2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing 2013
DOI: 10.1109/3pgcic.2013.61
|View full text |Cite
|
Sign up to set email alerts
|

An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19]. They either proposed to use symmetric key based authentication methods like MAC or suggested employ asymmetric key based authentication solutions like digital signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19]. They either proposed to use symmetric key based authentication methods like MAC or suggested employ asymmetric key based authentication solutions like digital signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Pan Weijun [84] et al proposed a data authentication scheme based on elliptic curve cryptography (ECC) and X.509 certificate [44]. Figure 10 shows the certification scheme [85]. The scheme uses the ECSDA algorithm to generate signatures for ADS-B data and timestamps, providing integrity and non-repudiation for ADS-B data.…”
Section: A) Public Key Encryptionmentioning
confidence: 99%
“…To delete PKI in public-key encryption and increase the efficiency of public-key encryption signature, considering the limited computing power of ADS-B airborne equipment, BaeK [85] et al proposed an offline/online signature method in 2013, which is based on the identity signature system does not require the participation of PKI. Since the identity-based cryptosystem mostly requires complex bilinear pairing operations.…”
Section: Figure 11 Identity-based Phased Encryption Schemementioning
confidence: 99%
“…Non-bilinear pairing schemes are proposed in [57][58][59][60][61][62]. The IBS scheme that is proposed in [57] is based on discrete logarithm which is simple and efficient.…”
Section: Summary Of Ibs Authentication Schemesmentioning
confidence: 99%
“…The private key of each user is divided into multiple shares corresponding to multiple attributes of user biometric. The scheme proposed in [58] uses online-offline signature for aircrafts applications. The aim is to reduce the cost of signature computation by doing all heavy calculation in the offline phase.…”
Section: Summary Of Ibs Authentication Schemesmentioning
confidence: 99%