Interference Immunity Assessment Identification Friend or Foe Systems

  • Chapter
  • First Online:
Data-Centric Business and Applications

Abstract

In the work, based on the consideration of the place and role of Identification friend or foe (IFF) systems in the airspace control system, it is shown that the principle of building modern IFF systems in the form of an asynchronous network for transmitting request and response signals and the implementation of the principle of servicing request signals based on an open single-channel queuing system with refuses, as well as the use of primitive coding of request signals and response signals do not allow an acceptable level of information support for the air control space and air traffic control in conditions of significant intensities of intra-systemic, as well as deliberate correlated and uncorrelated interference. A general description of the considering information systems is given and a brief description of the signals used in IFF systems is given. Based on the presentation of IFF systems in the form of two-channel systems for transmitting request and response signals, the noise immunity of aircraft re-sponders is evaluated under the action of request signals and intentional as well as unintended (intrasystem), correlated and uncorrelated interference in the request channel, which made it possible to evaluate the noise immunity of the entire IFF system in the form estimates of the probability of detection of airborne objects by the considering system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (France)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 106.99
Price includes VAT (France)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 137.14
Price includes VAT (France)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stevens B, Lewis F, Johnson E (2016) Aircraft control and simulation: dynamics, controls design, and autonomous. Wiley

    Google Scholar 

  2. Air Force Doctrine Annex 3-52 Airspace Control (2012, October 26) CreateSpace Independent Publishing Platform

    Google Scholar 

  3. Air Force Doctrine Annex 3-52 Airspace Control (2019, September 30) Independently published

    Google Scholar 

  4. Bruckbauer B (2004) The airspace control system—a key to operational maneuver. Naval war coll newport ri joint military operations dept, Newport, Rhode Island

    Book  Google Scholar 

  5. Buchanan T (1987) Hetactical air control system: its evolution and its need for battle managers. Research Report No. AU-ARI-87-1. Air University Press, Maxwell AFB, AL

    Google Scholar 

  6. Bloisi D, Iocchi L, Nardi D, Fiorini M, Graziano G (2012) Ground traffic surveillance system for air traffic control. In: 2012 12th international conference on ITS telecommunications. https://doi.org/10.1109/ITST.2012.6425151

  7. Stevens M (1988) Secondary surveillance radar. Artech House, Norwood

    Google Scholar 

  8. NATO (2016) STANAG 4193 PT III. Technical characteristics of IFF MK XA and MK XII interrogators and transponders. Part III: installed system characteristics, 23 May 2016

    Google Scholar 

  9. NATO (2008) STANAG 4193 PT IV. Technical characteristics of IFF MK XA and MK XII interrogators and transponders. Part IV: technical characteristics of mode S in military interrogators and transponders, 3 Oct 2008

    Google Scholar 

  10. Schuck T, Shoemaker B, Willey J (2000) Identification friend-or-foe (IFF) sensor uncertainties, ambiguities, deception and their application to the multi-source fusion process. In: Proceedings of the IEEE 2000 national aerospace and electronics conference. NAECON 2000. Engineering tomorrow (Cat. No.00CH37093). https://doi.org/10.1109/NAECON.2000.894896

  11. Ramasamy S, Sabatini R, Gardi A (2016) Cooperative and non-cooperative sense-and-avoid in the CNS+A context: a unified methodology. In: 2016 international conference on unmanned aircraft systems (ICUAS). https://doi.org/10.1109/ICUAS.2016.7502676

  12. Svyd I, Obod I, Maltsev O, Vorgul O, Zavolodko G, Goriushkina A (2018) Noise immunity of data transfer channels in cooperative observation systems: comparative analysis. In: 2018 international scientific-practical conference problems of infocommunications. Science and Technology (PIC S&T). IEEE. https://doi.org/10.1109/INFOCOMMST.2018.8632019

  13. Siergiejczyk M, Krzykowska K, Rosiński A (2014) Reliability assessment of cooperation and replacement of surveillance systems in air traffic. In: Proceedings of the ninth international conference on dependability and complex systems DepCoS-RELCOMEX. June 30–July 4, 2014, Brunów, Poland. https://doi.org/10.1007/978-3-319-07013-1_39

