2018
DOI: 10.5120/ijca2018916598
|View full text |Cite
|
Sign up to set email alerts
|

Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)

Abstract: Although air traffic is continuously increasing on a global scale, the next generation of management in this field is successfully handling this expansion and improving the safety of billions of future passengers. In this paper, Automatic Dependent Surveillance-Broadcast (ADS-B) was examined, which is a primary system, unlike traditional radar. This technology allows aircraft to automatically broadcast their intentions and location; however, it faces certain threats from which it requires some manner of protec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…There are several approaches to protecting ADS-B data. For example, work [3] presents an analytical report, the purpose of which is to represent innovative ideas in the field of security of ADS-B technology. The work indicates possible ways to increase security and ensure confidentiality using symmetric and asymmetric encryption mechanisms.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…There are several approaches to protecting ADS-B data. For example, work [3] presents an analytical report, the purpose of which is to represent innovative ideas in the field of security of ADS-B technology. The work indicates possible ways to increase security and ensure confidentiality using symmetric and asymmetric encryption mechanisms.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…To detect spoofing, i.e. for the protection of wireless ADS-B communication, various security methods have been proposed, based on the existing cryptographic techniques (Finke et al, 2013), (Alghamdi et al, 2018). An alternative to this are necryptographic approaches which are based on signal separation (PHY-layer signal separation) (Leonardi et al, 2017), time and position verification (Schäfer et al, 2015), Doppler shift (Schäfer et al, 2016), etc.…”
Section: Ads-b Spoofingmentioning
confidence: 99%
“…It can be seen from the above that the Kalman filter algorithm can no longer store the previous information. Referring to the linear progressive method, the estimated value of the initial state and the Based on its covariance matrix, it is possible to obtain an estimate of the situation at the next time, revising the size of the estimate and reducing the computational and storage capacity [18]. Because of this, the Kalman filter has an estimate-revision composition, implemented as a linearly progressive algorithm for an optimal estimate.…”
Section: Kalman Filter Algorithmmentioning
confidence: 99%