2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC) 2017
DOI: 10.1109/dasc.2017.8102003
|View full text |Cite
|
Sign up to set email alerts
|

SAT : Security in the air using Tesla

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
32
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(32 citation statements)
references
References 5 publications
0
32
0
Order By: Relevance
“…The Security in the Air (SAT) scheme is completely based on TESLA [18] ] and has been inspired by the idea suggested in [17]. Here, the aircraft broadcasts every 30 seconds its certificate, public key and signed part of the key chain which is actually in use.…”
Section: A Symmetric Key Based Schemesmentioning
confidence: 99%
See 3 more Smart Citations
“…The Security in the Air (SAT) scheme is completely based on TESLA [18] ] and has been inspired by the idea suggested in [17]. Here, the aircraft broadcasts every 30 seconds its certificate, public key and signed part of the key chain which is actually in use.…”
Section: A Symmetric Key Based Schemesmentioning
confidence: 99%
“…There are several shortcomings with the currently proposed cryptographic schemes. First, all of the proposed schemes in literature [13]- [15], [18]- [20], [22], [23] require a secure channel before each take-off between the aircraft and the trusted third party (TTP) in order to preload personal security material to be used during the flight. The presence of a secure channel is not always evident and can cause delay in case the TTP gets offline, especially, as several small airports only have radios as a communication equipment.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Concerning the channel throughput and the jamming mitigation, the authors proposed many solutions in the past, exploiting frequency super-resolution or source separations techniques [11][12][13][14]. Many other security aspects were evaluated in other works [15][16][17][18][19], and some works propose the introduction of an authentication scheme in the Mode S protocol [20][21][22]. These latter proposals need a deep modification of the Mode S protocol that can have a big impact on the channel throughput for the transmission of authentication information.…”
mentioning
confidence: 99%