  14. Obod I, Svyd I, Maltsev O, Vorgul O, Maistrenko G, Zavolodko G (2018) Optimization of data transfer in cooperative surveillance systems. In: 2018 international scientific-practical conference problems of infocommunications. Science and technology (PIC S&T). IEEE. https://doi.org/10.1109/INFOCOMMST.2018.8632134

  15. Svyd I, Obod I, Maltsev O, Tkachova T, Zavolodko G (2019) Optimal request signals detection in cooperative surveillance systems. In: 2019 IEEE 2nd Ukraine conference on electrical and computer engineering (UKRCON), IEEE. https://doi.org/10.1109/UKRCON.2019.8879840

  16. Pollack J, Ranganatha P (2018) Aviation navigation systems security: ADS-B, GPS, IFF. In: International conference on security & management, SAM’18, Las Vegas, Nevada, USA

    Google Scholar 

  17. Svyd I, Obod I, Maltsev O, Zavolodko G, Maistrenko G, Saikivska L (2019) Method of enhancing information security of requesting cooperative surveillance systems. In: 2019 IEEE international scientific-practical conference problems of infocommunications, science and technology (PIC S&T). https://doi.org/10.1109/PICST47496.2019.9061366

  18. Strelnytskyi O, Svyd I, Obod I, Maltsev O, Voloshchuk O, Zavolodko G (2019) Assessment reliability of data in the identification Friend or Foe systems. In: 2019 IEEE 39th international conference on electronics and nanotechnology (ELNANO), IEEE. https://doi.org/10.1109/ELNANO.2019.8783397

  19. Svyd I, Obod I, Maltsev O, Strelnytskyi O, Zubkov O, Zavolodko G (2019) Method of increasing the identification Friend or Foe systems information security. In: 2019 3rd international conference on advanced information and communications technologies (AICT), IEEE. https://doi.org/10.1109/AIACT.2019.8847853

  20. Svyd I, Obod I, Maltsev O, Tkachova T, Zavolodko G (2019) Improving noise immunity in identification Friend or Foe systems. In: 2019 IEEE 2nd Ukraine conference on electrical and computer engineering (UKRCON), IEEE. https://doi.org/10.1109/UKRCON.2019.8879812

  21. Obod I, Svyd I, Maltsev O, Bakumenko B (2020) Comparative analysis of noise immunity systems identification Friend or Foe. In: 2020 IEEE 40th international conference on electronics and nanotechnology (ELNANO). https://doi.org/10.1109/elnano50318.2020.9088856

  22. Yarlykov, M., Chernyakov, M. (1979) Optimization Of Asynchronous Address Radio Communication Systems. Svyaz, Moscow.

    Google Scholar 

  23. Otsuyama T, Naganawa J, Honda J, Miyazaki H (2017) An analysis of signal environment on 1030/1090MHz aeronautical L-band systems. In: 2017 international symposium on antennas and propagation (ISAP). https://doi.org/10.1109/ISANP.2017.8228911

  24. Otsuyama T, Honda J, Naganawa J, Miyazaki H (2018) Analysis of signal environment on 1030/1090MHz aeronautical surveillance systems. In: 2018 IEEE international symposium on electromagnetic compatibility and 2018 IEEE Asia-Pacific symposium on electromagnetic compatibility (EMC/APEMC). https://doi.org/10.1109/ISEMC.2018.8394048

  25. Piracci E, Galati G, Petrochilos N, Fiori F (2009) 1090 MHz channel capacity improvement in the air traffic control context. Int J Microw Wirel Technol 1(3). https://doi.org/10.1017/s1759078709000191

  26. EUROCONTROL (2006, July) CASCADE programme: 1090 MHz capacity study–final report, 2.7 edn

    Google Scholar 

  27. Chen Y, Lo S, Enge P, Jan S (2014) Evaluation & comparison of ranging using Universal Access Transceiver (UAT) and 1090 MHz Mode S extended squitter (Mode S ES). 2014 IEEE/ION Position, Location and Navigation Symposium—PLANS 2014. https://doi.org/10.1109/PLANS.2014.6851456

