EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cy...

Full description

Saved in:
Bibliographic Details
Published inChinese journal of aeronautics Vol. 27; no. 3; pp. 688 - 696
Main Authors Yang, Haomiao, Huang, Rongshun, Wang, Xiaofen, Deng, Jiang, Chen, Ruidong
Format Journal Article
LanguageEnglish
Published Elsevier Ltd 01.06.2014
Subjects
Online AccessGet full text
ISSN1000-9361
DOI10.1016/j.cja.2014.04.028

Cover

Abstract Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.
AbstractList Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.
Author Yang Haomiao Huang Rongshun Wang Xiaofen Deng Jiang Chen Ruidong
AuthorAffiliation School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China The Second Research Institute, Civil Aviation Administration of China, Chengdu 610041, China
Author_xml – sequence: 1
  givenname: Haomiao
  surname: Yang
  fullname: Yang, Haomiao
  email: haomyang@uestc.edu.cn
  organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
– sequence: 2
  givenname: Rongshun
  surname: Huang
  fullname: Huang, Rongshun
  organization: The Second Research Institute, Civil Aviation Administration of China, Chengdu 610041, China
– sequence: 3
  givenname: Xiaofen
  surname: Wang
  fullname: Wang, Xiaofen
  organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
– sequence: 4
  givenname: Jiang
  surname: Deng
  fullname: Deng, Jiang
  organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
– sequence: 5
  givenname: Ruidong
  surname: Chen
  fullname: Chen, Ruidong
  organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
BookMark eNp9kM1uFDEMx3MoUj8fgFu4cZnFmcxkdsVpthRaqQiJ9ogUJR6nm9VO0ibZSrwKz9J36iswyxYOHCpZsmX754__MTsIMRBjbwXMBAj1YT3DtZnVIJoZTFbPD9iRAIBqIZU4ZMc5rwHkohNwxH5cLPv--ekX7wMn5zx6CoXbFM2AJhdutmU1ZTya4mPgGVc0Encx8f7TTbXkGMdxG_6Wrck08Cm4Wt5UX7-fsjfObDKdvfgTdvv54vb8srr-9uXqvL-usJF1qTqUtlGgpLVKuk7NgSzWysDCGlCiJlRQt06htS10Tnbk5ohiAEWtrZ08Ye_3Y-9TfNhSLnr0GWmzMYHiNmuhFECrYCGnVrFvxRRzTuT0ffKjST-1AL0TT6_1JJ7eiadhsno-Md1_DPry59-SjN-8Sn7ckzQ9_-gp6bzTF2nwibDoIfpX6Xcve1cx3D34cPfv2BaE6Nqmkb8B0oGYyA
CitedBy_id crossref_primary_10_1049_cmu2_12152
crossref_primary_10_1109_JIOT_2018_2882633
crossref_primary_10_1016_j_cja_2023_03_008
crossref_primary_10_1109_ACCESS_2020_3007182
crossref_primary_10_1016_j_ijcip_2024_100728
crossref_primary_10_1109_JIOT_2023_3337543
crossref_primary_10_1109_TAES_2018_2890354
crossref_primary_10_1109_TITS_2016_2612584
crossref_primary_10_3390_data3020019
crossref_primary_10_1007_s10586_024_04566_5
crossref_primary_10_1109_TAES_2019_2933957
Cites_doi 10.1109/JPROC.2011.2162209
10.1109/TIT.2009.2013048
10.1007/s001450010003
10.1109/COMSNETS.2011.5716527
10.1109/LCOMM.2002.808397
10.1109/CSQRWC.2012.6294960
10.1016/j.ijcip.2011.06.001
10.1007/3-540-36288-6_2
ContentType Journal Article
Copyright 2014
Copyright_xml – notice: 2014
DBID 2RA
92L
CQIGP
W92
~WA
6I.
AAFTH
AAYXX
CITATION
7TB
8FD
FR3
H8D
L7M
DOI 10.1016/j.cja.2014.04.028
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
中文科技期刊数据库-7.0平台
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Aerospace Database
Engineering Research Database
Technology Research Database
Mechanical & Transportation Engineering Abstracts
Advanced Technologies Database with Aerospace
DatabaseTitleList
Aerospace Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR
EndPage 696
ExternalDocumentID 10_1016_j_cja_2014_04_028
S1000936114000983
50117544
GroupedDBID --K
-SC
-S~
0R~
0SF
1B1
1~5
29B
2B.
