to the algorithm to improve the classification power of multivariate datasets by ensuring feature maps have a similar impact to subsequent layers. In their study, Karim et al. tested four variations of the algorithm against 35 different datasets to include voice, human signal monitoring, and other time series data. Their algorithms outperformed the current state-of-the-art algorithm in 27 out of the 35 datasets [ 31 ]. Additionally, a variation of the algorithm, the multivariate attention long short-term memory–fully convolutional network (MALSTM–FCN), predicted aircraft engine type using ADS-B data [ 19 ]. This research will be further discussed in the next section.

While LSTMs and FCNs are well established, the use of squeeze-and-excite blocks is a much newer technique. To understand how they improve the MLSTM–FCN, it’s important to understand how they work and what they provide. Squeeze-and-excite blocks were introduced by Hu et al. in 2018 to improve the representational capacity of a neural network [ 34 ]. They are used with convolutional networks to help model the dependencies between the channels. As the name implies, it consists of a squeeze mechanism followed by an excitation mechanism. In the squeeze step, the classifier uses global average pooling to aggregate the spatial information of each channel. Using the example of an image, where an image has dimensions of \(H\times W\times C\) for height, width, and (normally 3) channels, the squeeze step would pass the image through a global average pooling operator where it would become a shape of \((1\times 1\times C)\) . Then, the excite step uses a gating mechanism to capture channel-wise dependencies [ 32 ]. The excitation step uses a multi-layer neural network with one hidden layer. The input and output layer are the same shape \((1\times 1\times C)\) , but the hidden layer reduces the space by a reduction factor, r , making the number of neurons in the hidden layer C / r . Karim et al. and Hu et al. use a reduction factor of 16 [ 32 , 34 ]. This \((1\times 1\times C)\) value is multiplied element-wise with the original \((H\times W\times C)\) input. The graphical representation of the squeeze-and-excite block developed by Hu et al. can be seen in Fig. 2 .

figure 2

The schema of the squeeze-and-excite model

Using the squeeze-and-excite block in conjunction with an LSTM and FCN, the MLSTM–FCN was developed to create a model for time series classification. Figure  3 shows the architecture Karim et al. designed for their research. This algorithm is used to develop all of the models in this research.

figure 3

MLSTM–FCN architecture [ 32 ]

2.3 Dual-stage deep engine classifier

Multiple researchers have focused on using the ADS-B dataset to predict engine type with ADS-B kinematic data [ 8 , 19 ]. One of the limitations with analysis on this dataset is that while the models have very few problems determining if the aircraft is a jet, they tend to have trouble predicting the difference between turboprop and piston engines. The reason for this is twofold. First, the dataset is heavily imbalanced toward jet engines which causes the data to have fewer samples of turboprop and piston engines from which to learn. Second, the kinematic differences between piston and turboprop engines are minimal.

As a method to remedy this problem, Basrawi et al. developed a Dual-Stage Deep Engine Classifier (DSDEC) [ 19 ]. Using the MALSTM–FCN algorithm as a basis for the model, the DSDEC algorithm employs a unique 2-stage approach. When using the model to make predictions, the first stage predicts if the aircraft is a jet or not a jet. Then, the ‘not jet’ predictions are fed to the second stage. The second stage predicts if the aircraft has a piston or turboprop engine. The results from both the first and second stage are combined to provide an engine prediction for each observation. Figure 4 portrays the architecture that is used.

figure 4

DSDEC architecture [ 23 ]

Basrawi et al. are the first to classify aircraft engine type using ADS-B data with a deep learning model. Using the DSDEC method, researchers were able to identify jets with 98.4% accuracy, turboprop aircraft with 79.2% accuracy, and piston engine aircraft with 89.9% accuracy. However, the DSDEC method would still confuse turboprop aircraft as piston engine aircraft 17.9% of the time [ 19 ]. Table  4 shows the results achieved by Basrawi et al. compared to a support vector machine (SVM) and random forest (RF) as baseline from previous research[ 8 ].

During the experiments, static time steps were used and each time step was separated by two seconds. 300 time steps would be equivalent to 600 seconds or 10 minutes of flight time. Similarly, 100 time steps would be 200 seconds or 3 minutes and 20 seconds of flight time. While Basrawi et al. indicated that more research would be needed to determine the influence of the time step size, their results point to the possibility that longer flight observations improve the model’s predictive power. In fact, while the DSDEC algorithm was used against 21 different models to determine which hyperparameters led to the highest accuracy, none of the 100 time step models performed as well as the 300 time step examples.

2.4 Size of dataset

Determining the exact dataset size needed to build an artificial neural network (ANN) classifier is an open research problem that may never have a complete solution due to the infinite number of ANN combinations. However, experts suggest several guidelines to ensure enough data is available to train a model with sufficient accuracy value [ 35 , 36 , 37 , 38 , 39 ]. Guidelines can be broken into three important characteristics of the dataset: the number of prediction classes, the number of features, and the number of weights in the network. The following guidelines sum up the results from past research endeavors:

Prediction Classes : A sample size should have 50-1000 times the number of observations as prediction classes [ 36 ]. For this paper, there are three prediction classes: Jet, turboprop, and piston.

Features : There should be 10-100 times the number observations as features [ 37 ].

Network Weights : The sample size should be equivalent to 10 times the number of weights in the network [ 38 , 39 ].

Another paper decided on a stricter limit stating that there should be 50 times the number of observations as network weights [ 35 ].

2.5 Summary

The information provided in this section shows that ADS-B sensor data is a useful resource when trying to understand POL modeling with aircraft. Previous research has used this data to predict aircraft characteristics [ 7 , 8 , 19 ]. When predicting engine type, researchers found that the MLSTM–FCN was able to train a model that achieved an overall accuracy of 89.2% [ 19 ]. This paper uses the information gleaned from research done with the MLSTM–FCN [ 32 ] and DSDEC [ 19 ] to learn how to minimize the input data size while maintaining a similar accuracy and loss.

3 Methodology

This section outlines a method to efficiently classify engine type from ADS-B data. It improves on Basrawi et al [ 19 ] by reducing the model complexity and decreasing the requisite ADS-B dataset size to classify engine. Basrawi et al. used two feature sets, a limited and a full feature set, which had 6 and 9 features, respectively. Additionally, they used 9 days worth of ADS-B data to train a dual-stage classification algorithm. This method reduces the model complexity to a single stage and only requires a 24-hour sample size and three ADS-B features to achieve similar classification accuracy results. It uses data from 1 December 2020 to train the model and 16 November 2020 to test the model.

The rest of this section describes two experiments:

Experiment 1: The first experiment creates 24 models with two different learning rates, three feature sets, and four data amounts. The models train over a period of 200 epochs and are evaluated on the testing data. The goal of the first experiment is to determine the effect of varying the number of training data observations. Effects to accuracy, loss, precision, and recall are recorded.

Experiment 2: In the second experiment we develop models using all possible feature combinations (255). The goal of the second experiment is to determine which subset of features has the highest overall accuracy when predicting engine type. The models train for 50 epochs, which is where the first experiment shows training and validation data accuracy diverge.

The details of each experiment can be seen in Table  5 .

3.1 Assumptions and limitations

The dataset used in this research is smaller than the one used by Basrawi et al. [ 19 ]. In this research, the training data from 1 December 2020 has 4,110 tracks/tensors, and the evaluation data from 16 November 2020 has 2,487 tracks/tensors. In the experiment completed by Basrawi et al., the training data ranged from 1 to 8 December 2020 consisting of 7,749 tracks/tensors. The evaluation data was also from 16 November 2020, but consisted of 4,158 tracks. This amounts to approximately half of the tracks for training and evaluation in this experiment. It is assumed that the effects of reducing the data size would be proportional regardless if one week or one day was used for training.

Although researchers have shown that the integrity of ADS-B sensor data is vulnerable to a variety of cyber attacks [ 41 , 42 ], the dataset is assumed accurate for the purposes of this paper. While vulnerable, cyber attacks against ADS-B are not a common occurrence. Air traffic control-related attacks occur only a few times each year [ 43 ]. We consider this to be an acceptable assumption since the number of occurrences of message injects and other ADS-B attacks is low in comparison to the millions of flights that occur each year.

