2017
DOI: 10.1109/tits.2016.2586301
|View full text |Cite
|
Sign up to set email alerts
|

How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
4

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(29 citation statements)
references
References 15 publications
0
25
0
4
Order By: Relevance
“…Since the ADS-B messages can be received by any individual ADS-B receiver, this results in substantial security concerns for ADS-B-based communication systems. Baek et al [185] proposed an identity-based encryption scheme by modifying the original identity-based encryption of Boneh and Franklin [186]. He et al developed the triple-level hierarchical identity-based signature scheme of [187] for practical deployment.…”
Section: Security Mechanismsmentioning
confidence: 99%
“…Since the ADS-B messages can be received by any individual ADS-B receiver, this results in substantial security concerns for ADS-B-based communication systems. Baek et al [185] proposed an identity-based encryption scheme by modifying the original identity-based encryption of Boneh and Franklin [186]. He et al developed the triple-level hierarchical identity-based signature scheme of [187] for practical deployment.…”
Section: Security Mechanismsmentioning
confidence: 99%
“…According to the review article by Strohmeier et al [16], ADS-B protection technology is mainly divided into two categories: secure broadcast authentication [17] and secure location verification [18] technology.…”
Section: Existing Countermeasuresmentioning
confidence: 99%
“…This proposal suffers from implementation difficulties, because implementing a PKI infrastructure in a global maritime environment may prove to be quite a demanding and complicated task, and because certificates are very resource demanding in the challenging and costly maritime wireless communications environment. For these same reasons, works that aim at improving the security of similar systems, such as the Automatic Dependent Surveillance -Broadcast (ADS-B) in aviation, and propose the use of identity-based cryptography and symmetric cryptography [35], [36] are inapplicable in the maritime environment. Work that is not yet clear whether or how may affect the future of AIS security is also underway 3 .…”
Section: Related Workmentioning
confidence: 99%