2C0
2RA
4.4
457
4G.
5GY
5VR
5VS
5XA
5XD
5XL
6I.
7-5
71M
92H
92I
92L
92R
93N
9D9
9DC
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
ADMUD
AEKER
AENEX
AEXQZ
AFTJW
AFUIB
AGHFR
AI.
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
BCNDV
CAJEC
CAJUS
CCEZO
CEKLB
CHBEP
CQIGP
CS3
CW9
DU5
EBS
EJD
EO9
EP2
EP3
FA0
FDB
FNPLU
GBLVA
GROUPED_DOAJ
HZ~
IPNFZ
IXB
J1W
KQ8
M41
N9A
NCXOZ
O-L
O9-
OK1
OZT
Q--
Q-2
RIG
ROL
SDF
SDG
SES
SSZ
TCJ
TGT
U1G
U5M
VH1
W92
~M3
~WA
AAXDM
ABWVN
ACRPL
ADNMO
ADVLN
AKRWK
AAYWO
AAYXX
ACVFH
ADCNI
AEUPX
AFPUW
AIGII
AKBMS
AKYEP
CITATION
7TB
8FD
FR3
H8D
L7M
ID FETCH-LOGICAL-c432t-7c3b46063bb63f7680ebc26a09ba0612ec6025f6cbb507f37ef8cc1d06e5b2f3
IEDL.DBID IXB
ISSN 1000-9361
IngestDate Fri Jul 11 09:55:51 EDT 2025
Thu Apr 24 22:54:17 EDT 2025
Tue Jul 01 04:47:59 EDT 2025
Thu Feb 27 05:28:16 EST 2025
Wed Feb 14 10:36:17 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Message recovery
Broadcast authentication
Identity-based signature
Satellite communication
Air traffic management
Language English
License http://creativecommons.org/licenses/by-nc-nd/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c432t-7c3b46063bb63f7680ebc26a09ba0612ec6025f6cbb507f37ef8cc1d06e5b2f3
Notes Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.
Air traffic management; Broadcast authentication; Identity-based signature; Message recovery; Satellite communication
11-1732/V
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S1000936114000983
PQID 1660056093
PQPubID 23500
PageCount 9
ParticipantIDs proquest_miscellaneous_1660056093
crossref_primary_10_1016_j_cja_2014_04_028
crossref_citationtrail_10_1016_j_cja_2014_04_028
elsevier_sciencedirect_doi_10_1016_j_cja_2014_04_028
chongqing_primary_50117544
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-06-01
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-06-01
  day: 01
PublicationDecade 2010
PublicationTitle Chinese journal of aeronautics
PublicationTitleAlternate Chinese Journal of Aeronautics
PublicationYear 2014
Publisher Elsevier Ltd
Publisher_xml – name: Elsevier Ltd
References Washington D. C.; Federal Register; 2011.
Hess (b0060) 2003
Federal Aviation Administration.
RTCA DO-282 (b0075) 2002
Abe, Okamoto (b0055) 1999
Chen TC. An authenticated encryption scheme for automatic dependent surveillance-broadcast data link. In
Mitsunari, Sakai, Kasahara (b0095) 2002; 85
Lee, Lee, Park (b0125) 2009; 55
RTCA DO-260A (b0080) 2002
Civil Aviation Administrati on of China. The overall planning and implementation of China’s civil aviation ADS-B (draft), Beijing; Air Traffic Management Bureau, CAAC; 2012.
Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Desmedt YG, editor.
McCallie, Butts, Mills (b0085) 2011; 4
Boneh, Boyen (b0090) 2004
Pointcheval, Stern (b0110) 2000; 13
2011 Jan 4–8; Banglore, India; 2011. p. 1–6.
Li, Lin, Yang, Liang, Lu, Shen (b0105) 2013; PP
Berlin Heidelberg: Springer; 2003. p. 18–30.
2012 Jul 23–27; New Taipei City; 2012. p. 127–31.
Zhang, Susilo, Mu (b0045) 2005
Yi (b0065) 2003; 7
Washington D.C.; Federal Register; 2010.
Boneh, Franklin (b0100) 2001
CertiVox – strong 2 factor authentication and security software [Internet], [updated 2014 January 16; cited 2014 March 1]. Available from
.