3.2 Process

The process for converting raw ADS-B data into a model that can predict engine type can be broken down into five steps that will be explained in the subsequent paragraphs Fig. 5 .

figure 5

Data Processing Steps

3.2.1 Data preparation

The ADS-B data acquired by Basrawi et al. [ 19 ] contains aircraft observations from thousands of locations each day from November to December 2020. During the preparation phase, the data is converted from JavaScript Object Notation (JSON) files to Python Data Analysis Library (Pandas) data frames, sorted by unique International Civil Aviation Organization (ICAO) and time, and then saved as Comma-Separated Values (CSV) files. Then, the CSV files are reloaded as a Pandas data frames with invalid and irrelevant data (e.g., helicopter and glider data points) removed. Aircraft without at least 300 transmissions (10 minutes) are removed and any transmissions after 300 time steps are discarded to keep the data as similar as possible. For all aircraft, only the first 10 minutes of the takeoff segment of flight are used. The remaining data is balanced by engine type using an undersampling technique [ 44 , 45 ] to reduce the impact of the heavily imbalanced dataset. The undersampling technique is selected over an oversampling or a hybrid method since the dataset is already very large and diverse. Thousands of ‘Jet’ observations remain in the dataset even with undersampling. Since they are randomly removed, overfitting is avoided. Then, the engine type feature is converted from a number to a one hot encoding of Boolean values with ‘jet,’ ‘turboprop’ and ‘piston’ as possible options. The data preparation step reduces 44 GB of raw data to 270 MB of processed data.

The processed data is formed into ( n,t,v ) tensors [ 46 ], where n is the number of aircraft tracks, t is the number of time steps for each track, and v is the number of features describing each track. In the previous version of this experiment t and v were varied across multiple trials to determine the best combination. It was determined that reducing the t variable lower than 300, lowers the accuracy. Therefore, \(t = 300\) is maintained across all iterations of this experiment. n and v are altered by changing the amount of training data and changing the number of features, respectively.

Experts agree on best practices to follow when training classification models. The first recommendation is that the training dataset sample size be at least 50-1000 times the number of prediction classes [ 36 ]. Since there are only three prediction classes and over a million observations, this goal is met. The second suggestion is that the sample size is 10-100 times larger the number of features [ 37 ]. The feature set with the most number of features is 12. Since \(12\times 100 = 1200\) and there are 1,233,000 samples, this suggestion is also met. The final guideline states that the number of observations should be 10 times the number of weights in the model. Since the model has 280,000-288,000 weights (depending on the number of features for that experiment), the number of samples needed is near 3 million [ 38 , 39 ]. With less than half the requisite samples, this guideline is not met. However, the study that this experiment was built on only used 2,324,700 samples and was able to achieve a nearly 90% accuracy [ 19 ]; it is assumed that not meeting the 10x weight requirement, but meeting all other guidelines, is sufficient for this experiment.

In the final part of data preparation, we create four training datasets of varying sizes. The first training dataset includes observations from the entire 24-hour period on 1 December 2020. This dataset is the largest dataset and is referred to as the full dataset throughout this paper. In the creation of the next three datasets, we randomly remove tensors from the full dataset to create a new dataset that is half, a quarter, and an eighth the size of the full dataset. Since it is done randomly, the datasets are not equal to 12, 6, and 3 continuous hours of observations. Instead, the observations are 300 time step tensors taken at various points during the 24-hour time period. Proportions between engine types are maintained per the undersampling technique. The full dataset results in 4,110 tensors (1,233,000 samples), the half dataset has 2,055 tensors (616,500 samples), the quarter dataset has 1,026 tensors (307,800 samples), and the eighth dataset has 513 tensors (153,900 samples). Table 6 .

3.2.2 Input feature selection

The raw ADS-B data collected during November and December 2020 contained a total of 57 features. Most of them were either not consistently transmitted by all aircraft or contained irrelevant or redundant information. There were also a few features that contained identifying information like ICAO, aircraft model, ID number, country of origin, inbound/outbound location, or other non-kinetic information that is not intended to be used for this research. This reduced the usable kinetic input features from 57 to 9. We also develop 3 other input features from these inputs to improve the location data. The definition of each feature is listed in Table  7 .

The following features are selected for inclusion into the dataset due to their potential for predicting engine type.

Altitude and Ground Altitude—Since jet, turboprop, and piston engine aircraft tend to fly best at different altitudes, these features are important in distinguishing between them. [ 48 ]

Airspeed—Jets fly faster than piston or turboprop engines. Turboprop engines can reach greater speeds easier at higher altitudes than piston engines. [ 48 ]

Barometric Pressure—This feature is another way to measuring altitude. For every thousand feet of elevation, the pressure drops by 1 inHg. [ 49 ]

Vertical Speed—The importance of this feature is similar in nature to air/ground speed.

Time—This feature would allow the comparison of different chronological points of the flight

Track—With location and speed, track can be used to learn specific aircraft patterns.

Lat/Long—Aircraft may exhibit different behaviors depending on the geography. For example during the first ten minutes, an aircraft would takeoff differently from a mountainous region than an open field.

Location (X,Y,Z)—Lat/Long are normalized to better represent a 3-dimensional space. This feature was not in the raw data, but was instead generated to help better represent the data. The formulas used to normalize the lat/long are as follows:

\(x =\) cos(lat) * cos(lon)

\(y =\) cos(lat) * sin(lon)

\(z =\) sin(lat)

Feature combinations for the first experiment are tested based on their size and their possible effects on classification. The feature combinations experiment one uses are outlined in Table  8 .

For the second experiment, all possible combinations of the full feature set are used to determine the best subset of features. However, latitude and longitude are not used for this experiment. They are replaced with the normalized location coordinates.

3.2.3 Hyperparameter selection

Since hyperparameters were already tested by Basrawi et al. to determine the best combination, this study uses those hyperparameters for the model creation with the exception of learning rate. Basrawi et al. found that the Adam optimizer and learning rates of 0.01 and 0.001 performed the best, while dropout rates were mostly inconsequential. Based on their findings, we train the model with a dropout rate of 0.5 and learning rates of 0.01 and 0.001 with the Adam optimizer.

3.2.4 LSTM training, testing, and evaluation

Similar to Basrawi et al. [ 19 ], this study uses the algorithm developed by Karim et al. [ 31 ]. The two major differences are that this research omits the attention mechanism and does not use the two-phase approach suggested by Basrawi et al. [ 19 ]. In the first experiment, 24 separate models are created out of the data from 1 December 2020 to encompass the variations in learning rate (0.01 and 0.001), the feature set (limited, medium, and full), and the data amount used (24 hours, half of the data, a quarter of the data and an eighth of the data). Each model is trained for 200 epochs which in most cases is more than sufficient.

In the second experiment, 255 models are created using a 0.001 learning rate and trained on the full size dataset. The features vary between each model to evaluate all possible combinations of features. Each model is trained for 50 epochs which is the point when training and validation data accuracy deviate.

Accuracy, precision, loss, and recall are saved during the creation of the models for both experiments to show the models’ histories during each epoch. Those metrics are also saved for the final models’ evaluation. A k -fold method, where \(k=10\) , tests each model with the data from 16 November 2020. Each model is compared to show how the change in both the input feature size and the amount of data points affected the aforementioned metrics.

4 Results and discussion

4.1 experiment 1–24 models: data size comparison.

Table  9 outlines the performance across all phases. Figures  6 and  7 represent the data from Table 9 . The line colors represent the input feature size and the color’s shade represents the learning rate. The 0.001 learning rate is darker shade and the 0.01 learning rate is the lighter shade. Blue represents the smallest input feature size, green the medium input feature size, and orange the full input feature set. As can be seen, the limited feature set has the best accuracy and loss with the medium and full feature set having very irregular performance. While not shown, recall and precision follow similar trends.

figure 6

Change in accuracy by change in sample size

figure 7

Change in loss by change in sample size

Model 1 performs the best. It has an 89.4% overall accuracy which is on par with the 89.2% accuracy achieved by Basrawi et al. [ 23 ], but with half the sample size. The confusion matrix for model 1 can be seen in Figure  8 . The results for individual engine type are also similar to those collected by Basrawi et al. For comparison, they found that jet engines were predicted correctly 98.4% of the time, turboprop 79.2%, and piston 89.9% [ 23 ]. In this study, jets are accurately predicted 97.2% of the time, turboprops are 79.1% and pistons are 92.0%.

