Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2014
DOI: 10.1002/sec.1021
|View full text |Cite
|
Sign up to set email alerts
|

Making air traffic surveillance more reliable: a new authentication framework for automatic dependent surveillance‐broadcast (ADS‐B) based on online/offline identity‐based signature

Abstract: Automatic dependent surveillance‐broadcast is an emerging surveillance technology for the future “e‐enabled” aircrafts, which will make it possible for aircrafts to share their location data with neighboring aircrafts, ground controllers, and other interested parties. In order to provide the automatic dependent surveillance‐broadcast communications with a high level of accuracy and integrity, a reliable authentication mechanism is required. So far, however, very few cryptographic solutions have been offered to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 23 publications
(29 reference statements)
0
12
0
Order By: Relevance
“…Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19]. They either proposed to use symmetric key based authentication methods like MAC or suggested employ asymmetric key based authentication solutions like digital signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Non-cryptographic methods include multilateration [13], [21], distance bounding [21], Kalman filtering [21], data fusion [21] and the lightweight location verification proposed by Strohmeier et al [22]. In terms of cryptographic solutions, some efforts have been made to provide the integrity and authenticity of ADS-B messages in the literature [2], [3], [8], [12], [18], [19]. They either proposed to use symmetric key based authentication methods like MAC or suggested employ asymmetric key based authentication solutions like digital signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, it is important to research on antijamming approaches in ADS-B system. Some work such as data fusion with other systems, multilateration and various cryptographic schemes, has already been done on ADS-B security over the last decade [6][7][8][9]. However, these approaches proposed in the literatures have their disadvantages.…”
Section: Figure 1 1090es Data Linkmentioning
confidence: 99%
“…Finally, jamming is nulled by the weight vector as H = y w X (8) Subsequently, y can be processed by an ADS-B receiver to decode ADS-B messages.…”
Section: Mathematical Modelmentioning
confidence: 99%
“…Our contributions in this paper are extending the definition of universal cryptosystems provided in to identity‐based cryptography, and proposing two ID‐based universal cryptosystem schemes. Identity‐based cryptosystems have applications in conditions where distribution of certificates are costly, as they do not require any public key infrastructure, such as Wireless Sensor Networks and Air Traffic Surveillance Networks . In this paper, we generalize the definition of universal semantic security to the ID‐based cryptography setting and prove the security of our two schemes.…”
Section: Introductionmentioning
confidence: 95%
“…After the introduction of universal re‐encryption by Golle et al in 2004, there have been various studies, which used universal re‐encryption in different applications , however, there also have been some improvements for universal re‐encryption. Fairbrother in 2005 significantly improved the efficiency of the scheme in terms of communication.…”
Section: Introductionmentioning
confidence: 99%