  28. Li W, Kamal P (2011) Integrated aviation security for defense-in-depth of next generation air transportation system. In: 2011 IEEE international conference on technologies for homeland security (HST). https://doi.org/10.1109/ths.2011.6107860

  29. Skaves P (2011) Information for cyber security issues related to aircraft systems. In: 2011 IEEE/AIAA 30th digital avionics systems conference. https://doi.org/10.1109/dasc.2011.6095968

  30. De Cerchio R, Riley C (2011) Aircraft systems cyber security. In: 2011 IEEE/AIAA 30th digital avionics systems conference. https://doi.org/10.1109/dasc.2011.6095969

  31. El-Badawy E, EL-Masry W, Mokhtar M, Hafez A (2010) A secured chaos encrypted mode-S aircraft identification friend or foe (IFF) system. In: 2010 4th international conference on signal processing and communication systems. https://doi.org/10.1109/icspcs.2010.5709756

  32. Purton L, Abbass H, Alam S (2010) Identification of ADS-B system vulnerabilities and threats. In: Australasian Transport Research Forum 2010 Proceedings 29 September–1 October 2010, Canberra, Australia

    Google Scholar 

  33. De Cerchio R, Riley C (2012) Aircraft systems cyber security. In: 2012 integrated communications, navigation and surveillance conference. https://doi.org/10.1109/icnsurv.2012.6218454

  34. Globus I (1972) Binary coding in asynchronous systems. Svyaz , Moscow

    Google Scholar 

  35. Belov A, Kozlov S, Korobkov A, Chabdarov S (2018) Multi-signal extraction of address flows in asynchronous impulse radio-systems. Vestnik KGTU im. A.N. Tupoleva, 74(4)

    Google Scholar 

  36. Tsikin I, Poklonskaya E (2017) Secondary surveillance radar signals processing at the remote analysis station. St. Petersburg State Polytechnical Univ J Comput Sci Telecommun Control Syst 10(2). https://doi.org/10.18721/JCSTCS.10205

  37. Svyd I, Obod I, Maltsev O, Shtykh I, Zavolodko G, Maistrenko G (2019) Model and method for request signals processing of secondary surveillance radar. In: 2019 IEEE 15th international conference on the experience of designing and application of CAD systems (CADSM). https://doi.org/10.1109/CADSM.2019.8779347

  38. Zhironkin S, Bliznyuk S, Kuchin A (2019) Jamming resistance of the inbound channel of an identification system with broadband signals and error control codes in the conditions of pulse noise and intra-system jamming. J Siberian Fed Univ Eng Technol. https://doi.org/10.17516/1999-494X-0166

  39. Petrov A, Mikhalev V (2019) Bit-error rate in a digital data transmitting channel at chaotic impulse noise with random radio-pulse duration action. Syst Control Commun and Secur 3. https://doi.org/10.24411/2410-9916-2019-10303

  40. Svyd I, Obod I, Maltsev O, Shtykh I, Zavolodko G (2019) Model and method for detecting request signals in identification friend or foe systems. In: 2019 IEEE 15th international conference on the experience of designing and application of CAD systems (CADSM). https://doi.org/10.1109/CADSM.2019.8779322

  41. Malyarenko A (2007) Secondary radar systems for air traffic control and state recognition. HUVS, Kharkiv

    Google Scholar 

  42. Guo Y, Yang J, Guan C (2013) A mode 5 signal detection method based on phase and amplitude correlation. In: 2013 ninth international conference on natural computation (ICNC). https://doi.org/10.1109/ICNC.2013.6818164

  43. Huan L, Feng Z, Bai L, Jian W (2015) One joint demodulation and despreading algorithm for MOD5. Open Autom Control Syst J 7(1). https://doi.org/10.2174/1874444301507010386

  44. SBIR (2018) Mode 5 identification Friend or Foe (IFF) simulation and subsequent RF injection, 2nd ed. Department of Defense, Scalable Network Technologies, Inc., Culver City, CA, 12 Dec 2018

    Google Scholar 

  45. Lenshin A, Lebedev V (2015) Characteristics of detection of signals of imitostable regimes of identification systems. Dynamics of complex systems—XXI century, vol 9, issue no 1