figure 8

Confusion Matrix for Model 1

The results show that the limited feature dataset outperforms the medium and full feature sets. The larger feature sets never converge. This phenomenon is due to noise and overfitting to the training data. Experiment two is able to further analyze the lack of convergence. However, using the three feature sets created for this experiment, it is shown that altitude, airspeed, vertical speed, and location provide sufficient information about aircraft to differentiate engine type in most cases. The additional features do not provide any information that help the model learn more about aircraft engines. Instead, it makes the data more convoluted. This can be shown with the training history as seen in Figures  9 ,   10 , and  11 . These figures represent the training accuracy after each epoch where the feature set is varied between the figures, but learning rate and dataset size remain constant. The three images are from the models that had a 0.001 learning rate and used the full dataset (i.e., models 1, 3, and 5). While the training accuracy continues to increase, the validation accuracy does not. This indicates that the model is no longer improving and is instead overfitting to the training data. While only a subset of the models are shown in this manner, other models follow a similar pattern with the limited feature set performing the best in all cases.

figure 9

Accuracy Training History on Limited Feature Set for 0.001 Learning Rate and Full Dataset

figure 10

Accuracy Training History on Medium Feature Set for 0.001 Learning Rate and Full Dataset

figure 11

Accuracy Training History on Full Feature Set for 0.001 Learning Rate and Full Dataset

The results from the limited feature set show that more data improves the classification power of the model. However, the reduction in accuracy is gradual until the one-eighth size dataset. Based on our previous definition of an ‘acceptable’ model, the 1/4 size dataset meets the minimum accuracy with 83.9%. For this reason, if computational power was limited, someone could drop the number of inputs to 1/4 of the full dataset and still be guaranteed to have a reasonable prediction accuracy rate.

4.2 Experiment 2–255 models: feature set comparison

The goal for experiment two is to find the subset of features that best predict engine type from the full size dataset. All possible feature combinations from 8 available features result in the creation of 255 models. The top 20 results from the 255 models are presented in Table  10 . Airspeed, pressure, and vertical airspeed create the best-performing dataset. This result is unexpected since it does not include altitude. Jets fly at a different altitude than piston or turboprop engines. For that reason, it would seem like altitude would be an important feature. A possible reason for this might be that the observations only include the first 10 minutes after takeoff. Jet engines would not have the time to reach cruising altitude until the end of the 10 minute time frame.

Additionally, the results from experiment show that a combination of all of the features except for ‘PosTime’ provide the third best feature indicator for accuracy. However, not only is ‘PosTime’ not included in the 3rd best combination, but it is also interesting to note that all of the worst-performing models contain ‘PosTime.’ Table 11 shows the 10 worst-performing models. It is not until the 43rd worst performer (the model with just the ‘Trak’ feature with a 48.9% accuracy rate) that the ‘PosTime’ feature is not present.

5 Conclusion

The goal of this research is to determine the effect of minimizing the size of the training data that was used to develop a MLSTM–FCN model. We do this with two separate experiments. In experiment one, we vary the number of training samples in the training dataset with three different feature sets. In experiment two, we vary the number of features present in the dataset. Those models are tested to determine how each change affects the accuracy and loss of the model against a separate test set. We deem a model to be ‘acceptable’ if the accuracy was within 10% of results from previous research [ 19 ].

There are a few main takeaways from this experiment. The first is that the quality of a dataset is more important than the quantity of data when building a neural network. Having redundant features or features that do not add pertinent information to the model can cause the model to perform poorly. This fact is convenient when it comes to minimizing a dataset, but can be frustrating when trying to determine which features are actually important. Too many irrelevant features will add noise into the model and produce results that are less than ideal. Based on this experiment, speed, pressure and vertical speed are some of the more important features needed to identify an aircraft’s engine type.

This dataset is reduced to a quarter of its original size before the model starts exhibiting severe negative effects. During both experiments, the best model achieves an accuracy of 89.4%. Reducing the data by half only reduces the accuracy by 4.6% to 84.8% accuracy which has a rate of change of 9.2% ( \(\Delta\) accuracy \(/\Delta\) size). Reducing it to a quarter of its original size produces an 83.9% accuracy rate which is a 22.0% rate of change from the full size dataset. However, reducing the dataset to an eighth of its original size produces a 75.8% accuracy rate which is a 108.8% rate of change from the full size dataset. Since the raw data from 1 December 2020 was about 44 GB, this large file size could be reduced to 11 GB using the quarter size dataset and still effectively train a classification model. Most computers, laptops, or small handheld devices could perform data processing and train a model that was only 11 GB. This observation would work well for military operations in remote locations with low computational resources. If data and computation resources were not as plentiful, reducing the model to approximately 300,000 observations would create a model that could make observations with a small trade-off of less than 10% reduced accuracy.

5.1 Future work

While the goal of this study is to determine how to minimize the input data to make best use of low computational resources, military operations tend to have access to a vast number of sensors. Combining other related sensors to the ADS-B data could improve results. Other potentially useful sensors include weather, radar, and image data. Researchers should look at the effects of combining these sources to determine if they improve classification accuracy.

The raw ADS-B data represents the ‘PosTime’ feature as the number of milliseconds since Epoch (1970). During the processing of the data, ‘PosTime’ is modified to more closely compare to previous work with engine type prediction. Instead of milliseconds since Epoch, it represents the amount of milliseconds since takeoff. When creating a model with an LSTM, this is not the best use of the time feature. Keeping track of time of day, day of the week, or even just the date would allow the model to better learn aircraft schedules. Future work should look at modifying this feature into something that would improve the classifier.

This research uses only the first 10 minutes of flight to train each model. The first 10 minutes of flight consists of the takeoff phase and sometimes part of the cruising phase. Incorporating other phases, such as cruising and landing, could help to further separate the differences between engine types. The biggest benefit of using other phases is that jets, turboprops, and pistons have different characteristics when they get to the cruising phase. Jets fly at much higher altitudes during the cruising phase than other engine types and turboprop engines can reach greater speeds easier at higher altitudes than piston engines [ 48 ].

Data availability

The datasets generated during and/or analyzed during the current study are available from the corresponding author on reasonable request.

Bartley K (2021) Big data statistics: how much data is there in the world? . https://rivery.io/blog/big-data-statistics-how-much-data-is-there-in-the-world/

Live-counter.com: how big is the internet? https://www.live-counter.com/how-big-is-the-internet/

Saleem TJ, Chishti MA (2019) Deep learning for internet of things data analytics. Proc Comput Sci 163:381–390. https://doi.org/10.1016/j.procs.2019.12.120

Article   Google Scholar  

Dholey MK, Sinha D, Mukherjee S, Das AK, Sahana SK (2020) A novel broadcast network design for routing in mobile ad-hoc network. IEEE Access 8:188269–188283

Kumar V, Kalam S, Das AK, Sinha D (2021) Attack detection scheme using deep learning approach for iot. Adv Comput Sys Sec 14:17–30

Google Scholar  

Qian L, Gintautas V (2019) Fusing sensor data with publicly available information (PAI) for autonomy applications. In: SPIE Defense + Commercial Sensing, Baltimore, p. 22 . https://doi.org/10.1117/12.2518933

Ginoulhac R, Barbaresco F, Schneider JY, Pannier JM, Savary S (2019) Target classification based on kinematic data from AIS/ADS-B, using statistical features extraction and boosting. Proceedings International Radar Symposium 2019-June(681), 1–10 . https://doi.org/10.23919/IRS.2019.8768094

Qian L, Woods N, Rahman M (2019) Identifying ADS-B flight patterns. In: Paper presented at the 2019 MSS Joint (BAMS and NSSDF) Conference, San Diego, CA, 21–24 Oct 2019

Kraus P, Mohrdieck C, Schwenker F (2018) Ship classification based on trajectory data with machine-learning methods. In: Rohling, P.D.H. (ed.) Proceedings International Radar Symposium, vol. 2018-June, pp. 1–10. IEEE Computer Society, Bonn, Germany . https://doi.org/10.23919/IRS.2018.8448028

Andersson M, Johansson R (2010) Multiple sensor fusion for effective abnormal behaviour detection in counter-piracy operations. 2010 International Waterside Security Conference, WSS 2010 (December) . https://doi.org/10.1109/WSSC.2010.5730221

Kumar SG, Corrado SJ, Puranik TG, Mavris DN (2021) Classification and analysis of go-arounds in commercial aviation using ads-b data. Aerospace 8(10):291. https://doi.org/10.3390/aerospace8100291

Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2017) Deep learning for IoT big data and streaming analytics: a survey. arXiv 20(4): 2923–2960.