Sampigethaya, Poovendran, Shetty, Davis, Royalty (b0005) 2011; 99
Boneh, Lynn, Shacham (b0115) 2001
Pan, Feng, Wang (b0040) 2012; 10
Shamir (b0050) 1985
Perrig, Canetti, Tygar, Song (b0030) 2002; 5
Sampigethaya K, Poovendran R. Security and privacy of future aircraft wireless communications with offboard systems. In
Hess (10.1016/j.cja.2014.04.028_b0060) 2003
Lee (10.1016/j.cja.2014.04.028_b0125) 2009; 55
10.1016/j.cja.2014.04.028_b0025
Mitsunari (10.1016/j.cja.2014.04.028_b0095) 2002; 85
10.1016/j.cja.2014.04.028_b0020
Pointcheval (10.1016/j.cja.2014.04.028_b0110) 2000; 13
10.1016/j.cja.2014.04.028_b0120
Abe (10.1016/j.cja.2014.04.028_b0055) 1999
Sampigethaya (10.1016/j.cja.2014.04.028_b0005) 2011; 99
Li (10.1016/j.cja.2014.04.028_b0105) 2013; PP
10.1016/j.cja.2014.04.028_b0035
Yi (10.1016/j.cja.2014.04.028_b0065) 2003; 7
10.1016/j.cja.2014.04.028_b0015
Shamir (10.1016/j.cja.2014.04.028_b0050) 1985
Perrig (10.1016/j.cja.2014.04.028_b0030) 2002; 5
Boneh (10.1016/j.cja.2014.04.028_b0090) 2004
10.1016/j.cja.2014.04.028_b0130
10.1016/j.cja.2014.04.028_b0010
RTCA DO-282 (10.1016/j.cja.2014.04.028_b0075) 2002
Zhang (10.1016/j.cja.2014.04.028_b0045) 2005
Boneh (10.1016/j.cja.2014.04.028_b0100) 2001
Boneh (10.1016/j.cja.2014.04.028_b0115) 2001
Pan (10.1016/j.cja.2014.04.028_b0040) 2012; 10
RTCA DO-260A (10.1016/j.cja.2014.04.028_b0080) 2002
McCallie (10.1016/j.cja.2014.04.028_b0085) 2011; 4
References_xml – reference: Civil Aviation Administrati on of China. The overall planning and implementation of China’s civil aviation ADS-B (draft), Beijing; Air Traffic Management Bureau, CAAC; 2012.
– start-page: 56
  year: 2004
  end-page: 73
  ident: b0090
  article-title: Short signatures without random oracles. Advances in Cryptology-EUROCRYPT
– volume: PP
  start-page: 1
  year: 2013
  ident: b0105
  article-title: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
  publication-title: IEEE Trans Parallel Distrib Sys
– reference: Sampigethaya K, Poovendran R. Security and privacy of future aircraft wireless communications with offboard systems. In:
– reference: Federal Aviation Administration.
– start-page: 47
  year: 1985
  end-page: 53
  ident: b0050
  article-title: Identity-based cryptosystems and signature schemes. Advances in cryptology
– reference: CertiVox – strong 2 factor authentication and security software [Internet], [updated 2014 January 16; cited 2014 March 1]. Available from:
– reference: ; 2011 Jan 4–8; Banglore, India; 2011. p. 1–6.
– volume: 55
  start-page: 1793
  year: 2009
  end-page: 1803
  ident: b0125
  article-title: Efficient and generalized pairing computation on abelian varieties
  publication-title: IEEE Trans Inf Theory
– reference: ; 2012 Jul 23–27; New Taipei City; 2012. p. 127–31.
– start-page: 45
  year: 2005
  end-page: 56
  ident: b0045
  article-title: Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Financial Cryptography and Data Security
– year: 2003
  ident: b0060
  article-title: Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography
– volume: 7
  start-page: 76
  year: 2003
  end-page: 78
  ident: b0065
  article-title: An identity-based signature scheme from the Weil pairing
  publication-title: IEEE Commun Lett
– reference: . Berlin Heidelberg: Springer; 2003. p. 18–30.
– reference: . Washington D.C.; Federal Register; 2010.