    Google Scholar 

  46. Lenshin A, Lebedev V (2016) Algorithm for detecting signals of imitostable modes of identification. Telecommunications (7)

    Google Scholar 

  47. Leonardi M, Gerardi F (2020) Aircraft mode S transponder fingerprinting for intrusion detection. Aerospace 7(3). https://doi.org/10.3390/aerospace7030030

  48. Obod I, Svyd I, Maltsev O, Zavolodko G, Pavlova D (2020) Optimization of data processing of primary radar systems. In: 2020 IEEE 40th international conference on electronics and nanotechnology (ELNANO). https://doi.org/10.1109/elnano50318.2020.9088842

  49. Obod I, Svyd I, Maltsev O, Zavolodko G, Pavlova D (2020) Evaluation of measuring accuracy of the airborne object Azimuth when fusion the primary data radar observation systems. In: 2020 IEEE 15th international conference on advanced trends in radioelectronics, telecommunications and computer engineering (TCSET). https://doi.org/10.1109/TCSET49122.2020.235511

  50. Pavlova D, Zavolodko G, Obod I, Svyd I, Maltsev O, Saikivska L (2019) Optimizing data processing in information networks of airspace surveillance systems. In: 2019 10th international conference on dependable systems, services and technologies (DESSERT). https://doi.org/10.1109/DESSERT.2019.8770022

  51. Borisov V, Zinchuk V, Limarev A, Shestopalov V (2011) Interference immunity of radio communication systems with spectrum spreading by direct modulation by a pseudo-random sequence, 2nd edn. RadioSoft, Moscow

    Google Scholar 

  52. Obod, I. (1999) Integrated coordinate-and-time support for the address inquiry in the secondary radar systems. Telecommun Radio Eng 53(3). https://doi.org/10.1615/TelecomRadEng.v53.i3.100

  53. Pankov V, Manezhkin A, Mytil V (2016) Evolution of aviation means of identification. RIO IPHVF RAS, Chernogolovka

    Google Scholar 

  54. Svyd I, Obod I, Maltsev O, Shtykh I, Maistrenko G, Zavolodko G (2019) Comparative quality analysis of the air objects detection by the secondary surveillance radar. In: 2019 IEEE 39th international conference on electronics and nanotechnology (ELNANO). https://doi.org/10.1109/ELNANO.2019.8783539

  55. Obod I, Svyd I, Maltsev O, Vorgul O, Maistrenko G, Zavolodko G (2020) Optimization of the quality of information support for consumers of cooperative surveillance systems. In: Radivilova T, Ageyev D, Kryvinska N (eds) Data-centric business and applications. Lecture notes on data engineering and communications technologies, vol 48. Springer, Cham. https://doi.org/10.1007/978-3-030-43070-2_8

  56. Obod I, Svyd I, Maltsev O, Zavolodko G, Pavlova D, Maistrenko G (2020) Fusion the coordinate data of airborne objects in the networks of surveillance radar observation systems. In: Radivilova T, Ageyev D, Kryvinska N (eds) Data-centric business and applications. Lecture notes on data engineering and communications technologies, vol 48. Springer, Cham. https://doi.org/10.1007/978-3-030-43070-2_31

  57. Leonardi M, Di Gregorio L, Di Fausto D (2017) Air traffic security: aircraft classification using ADS-B message’s phase-pattern. Aerospace 4(4). https://doi.org/10.3390/aerospace4040051.

  58. Mantilla-Gaviria I, Galati G, Leonardi M, Balbastre-Tejedor J (2014) Time-difference-of-arrival regularised location estimator for multilateration systems. IET Radar Sonar Navig 8(5). https://doi.org/10.1049/iet-rsn.2013.0151

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iryna Svyd .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Svyd, I., Obod, I., Maltsev, O. (2021). Interference Immunity Assessment Identification Friend or Foe Systems. In: Ageyev, D., Radivilova, T., Kryvinska, N. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 69. Springer, Cham. https://doi.org/10.1007/978-3-030-71892-3_12

Download citation

Publish with us

Policies and ethics

Navigation