Department of the air force posture statement fiscal year 2022. department of the air force. https://www.armed-services.senate.gov/imo/media/doc/FY22%20DAF%20Posture%20Statement%20-%20Final%20(v23.1)1.pdf

Silverman BG, Bharathy G, Weyer N (2019) What is a good pattern of life model? Guidance for simulations. Simulation 95(8):693–706. https://doi.org/10.1177/0037549718795040

Mikhailov S, Kashevnik A, Smirnov A (2020) Tourist behaviour analysis based on digital pattern of life. In: 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), vol. 1, pp. 622–627 . https://doi.org/10.1109/CoDIT49905.2020.9263945

Hatcher WG, Yu W (2018) A survey of deep learning: Platforms, applications and emerging research trends. IEEE Access 6:24411–24432. https://doi.org/10.1109/ACCESS.2018.2830661

Forti N, Millefiori LM, Braca P (2019) Unsupervised extraction of maritime patterns of life from automatic identification system data. In: OCEANS 2019 - Marseille, pp. 1–5 . https://doi.org/10.1109/OCEANSE.2019.8867429

Faraj F (2021) Object detection and pattern of life analysis from remotely piloted aircraft system acquired full motion video. PhD thesis, Queen’s University , (Canada)

Basrawi K (2021) Aircraft classification from ads-b kinematic data. PhD thesis, Air Force Institute of Technology

United States department of transportation: Airspace (2021). https://www.faa.gov/air_traffic/technology/equipadsb/research/airspace/

National archives and records administration: electronic code of federal regulations (2021). https://www.ecfr.gov/current/title-14/chapter-I/subchapter-F/part-91/subpart-C/section-91.225

ADS-B Exchange: home - serving the flight tracking enthusiast - ADS-B exchange (2021). https://www.adsbexchange.com/

Basrawi K, Dill R, Peterson G, Borghetti B, Lopez J (2022) Aircraft identification from ADS-B Kinematic Data. J DoD Res Eng 5(2):31–43

Sun J, Ellerbroek J, Hoekstra J (2016) Large-scale flight phase identification from ads-b data using machine learning methods. In: 7th International Conference on Research in Air Transportation, pp. 1–8

Sun J, Ellerbroek J, Hoekstra J (2017) Flight extraction and phase identification for large automatic dependent surveillance-broadcast datasets. J Aerospace Inform Sys 14(10):566–572

Ruseno N, Lin C-Y, Chang S-C (2022) Uas traffic management communications: the legacy of ads-b, new establishment of remote id, or leverage of ads-b-like systems? Drones 6(3):57. https://doi.org/10.3390/drones6030057

Filippone A, Parkes B, Bojdo N, Kelly T (2021) Prediction of aircraft engine emissions using ads-b flight data. Aeronautical J 125(1288):988–1012. https://doi.org/10.1017/aer.2021.2

Hasin F, Munia TH, Zumu NN, Taher KA (2021) Ads-b based air traffic management system using ethereum blockchain technology. In: 2021 International Conference on Information and Communication Technology for Sustainable Development (ICICT4SD), pp. 346–350 . https://doi.org/10.1109/ICICT4SD50815.2021.9396828

Pearce N, Duncan KJ, Jonas B (2021) Signal discrimination and exploitation of ads-b transmission. In: SoutheastCon 2021, pp. 1–4 . https://doi.org/10.1109/SoutheastCon45413.2021.9401909

Sun J (2021) The 1090 megahertz riddle: a guide to decoding mode s and ads-b signals. TU Delft OPEN Publishing

Karim F, Majumdar S, Darabi H, Chen S (2018) LSTM fully convolutional networks for time series classification. IEEE Access 6:1662–1669. https://doi.org/10.1109/ACCESS.2017.2779939

Karim F, Majumdar S, Darabi H, Harford S (2019) Multivariate lstm-fcns for time series classification. Neural Net 116:237–245. https://doi.org/10.1016/j.neunet.2019.04.014

Goodfellow I, Bengio Y, Courville A (2016) Deep Learning. MIT Press, Cambridge

MATH   Google Scholar  

Hu J, Shen L, Sun G (2018) Squeeze-and-excitation networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 7132–7141 (2018)

Alwosheel A, van Cranenburgh S, Chorus CG (2018) Is your dataset big enough? Sample size requirements when using artificial neural networks for discrete choice analysis. J Choice Model 28:167–182. https://doi.org/10.1016/j.jocm.2018.07.002

Cho J, Lee K, Shin E, Choy G, Do S (2015) How much data is needed to train a medical image deep learning system to achieve necessary high accuracy? arXiv preprint arXiv:1511.06348

Jain AK, Chandrasekaran B (1982) 39 dimensionality and sample size considerations in pattern recognition practice. In: Elsevier (ed.) Classification pattern recognition and reduction of dimensionality. handbook of statistics, vol. 2, pp. 835–855. Elsevier B.V., North Holland, Amsterdam . https://doi.org/10.1016/S0169-7161(82)02042-2

Baum EB, Haussler D (1989) What size net gives valid generalization? Neural Comput 1:151–160

Haykin SS (2009) Neural networks and learning machines. Prentice Hall, New York

Honeywell aerospace: automatic dependent surveillance-broadcast will transform air traffic control. technical report, honeywell international Inc, Phoenix, Arizona (2018). https://aerospace.honeywell.com/content/dam/aerobt/en/documents/landing-pages/white-papers/DO-260-mandates-white-paper.pdf

Kamaruzzaman MRB, Fall D, Hossain MD, Taenaka Y, Kadobayashi Y (2022) Modulated synchronous taxiing: Mitigating uncertainties amid ads-b spoofing. In: 2022 Integrated Communication, Navigation and Surveillance Conference (ICNS), pp. 1–13 . https://doi.org/10.1109/ICNS54818.2022.9771477

Riahi Manesh M, Kaabouch N (2017) Analysis of vulnerabilities, attacks, countermeasures and overall risk of the automatic dependent surveillance-broadcast (ads-b) system. Int J Crit Infrastruct Prot 19:16–31. https://doi.org/10.1016/j.ijcip.2017.10.002

Wu Z, Shang T, Guo A (2020) Security issues in automatic dependent surveillance - broadcast (ads-b): a survey. IEEE Access 8:122147–122167. https://doi.org/10.1109/ACCESS.2020.3007182

Kaur H, Pannu HS, Malhi AK (2019) A systematic review on imbalanced data challenges in machine learning: applications and solutions. ACM Comput Surv (CSUR) 52(4):1–36

Haixiang G, Yijing L, Shang J, Mingyun G, Yuanyue H, Bing G (2017) Learning from class-imbalanced data: review of methods and applications. Expert Syst Appl 73:220–239

Weinman JJ, Lidaka A, Aggarwal S (2011) TensorFlow: Large-scale machine learning. GPU Computing Gems Emerald Edition (November), 277–291 https://arxiv.org/abs/1603.04467v2 1603.04467v2

Brooks TN (2018) Using autoencoders to learn interesting features for detecting surveillance aircraft . https://doi.org/10.48550/ARXIV.1809.10333

Haygood J (2021) Turboprop Vs piston airplanes . https://www.skytough.com/post/turboprop-vs-piston-airplanes

Service NW (2022) Pressure definitions . https://www.weather.gov/bou/pressure_definitions/

Download references

This study was funded by the Air Force Research Laboratory.

Author information

Richard Dill, Michael R. Grimaila and Douglas Hodson these authors have contributed equally to this work.

Authors and Affiliations

Department of Engineering and Computer Science, Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, 45433, OH, USA

Sarah Bolton, Richard Dill & Douglas Hodson

Department of Systems Engineering and Management, Air Force Institute of Technology, 2950 Hobson Way, Wright-Patterson AFB, 45433, OH, USA

Michael R. Grimaila

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Sarah Bolton .

Ethics declarations

Conflict of interests.

The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Bolton, S., Dill, R., Grimaila, M.R. et al. ADS-B classification using multivariate long short-term memory–fully convolutional networks and data reduction techniques. J Supercomput 79 , 2281–2307 (2023). https://doi.org/10.1007/s11227-022-04737-4

Download citation

Accepted : 16 July 2022

Published : 12 August 2022

Issue Date : February 2023

DOI : https://doi.org/10.1007/s11227-022-04737-4

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Multivariate long short-term memory–fully convolutional network
  • Automatic dependent surveillance-broadcast
  • Publicly available information
  • Open-source data
  • Classification
  • Machine learning
  • Find a journal
  • Publish with us
  • Track your research

Purdue e-Pubs

  • < Previous

Home > ETD > OPEN_ACCESS_THESES > 624

Open Access Theses

Ads-b used in improvement of air traffic control.

Hao Wang , Purdue University

Date of Award

Spring 2015

Degree Type

Degree name.

