documents | ||
.gitignore | ||
ADSB_Encoder.py | ||
Encoder.py | ||
HackRF.py | ||
LICENSE | ||
ModeS.py | ||
ModeSLocation.py | ||
PPM.py | ||
README.md |
"ADS-B Out" add-on for SoftRF-Emu, Stratux, etc...
This repository contains "ADS-B Out" encoder for Tx-capable SDR hardware.
It is currently written in architecture independent Python language and can be used as an add-on for existing open source "ADS-B In" solutions. One known good example is Stratux.
Disclaimer
The source code is published for academic purpose only.
Instructions
- Execute ADSB_Encoder.py script with
<ICAO>
<Latitude>
<Longtitude>
<Altitude>
arguments:
$ ADSB_Encoder.py 0xABCDEF 12.34 56.78 9999.0
$ ls Samples.iq8s
Samples.iq8s
$
- Transmit the signal into air:
$ hackrf_transfer -t Samples_256K.iq8s -f 868000000 -s 2000000 -x 10
call hackrf_sample_rate_set(2000000 Hz/2.000 MHz)
call hackrf_baseband_filter_bandwidth_set(1750000 Hz/1.750 MHz)
call hackrf_set_freq(868000000 Hz/868.000 MHz)
Stop with Ctrl-C
0.5 MiB / 1.000 sec = 0.5 MiB/second
User cancel, exiting...
Total time: 1.00038 s
hackrf_stop_tx() done
hackrf_close() done
hackrf_exit() done
fclose(fd) done
exit
$
- -t is the input file to transmit
- -f is the frequency in hertz. In the real world this would be 1090000000 but do not use that
- -s is the sample rate in hertz
- -x is the gain
Validation
$ sudo dump1090 --net --freq 868000000
...
References
- "Gr-Air-Modes", Nick Foster, 2012
- "EXPLOITING THE AUTOMATIC DEPENDENT SURVEILLANCE BROADCAST SYSTEM VIA FALSE TARGET INJECTION", Domenic Magazu III, 2012
- "ADS-B out by HACKRF and received over the air by rtl-sdr dongle and dump1090", Jiao Xianjun, 2014
- "Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices", Andrei Costin and Aurelien Francillon, 2015
- "ADS-B Decoding Guide", Junzi Sun, 2017
History
This is a fork orginally from https://github.com/lyusupov/ADSB-Out in September 2017.