2021
DOI: 10.1049/cmu2.12152
|View full text |Cite
|
Sign up to set email alerts
|

Efficient anonymous authentication scheme for automatic dependent surveillance‐broadcast system with batch verification

Abstract: Automatic Dependent Surveillance-Broadcast (ADS-B) system provides significant improvements in air traffic control system such as optimal routing in non-radar environments with a new level of safety and efficiency. The ADS-B system is being installed in many aircrafts in recent year. The ADS-B equipped aircraft broadcasts the air traffic information to nearby aircraft and ground stations either once or twice per second.Because of the open channel communication atmosphere, the ADS-B system is affected by many s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 40 publications
(79 reference statements)
0
14
0
Order By: Relevance
“…Security and privacy are the major concern in the IoD environment [11][12][13][14]. There are many works focused on security issues concerning drones [15], but this work not only discusses the security issues but also focuses on the location privacy of the drones.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy are the major concern in the IoD environment [11][12][13][14]. There are many works focused on security issues concerning drones [15], but this work not only discusses the security issues but also focuses on the location privacy of the drones.…”
Section: Related Workmentioning
confidence: 99%
“…A CL-NCRS can meet the unconditional anonymity [18][19][20]: no attacker can obtain the private key of all possible signers in illegal ways. For the adversary, since a j (j ≠ s and a j ≠ 1) is randomly chosen from Z * q , then the probability of selecting a 1 , a 2 , .…”
Section: □ Theorem 4 Cl-ncrs Can Satisfy the Unconditional Anonymity Of Ring Signersmentioning
confidence: 99%
“…Also, the physically unclonable functions provide lightweight mutual authentication and maintain the 𝑉′𝑠 physical security. Further, the Blockchain is utilized to keep track of 𝑉 𝑖 parameters, user authentication information, preserve the trustworthiness of the distributed untrusted VANET and improve the scalability of the VANET during authentication [8][9][10][11][12][13]. In the proposed system, authentication information is one of the essential parameters.…”
Section: Introductionmentioning
confidence: 99%