Master of Science in Aeronautics and Astronautics

Aeronautics and Astronautics

First Advisor

Dengfeng Sun

Committee Chair

Committee member 1.

Haifeng Wang

Committee Member 2

Automatic dependent surveillance – broadcast (ADS-B) is a central component of the NextGen air traffic control program. This surveillance technology can replace current secondary surveillance radars (SSR) and improve cockpit situational awareness. The service can improve traffic surveillance capabilities by sharing accurate aircraft position information between pilots and air traffic controllers. In addition, ADS-B provides pilots with weather as well as air traffic information for nearby area. In order to receive these traffic and weather services, a pilot must have appropriate onboard equipment including GPS receiver, Universal Access Transceiver, antenna and multi-function cockpit display which is capable of receiving and displaying information. Compared to traditional surveillance technology used in air traffic control, aircraft updates and broadcasts its information more rapidly with ADS-B since it determines its position via satellite navigation, enabling it to be tracked. ADS-B also has a large coverage including most of areas in the world. This feature is especially helpful in special areas such as mountain area for air traffic controllers. The most important potential of ADS-B is to enable procedures not possible with current SSR that would increase the capacity of airspace system due to its high navigation accuracy. ADS-B is also helpful to improve the safety in air traffic. However, ADS-B program hasn't been operating well even though FAA highly recommended it and made rules on it. This paper discussed the basic advantages and disadvantages of ADS-B. The experiment was designed to estimate the navigation accuracy of ADS-B by modeling several flights in MATLAB with data from FAA and IGS and then compare the result in ideal situation with current surveillance technology. The result showed that the accuracy of ADS-B is higher than current radar system in this designed situation. The limit of the experiment and its difference to the real world are discussed in the paper as well.

Recommended Citation

Wang, Hao, "ADS-B used in Improvement of Air Traffic Control" (2015). Open Access Theses . 624. https://docs.lib.purdue.edu/open_access_theses/624

Since January 18, 2017

Included in

Aerospace Engineering Commons

Advanced Search

  • Notify me via email or RSS
  • Purdue Libraries
  • Purdue University Press Open Access Collections

Links for Authors

  • Policies and Help Documentation
  • Collections
  • Disciplines

Home | About | FAQ | My Account | Accessibility Statement

Privacy Copyright

Performance Analysis of Automatic Dependent Surveillance-Broadcast (ADS-B) and Breakdown of Anomalies

  • Tabassum, Asma

This thesis work analyzes the performance of Automatic Dependent Surveillance-Broadcast (ADS-B) data received from Grand Forks International Airport, detects anomalies in the data and quantifies the associated potential risk. This work also assesses severity associated anomalous data in Detect and Avoid (DAA) for Unmanned Aircraft System (UAS). The received data were raw and archived in GDL-90 format. A python module is developed to parse the raw data into readable data in a .csv file. The anomaly detection algorithm is based on Federal Aviation Administration's (FAA) ADS-B performance assessment report. An extensive study is carried out on two main types of anomalies, namely dropouts and altitude deviations. A dropout is considered when the update rate exceeds three seconds. Dropouts are of different durations and have a different level of risk depending on how much time ADS-B is unavailable as the surveillance system. Altitude deviation refers to the deviation between barometric and geometric altitude. Deviation ranges from 25 feet to 600 feet have been observed. As of now, barometric altitude has been used for separation and surveillance while geometric altitude can be used in cases where barometric altitude is not available. Many UAS might not have both sensors installed on board due to size and weight constrains. There might be a chance of misinterpretation of vertical separation specially while flying in National Airspace (NAS) if the ownship UAS and intruder manned aircraft use two different altitude sources for separation standard. The characteristics and agreement between two different altitudes is investigated with a regression based approach. Multiple risk matrices are established based on the severity of the DAA well clear. ADS-B is called the Backbone of FAA Next Generation Air Transportation System, NextGen. NextGen is the series of inter-linked programs, systems, and policies that implement advanced technologies and capabilities. ADS-B utilizes the Satellite based Global Positioning System (GPS) technology to provide the pilot and the Air Traffic Control (ATC) with more information which enables an efficient navigation of aircraft in increasingly congested airspace. FAA mandated all aircraft, both manned and unmanned, be equipped with ADS-B out by the year 2020 to fly within most controlled airspace. As a fundamental component of NextGen it is crucial to understand the behavior and potential risk with ADS-B Systems.

  • Mechanical engineering;Aerospace engineering;Engineering

Nanyang Technological University

  • Show simple item record
  • Show full item record
  • Export item record
Title: Design and development of ADS-B receiver
Authors: 
Keywords: 
Issue Date: 2019
Abstract: The rapid boom in the number of passengers for air travel has increased the demand for the number of flights at a very fast pace. As stated by International Air Transport Association (IATA), the estimated number of passengers may rise to 7.3 billion by 2034 [1]. One of the main challenges that arise is the increase in air traffic density, particularly at the airport area [2]. Thus, techniques such as minimizing the separation between aircrafts became necessary to ensure efficient and fast taxi, landing and take-off of the aircrafts to avoid delays. This has resulted in the need for a more efficient and precise air navigation applications to accommodate the rise in the number of flights. Automatic Dependent Surveillance Broadcast (ADS-B) is one potential solution for the abovementioned issue. ADS-B is a technology where the identity, position and various other information of an aircraft is determined via satellite technology. The ADS-B signals are regularly transmitted by the transponders on the aircraft and these signals are able to be received by any air traffic control ground station as well as other aircrafts equipped with proper ADSB receiver. This provides the opportunity to create an environment with shared information, which improves situation awareness to identify and eliminate potential hazards efficiently [3]. Furthermore, aircrafts equipped with ADS-B system provides air traffic control with aircraft information by emitting ADS-B signal at 1 second intervals as compared to current radar technology which requires 5 to 12 seconds. Thus, ADS-B has better accuracy compared to the traditional primary and secondary radar [4].However, ADS B system is still in its early stage with a lot of room for improvements. Firstly, ADS-B system is not secured and can be hacked easily [6]. Although the ADSB data broadcast is open and useful, there is no proper method of collection and elimination of data. There may also be noisy and erroneous data [7] as well as missing data, which may cause the inaccurate determination of flight position. Thus, reliability and usefulness of ADSB technology is still remains a questionable issue. Therefore, the aim of this project is to improve the accuracy aspect of the ADSB. A computing programme is developed by incorporating algorithms to eliminate erroneous signals and fill in the missing data. The developed computing programme is integrated into the ADS-B receiver to get a more accurate positioning and trajectory of the aircrafts.Due to the lack of ground tools to measure the usefulness of the results, the filtered trajectory will be plotted against the initial trajectory. Visual observation and comparison is made to valide the results. Stratux ADS-B receiver is used to collect data of the aircrafts for this project.
URI: 
Schools:   
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:

Files in This Item:

File Description SizeFormat 

  Restricted Access
Design and Development of ADS-B Receiver40.04 MBAdobe PDF

Page view(s)

Download(s) 50.

ads b thesis

Google Scholar TM

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

ADS-B: Probabilistic Safety Assessment

  • Journal of Navigation 70(4):1-20

Busyairah Syd Ali at RMIT University

  • RMIT University

Washington Yotto Ochieng at Imperial College London

  • Imperial College London

Arnab Majumdar at Imperial College London

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Asma Tabassum

  • William Semke
  • Yazhou Zhou

Federica Bonfante

  • Francesco Grimaccia

Matteo Davide Lorenzo Dalla Vedova

  • PROCESS SAF ENVIRON

Zhuang Li

  • Xiaoming Zhu

Vadim Vorobev

  • V. L. Kuznetsov

Valeriy Sharov

  • Volodymyr Sherstjuk

Maryna Zharikova

  • Victor Gusev

Asma Tabassum

  • RELIAB ENG SYST SAFE

Mario van der Borst

  • H Schoonakker
  • G. Caligaris
  • Sergio Contini

Luciano Fabbri

  • Ernest J. Henley
  • Hiromitsu Kumamoto

Jørn Vatn

  • John A. McDermid

David Pumfrey

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

aerospace-logo

Article Menu

ads b thesis

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Air traffic security: aircraft classification using ads-b message’s phase-pattern.

ads b thesis

1. Introduction

  • Eavesdropping , i.e., listening to the unsecured broadcast transmissions: it is impossible to be prevented without applying encryption and, of course, it is impossible to be detected;
  • Jamming , i.e., the intentional transmission of high power harmful signals in the RF channel in order to disable the air–ground communication: for a single receiver or in a particular geographical area, this type of attack may create denial-of-service problems at any airport;
  • Message injection ( or spoofing ), i.e., the intentional transmission of signals with the same protocol but with misleading information;
  • Message deletion by SSR reply Garbling: legitimate messages can be “deleted” or manipulated by the superposition of false message with higher power.

2. Estimation of the ADS-B Message’s Phase-Pattern

  • central frequency f C could be 1090 ± 1 MHz;
  • the pulse should have width τ = 0.5 ± 0.05 μ s, rise time 0.05 μ s ≤ τ r ≤ 0.1 μ s and decay time 0.05 μ s ≤ τ d ≤ 0.2 μ s;
  • the Amplitude of the message could change within ± 1 dB;
  • no restrictions exist concerning the carrier phase due to the fact that all the information is coded in the amplitude of the signal.
  • the time position of each pulse: it can be easily determined estimating the time of arrival of the message, with a preamble detection algorithm and then decoding the envelope of the received signal. This operation is already done by any ADS-B receiver [ 4 ];
  • the central frequency of the message f C + δ f (it may also include the Doppler frequency due to the airplane velocity): it can be done using any kind of frequency estimator such as finding the max value of the Discrete Fourier Transform of the received signal.
Phase pattern extraction.
  
  Sampled IF signal
  
          1. Envelope Computation (e.g., with Hilbert transformation);
          2. Preamble detection (as described in the ADS-B standards);
          3. Data Block decoding (as described in the ADS-B standards);
          4. Pulses time intervals estimation;
          5. central frequency estimation by finding the max of the DFT of the signal;
          6. For each of 112 pulses: Pulse’s carrier phase estimation by the use of ( );
          7. Phase unwrapping.
  
   sequence

3. Real Data Analysis

4. aircraft classification method.

  • More than 50% of the observed aircraft have a particular and representative phase pattern.
  • The phase pattern can be used to classify the aircraft using an NN obtaining performances up to 93% (in terms of probability of correct classification).

5. Intruder Detection Algorithm

  • To create and populate a Database with the assigned class for any legitimate and genuine aircraft : to perform this action, for each aircraft not yet present in the Database, N c messages are received and classified using the proposed NN. If more than K c messages are classified in the same class, the aircraft is assigned to that class. Otherwise, the aircraft is declared not classifiable and excluded from the test phase;
  • To define a test to verify if the received messages come from the expected transmitter or from a fake one : for each aircraft in the Database, N t messages are received and classified and, if more than K t messages are classified in the wrong class, an alarm is raised. The K / N logic is used to improve the probability of false alarm and the probability of detection of the classification method;
  • To remove from the test phase the aircraft that do not have a constant phase pattern in the time : if an aircraft gives more than J consecutive alarms, the test phase for that aircraft is stopped. This last step is done to detect the aircraft that change their phase pattern after the Database population. These aircraft, in a real implementation, should be analyzed by an operator that can allow new classification attempts for the aircraft replacing the old one. It can be noted that the larger N c is, the lower is the probability to be in this situation.
Intruder Detection.
ICAO Address and of the received ADS-B message
. . . . . . message of that ICAO Address? . messages classified in the wrong class? . . . . . . . . . message of that ICAO Address? . messages assigned to the same class? . . . .
Alarm
  • Legitimate aircraft, no attack : a real aircraft transmits legitimate replies. ADS-B receiver will receive only real messages. This situation will be used to evaluate the False Alarm Probability.
  • Legitimate aircraft not present but receiver under attack : a transmitter emulates the presence of an aircraft transmitting fake replies with a given ICAO address. The ADS-B receiver will receive only fake messages. This situation will be used to evaluate the Probability of Detection.
  • Legitimate aircraft present and under attack : a transmitter emulates an aircraft transmitting fake replies with a given ICAO address. In the meantime, the legitimate aircraft is transmitting messages too. If the attacker transmits replies according to ADS-B protocols, the ADS-B receiver will receive interleaving fake and legitimate messages. This situation will be used to evaluate the Probability of Detection.

6. Conclusions

Author contributions, conflicts of interest, abbreviations.

ADS-BAutomatic Dependent Surveillance—Broadcast
ATCAir Traffic Control
AWGNAdditive White Gaussian Noise
CRCCyclic Redundancy Check
DBDatabase
DFTDiscrete Fourier Transform
ESExtended Squitter
FPGAField Programmable Gate Array
GPSGlobal Positioning System
HWHardware
ICAOInternational Civil Aviation Organization
IFIntermediate Frequency
IFFIdentification Friend or Foe
NNNeural Network
Detection Probability
False Alarm Probability
PPMPulse Position Modulation
RFRadio Frequency
SDRSoftware Defined Radio
SSRSecondary Surveillance Radar
SWSoftware
TDRTransponder Data Record
  • SESAR. Available online: http://www.sesarju.eu/ (accessed on May 2017).
  • NEXTGEN. Available online: https://www.faa.gov/nextgen/ (accessed on May 2017).
  • Strohmeier, M. Large-scale Analysis of Aircraft Transponder Data. IEEE Aerosp. Electron. Syst. Mag. 2017 , 32 , 42–44. [ Google Scholar ]
  • RTCA Inc. Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance—Broadcast (ADS-B) and Traffic Information Services—Broadcast (TIS-B) ; DO-260B with Corrigendum 1; RTCA Inc.: Washington, DC, USA, 2011. [ Google Scholar ]
  • Stevens, M. Secondary Surveillance Radar ; Artech House: Norwood, MA, USA, 1988. [ Google Scholar ]
  • Strohmeier, M.; Lenders, V.; Martinovic, I. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Commun. Surv. Tutor. 2015 , 17 , 1066–1087. [ Google Scholar ] [ CrossRef ]
  • Leonardi, M.; Piracci, E.; Galati, G. ADS-B vulnerability to low cost jammers: Risk assessment and possible solutions. In Proceedings of the 2014 Tyrrhenian International Workshop on Digital Communications—Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV), Rome, Italy, 15–16 September 2014; pp. 41–46. [ Google Scholar ]
  • Butts, J.; McCallie, D.; Mills, R. Security analysis of the ADS-B implementation in the next generation air transportation system. Int. J. Crit. Infrastruct. Prot. 2011 , 4 , 78–87. [ Google Scholar ]
  • Sampigethaya, K.; Poovendran, R. Visualization & assessment of ADS-B security for green ATM. In Proceedings of the 2010 AIAA/IEEE 29th Digital Avionics Systems Conference, Salt Lake City, UT, USA, 3–7 Octorber 2010. [ Google Scholar ]
  • Strohmeier, M. Security in Next Generation Air Traffic Communication Networks. Ph.D. Thesis, University of Oxford, Oxford, UK, 2016. [ Google Scholar ]
  • Mantilla-Gaviria, I.; Leonardi, M.; Galati, G.; Balbastre-tejodor, J. Localization algorithms for multilateration (MLAT) systems in airport surface surveillance. Signal Image Video Process. 2015 , 9 , 1549–1558. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Lenardi, M.; Galati, G.; Gasbarra, M. Multiple faults integrity algorithm for mode s multilateration systems. In Proceedings of the Tyrrhenian International Workshop on Digital Communications—Enhanced Surveillance of Aircraft and Vehicles (TIWDC/ESAV), Capri, Italy, 3–5 September 2008. [ Google Scholar ]
  • Galati, G.; Leonardi, M.; Paciucci, V. Wide area surveillance using SSR mode S multilateration: Advantages and limitations. In Proceedings of the 2nd European Radar Conference (EURAD 2005), Paris, France, 3–4 Octorber 2005; pp. 225–229. [ Google Scholar ]
  • Hall, J.; Barbeau, M.; Kranakis, E. Detection of Transient in Radio Frequency Fingerprinting using Signal Phase. Proceedings of IASTED International Conference on Wireless and Optical Communications (WOC), Banff, AB, Canada, 14–16 July 2003. [ Google Scholar ]
  • Ellis, K.; Serinken, N. Characteristics of Radio Transmitter Fingerprints. Radio Sci. 2001 , 36 , 585–597. [ Google Scholar ] [ CrossRef ]
  • Kohno, T.; Broido, A.; Claffy, K.C. Remote physical device fingerprinting. IEEE Trans. Dependable Secur. Comput. 2005 , 2 , 93–108. [ Google Scholar ] [ CrossRef ]
  • Zeng, K.; Govindan, K.; Mohapatra, P. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks]. IEEE Wirel. Commun. 2010 , 10 , 56–62. [ Google Scholar ] [ CrossRef ]
  • International Civil Aviation Organization (ICAO). Annex 10 to the Convention on International Civil Aviation Aeronautical Telecommunication ; ICAO: Montreal, QC, Canada, 1998. [ Google Scholar ]
  • Goldsmith, A. Wireless Communication ; Cambridge University Press: New York, NY, USA, 2005. [ Google Scholar ]
  • Galati, G.; Leonardi, M.; Piracci, E.; Petrochilos, N.; Samanta, S. The transponder data recorder: Implementation and first results. IEEE Aerosp. Electron. Syst. Mag. 2014 , 29 , 6–13. [ Google Scholar ] [ CrossRef ]
  • Moser, D.; Leu, P.; Lenders, V.; Ranganathan, A.; Ricciato, F.; Capkun, S. Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures. In Proceedings of the ACM Conference on Mobile Computing and Networking, New York, NY, USA, 3–7 Octorber 2016. [ Google Scholar ]
  • Moller, M.F. A Scaled Conjugate Gradient Algorithm for Fast Supervised Learning. Neural Netw. 1993 , 6 , 525–533. [ Google Scholar ] [ CrossRef ]
  • Duda, R.; Hart, P.; Stork, D. Pattern Classification ; John Wiley and Sons: New York, NY, USA, 2003. [ Google Scholar ]

Click here to enlarge figure

Total number of replies232,888
Classified replies151,226 (64%)
Total number of Aircraft291
Classifed Aircraft202 (69%)
1—Linear4019.8
2—Quadratic2713.4
3—Oscillating146.9
4—Non Coherent10953.9
5—Mixed: Quadratic + Linear84.0
6—Mixed: Linear + Linear10.5
7—Wave31.5
NN Type7 Classes NN5 Classes NN
Logic ( )(4/10)(6/10)(4/10)(6/10)
Total number of Aircraft676676676676
Classifed Aircraft291 (43.0%)302 (44.7%)304 (45.0%)318 (47.1%)
Not Classified Aircraft261 (38.6%)261 (38.6%)248 (36.6%)248 (36.6%)
Aircraft sent to the Operator124 (18.4%)113 (16.7%)124 (18.4%)110 (16.3%)
3.6 %3.6 %3.8 %3.7 %
(No Aircraft—SDR)100%100%73.8 %73.8 %
(No Aircraft—Transponder)70.9%66.4%68.9 %63.8 %
(Aircraft—SDR)100%19.3%75.6 %12.6 %
(Aircraft—Transponder)64.4%12.7%61.5 %10.6 %

Share and Cite

Leonardi, M.; Di Gregorio, L.; Di Fausto, D. Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern. Aerospace 2017 , 4 , 51. https://doi.org/10.3390/aerospace4040051

Leonardi M, Di Gregorio L, Di Fausto D. Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern. Aerospace . 2017; 4(4):51. https://doi.org/10.3390/aerospace4040051

Leonardi, Mauro, Luca Di Gregorio, and Davide Di Fausto. 2017. "Air Traffic Security: Aircraft Classification Using ADS-B Message’s Phase-Pattern" Aerospace 4, no. 4: 51. https://doi.org/10.3390/aerospace4040051

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Last updated 2nd August 2024: Online ordering is currently unavailable due to technical issues. As we resolve the issues resulting from this, we are also experiencing some delays to publication. We are working hard to restore services as soon as possible and apologise for the inconvenience. For further updates please visit our website https://www.cambridge.org/news-and-insights/technical-incident

We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings .

Login Alert

ads b thesis

  • > Journals
  • > The Journal of Navigation
  • > Volume 70 Issue 4
  • > ADS-B: Probabilistic Safety Assessment

ads b thesis

Article contents

Ads-b: probabilistic safety assessment.

Published online by Cambridge University Press:  13 March 2017

In the effort to quantify Automatic Dependent Surveillance Broadcast (ADS-B) system safety, the authors have identified potential ADS-B failure modes in Syd Ali et al. (2014). Based on the findings, six potential hazards of ADS-B are identified in this paper. The authors then applied the Probabilistic Safety Assessment approach which includes Fault Tree Analysis (FTA) and Importance Analysis methods to quantify the system safety. FTA is applied to measure ADS-B system availability for each identified hazard while Importance Analysis is conducted to identify the most significant failure modes that may lead to the occurrence of the hazards. In addition, risk significance and safety significance of each failure mode are also identified. The result shows that the availability for the ADS-B system as a sole surveillance means is low at 0·898 in comparison to the availability of ADS-B system as supplemental or as primary means of surveillance at 0·95 and 0·999 respectively. The latter availability values are obtained from Minimum Aviation System Performance Standards (MASPS) for Automatic Dependent Surveillance-Broadcast (DO-242A).

Access options

Crossref logo

This article has been cited by the following publications. This list is generated based on data provided by Crossref .

  • Google Scholar

View all Google Scholar citations for this article.

Save article to Kindle

To save this article to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle .

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Volume 70, Issue 4
  • Busyairah Syd Ali (a1) , Washington Yotto Ochieng (a2) and Arnab Majumdar (a2)
  • DOI: https://doi.org/10.1017/S0373463317000054

Save article to Dropbox

To save this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Dropbox account. Find out more about saving content to Dropbox .

Save article to Google Drive

To save this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you used this feature, you will be asked to authorise Cambridge Core to connect with your Google Drive account. Find out more about saving content to Google Drive .

Reply to: Submit a response

- No HTML tags allowed - Web page URLs will display as text only - Lines and paragraphs break automatically - Attachments, images or tables are not permitted

Your details

Your email address will be used in order to notify you when your comment has been reviewed by the moderator and in case the author(s) of the article or the moderator need to contact you directly.

You have entered the maximum number of contributors

Conflicting interests.

Please list any fees and grants from, employment by, consultancy for, shared ownership in or any close relationship with, at any time over the preceding 36 months, any organisation whose interests may be affected by the publication of the response. Please also list any non-financial associations or interests (personal, professional, political, institutional, religious or other) that a reasonable reader would want to know about in relation to the submitted work. This pertains to all the authors of the piece, their spouses or partners.

  • S&P 500
  • Commodities
  • Personal Finance
  • Company News
  • Real Estate
  • International
  • Newsletters

Most bullish analyst on T-Mobile shares thesis

Sam McHugh, head of telecom equity research at BNP Paribas, joins BNN Bloomberg to discuss T-Mobile and top ideas in U.S. telcos.

ads b thesis

Public companies returning to private ownership: Morrow

ads b thesis

Correlation diverging between tech and crypto

ads b thesis

Oil headed for 4th weekly decline

ads b thesis

Should investors buy today's dip?

ads b thesis

Intel stock sinks after it suspends dividend, cuts 15,000 jobs

ads b thesis

Trading Day for Thursday, August 1, 2024

ads b thesis

COO Dave Kelly to succeed Kish Kapoor as CEO at Richardosn Wealth

ads b thesis

Hot Picks in sustainable stocks

ads b thesis

BCE focused on cost management

ads b thesis

TransAlta hits new year-to-date high

ads b thesis

Watch LIVE: BNN Bloomberg

ads b thesis

Healthy debt market crucial for small businesses: Ching

ads b thesis

Sell-off several months in making: portfolio manager

ads b thesis

August does well in election years: Carson Investment Research

ads b thesis

Underwhelming oil demand in Asia: Croft

IMAGES

  1. 2: Overview of the ADS-B system architecture. Aircraft receive

    ads b thesis

  2. Introduction to ADS-B

    ads b thesis

  3. ADS-B 101: what you need to know

    ads b thesis

  4. PPT

    ads b thesis

  5. ADS-B: What's the Big Deal?

    ads b thesis

  6. ADS-B/Mode S reply format.

    ads b thesis

VIDEO

  1. AA.NKH ME.N SURME KAA DUMBAALA DIYE JAATE HAI.N

  2. Notes Feature Tutorial

  3. Starting My Thesis as a Neuroscience Senior 🔬🗒️

  4. Y Shaped Antenna for 5G Enabled Gadgets and its MIMO for Smartphone Applications

  5. story of the entire Bible, i guess

  6. IB English

COMMENTS

  1. Automatic Dependent Surveillance Broadcast (ADS-B) Security Mitigation

    Stroman, Skylar, "Automatic Dependent Surveillance Broadcast (ADS-B) Security Mitigation through Multilateration" (2021). UNF Graduate Theses and Dissertations. 1106. https://digitalcommons.unf.edu/etd/1106. This Master's Thesis is brought to you for free and open access by the Student Scholarship at UNF Digital Commons.

  2. ADS-B classification using multivariate long short-term ...

    The second experiment accepted all ADS-B feature combinations and determined that airspeed, barometric pressure, and vertical speed had the most impact on aircraft engine type prediction. ... PhD thesis, Queen's University , (Canada) Basrawi K (2021) Aircraft classification from ads-b kinematic data. PhD thesis, Air Force Institute of Technology.

  3. Performance Analysis Of Automatic Dependent Surveillance-Broadcast (ADS

    This thesis work analyzes the performance of Automatic Dependent Surveillance-Broadcast (ADS-B) data received from Grand Forks International Airport, detects anomalies in the data and quantifies the associated potential risk. This work also assesses severity associated anomalous data in Detect and Avoid (DAA) for Unmanned Aircraft System (UAS). The received data were raw and archived in GDL-90 ...

  4. "Anomaly Detection And Trajectory Prediction Models For ADS-B Datasets

    This thesis focuses on enhancing civil aviation safety using machine learning (ML) algorithms, particularly focusing on vulnerabilities in the ADS-B and its role in improving the National Air Space (NAS) surveillance and safety. Through scholarly article surveys, foundational issues in the ADS-B are identified.

  5. PDF Secure Location Verification for ADS-B

    divide the approaches in ADS-B security in two main classes: Secure Broadcast Authentication and Secure Location Verification. The latter class aims at verifying (or at least estimating) whether location claims made by ADS-B participants are genuine, and will be the focus of this thesis. A major part of the ADS-B business case is attributed to ...

  6. PDF S D A I A D S B (ADS-B) E

    (ADS-B), which is a new satellite-based surveillance technology. In order to achieve the adoption of ADS-B, equipage by aircraft operators is essential. However, it is sometimes difficult to achieve the transition from a current technology to a new ... This thesis develops the system dynamics model to represent how individual users adopt a new

  7. PDF Encrypted Mode Select ADS-B for Tactical Military Situational Awareness

    services for secure ADS-B: confidentiality, identification, authentication, and integrity. We examine the trade-offs between different types of conventional encryption techniques to provide these services, and conclude that encryption can be successfully applied to Mode S ADS-B. A feasible approach for encrypted ADS-B is presented. Thesis ...

  8. SECURING THE ADS-B PROTOCOL FOR ATTACK-RESILIENT MULTIPLE A thesis

    SECURING THE ADS-B PROTOCOL FOR ATTACK-RESILIENT MULTIPLE UAV COLLISION AVOIDANCE by Zachary P. Languell, B.S. A thesis submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Master of Science with a Major in Computer Science May 2019 Committee Members: Qijun Gu, Chair Xiao Chen ...

  9. "ADS-B used in Improvement of Air Traffic Control" by Hao Wang

    Automatic dependent surveillance - broadcast (ADS-B) is a central component of the NextGen air traffic control program. This surveillance technology can replace current secondary surveillance radars (SSR) and improve cockpit situational awareness. The service can improve traffic surveillance capabilities by sharing accurate aircraft position information between pilots and air traffic ...

  10. Performance Analysis of Automatic Dependent Surveillance ...

    This thesis work analyzes the performance of Automatic Dependent Surveillance-Broadcast (ADS-B) data received from Grand Forks International Airport, detects anomalies in the data and quantifies the associated potential risk. This work also assesses severity associated anomalous data in Detect and Avoid (DAA) for Unmanned Aircraft System (UAS). The received data were raw and archived in GDL-90 ...

  11. (PDF) ADS-B over Satellite Coherent detection of weak Mode-S signals

    The work presented in this thesis shows the implementation of a multi-channel receiver for Automatic Dependent Surveillance Broadcast (ADS-B), a service for aircraft identification on a novel ...

  12. Design and development of ADS-B receiver

    The developed computing programme is integrated into the ADS-B receiver to get a more accurate positioning and trajectory of the aircrafts.Due to the lack of ground tools to measure the usefulness of the results, the filtered trajectory will be plotted against the initial trajectory. Visual observation and comparison is made to valide the results.

  13. PDF DetectingADS-Bspoo˝ngattacks

    Similar to this thesis, Eskilsson, Gustafsson, Khan, and Gurtov [8] shows the ease of which attacks on ADS-B and CPDLC can be performed. They used the same technique for their ADS-B data transmissions and receival as will be discussed further in this thesis. As will also be discussed further is the approach that was taken by Lindahl and Blåberg

  14. Performance Analysis of Automatic Dependent Surveillance-broadcast (Ads

    This thesis work analyzes the performance of Automatic Dependent Surveillance-Broadcast (ADS-B) data received from Grand Forks International Airport, detects anomalies in the data and quantifies ...

  15. PDF BACHELOR'S THESIS

    BACHELOR'S THESIS TITLE: Receiving and processing ADS-B signals for aircraft tracking DEGREE: Bachelor's degree in Airport Engineering AUTHOR: Xin Wang DIRECTOR: Montoro López, Gabriel DATE: 8th, July of 2019 . ABSTRACT Automatic Dependent Surveillance-Broadcast (ADS_B) system is one of the most

  16. Intrusion Detection in Automatic Dependent Surveillance-Broadcast (ADS

    Communication systems in aviation tend to focus on safety rather than security. Protocols such as Automatic Dependent Surveillance-Broadcast (ADS-B) use plain-text, unauthenticated messages and, therefore, open to various attacks. The open and shared nature of the ADS-B protocol makes its messages extremely vulnerable to various security threats, such as jamming, flooding, false information ...

  17. ADS-B Attack Classification using Machine Learning Techniques

    Automatic Dependent Surveillance Broadcast (ADS-B) is one of the most prominent protocols in Air Traffic Control (ATC). Its key advantages derive from using GPS as a location provider, resulting in better location accuracy while offering substantially lower deployment and operational costs when compared to traditional radar technologies. ADS-B not only can enhance radar coverage but also is a ...

  18. A safety assessment framework for the Automatic ...

    ADS-B is a surveillance system which relies on onboard aircraft navigation systems to obtain the aircraft position. ... U., 2007. Improved Integrity Algorithms for Integrated GPS/INS Systems in the Presence of Slowly Growing Errors. A Thesis Submitted for the Degree of Doctor of Philosophy of the University of London and Diploma of the ...

  19. (PDF) ADS-B: Probabilistic Safety Assessment

    The result shows that the availability for the ADS-B system as a sole surveillance means is low at 0·898 in comparison to the availability of ADS-B system as supplemental or as primary means of ...

  20. Facing airborne attacks on ADS-B data with autoencoders

    6.2. Simulated ADS-B attacks. In order to simulate the attack, we injected a single-window with anomalous behavior during the flight. The anomalous behavior is injected after 10 minutes of flight recording for 10 consecutive minutes (window of 600 ADS-B messages) in all of the test flights.

  21. Air Traffic Security: Aircraft Classification Using ADS-B Message's

    Automatic Dependent Surveillance-Broadcast (ADS-B) is a surveillance system used in Air Traffic Control. With this system, the aircraft transmits their own information (identity, position, velocity, etc.) to any equipped listener for surveillance scope. The ADS-B is based on a very simple protocol and does not provide any kind of authentication and encryption, making it vulnerable to many ...

  22. UND Scholarly Commons

    UND Scholarly Commons | University of North Dakota Research

  23. ADS-B: Probabilistic Safety Assessment

    In addition, risk significance and safety significance of each failure mode are also identified. The result shows that the availability for the ADS-B system as a sole surveillance means is low at 0·898 in comparison to the availability of ADS-B system as supplemental or as primary means of surveillance at 0·95 and 0·999 respectively.

  24. Georgia Lottery Thesis

    HOPE SCHOLARSHIP: HURTING OR HELPING? A Research Assignment Presented to: Dr. Edward Bouie In Partial Fulfillment of The Requirements for the Degree of Master of Education in Higher Education Leadership Mercer University By Veronica Gilliard April 28, 2015 When former Georgia Governor Zell Miller sought to establish a state lottery in 1991, shortly after his inauguration, many state residents ...

  25. Most bullish analyst on T-Mobile shares thesis

    Most bullish analyst on T-Mobile shares thesis. Sam McHugh, head of telecom equity research at BNP Paribas, joins BNN Bloomberg to discuss T-Mobile and top ideas in U.S. telcos. July 31, 2024 at 1:20PM EDT