– volume: 99
  start-page: 2040
  year: 2011
  end-page: 2055
  ident: b0005
  article-title: Future e-enabled aircraft communications and security: the next 20 years and beyond
  publication-title: Proc IEEE
– volume: 10
  start-page: 51
  year: 2012
  end-page: 55
  ident: b0040
  article-title: ADS-B data authentication based on ECC and X. 509 certificate
  publication-title: J Electron Sci Technol
– start-page: 514
  year: 2001
  end-page: 532
  ident: b0115
  article-title: Short signatures from the Weil pairing. Advances in Cryptology-ASIACRYPT
– volume: 13
  start-page: 361
  year: 2000
  end-page: 396
  ident: b0110
  article-title: Security arguments for digital signatures and blind signatures
  publication-title: J Cryptol
– reference: , Washington D. C.; Federal Register; 2011.
– volume: 4
  start-page: 78
  year: 2011
  end-page: 87
  ident: b0085
  article-title: Security analysis of the ADS-B implementation in the next generation air transportation system
  publication-title: Int J Crit Infrastruct Prot
– reference: .
– start-page: 378
  year: 1999
  end-page: 389
  ident: b0055
  article-title: A signature scheme with message recovery as secure as discrete logarithm. Advances in Cryptology-ASIACRYPT’99
– year: 2002
  ident: b0075
  article-title: Minimum operational performance standards for universal access transceiver (UAT) automatic dependent surveillance – broadcast
– year: 2002
  ident: b0080
  article-title: Minimum operational performance standard for 1090 MHz extended squitter ADS-B and TIS-B
– volume: 85
  start-page: 481
  year: 2002
  end-page: 484
  ident: b0095
  article-title: A new traitor tracing
  publication-title: IEICE Trans Fundam Electron Commun Comput Sci
– reference: Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Desmedt YG, editor.
– volume: 5
  start-page: 2
  year: 2002
  end-page: 13
  ident: b0030
  article-title: The TESLA broadcast authentication protocol
  publication-title: CryptoBytes
– reference: Chen TC. An authenticated encryption scheme for automatic dependent surveillance-broadcast data link. In:
– start-page: 213
  year: 2001
  end-page: 229
  ident: b0100
  article-title: Identity-based encryption from the Weil pairing. Advances in Cryptology-CRYPTO
– ident: 10.1016/j.cja.2014.04.028_b0015
– volume: 99
  start-page: 2040
  issue: 11
  year: 2011
  ident: 10.1016/j.cja.2014.04.028_b0005
  article-title: Future e-enabled aircraft communications and security: the next 20 years and beyond
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2011.2162209
– ident: 10.1016/j.cja.2014.04.028_b0120
– year: 2003
  ident: 10.1016/j.cja.2014.04.028_b0060
– volume: 55
  start-page: 1793
  issue: 4
  year: 2009
  ident: 10.1016/j.cja.2014.04.028_b0125
  article-title: Efficient and generalized pairing computation on abelian varieties
  publication-title: IEEE Trans Inf Theory
  doi: 10.1109/TIT.2009.2013048
– volume: 5
  start-page: 2
  issue: 2
  year: 2002
  ident: 10.1016/j.cja.2014.04.028_b0030
  article-title: The TESLA broadcast authentication protocol
  publication-title: CryptoBytes
– start-page: 47
  year: 1985
  ident: 10.1016/j.cja.2014.04.028_b0050
– volume: 13
  start-page: 361
  issue: 3
  year: 2000
  ident: 10.1016/j.cja.2014.04.028_b0110
  article-title: Security arguments for digital signatures and blind signatures
  publication-title: J Cryptol
  doi: 10.1007/s001450010003
– volume: 85
  start-page: 481
  issue: 2
  year: 2002
  ident: 10.1016/j.cja.2014.04.028_b0095
  article-title: A new traitor tracing
  publication-title: IEICE Trans Fundam Electron Commun Comput Sci
– ident: 10.1016/j.cja.2014.04.028_b0025
  doi: 10.1109/COMSNETS.2011.5716527
– start-page: 378
  year: 1999
  ident: 10.1016/j.cja.2014.04.028_b0055
– year: 2002
  ident: 10.1016/j.cja.2014.04.028_b0075
– start-page: 213
  year: 2001
  ident: 10.1016/j.cja.2014.04.028_b0100
– start-page: 514
  year: 2001
  ident: 10.1016/j.cja.2014.04.028_b0115
– start-page: 45
  year: 2005
  ident: 10.1016/j.cja.2014.04.028_b0045
– volume: PP
  start-page: 1
  issue: 99
  year: 2013
  ident: 10.1016/j.cja.2014.04.028_b0105
  article-title: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
  publication-title: IEEE Trans Parallel Distrib Sys
– ident: 10.1016/j.cja.2014.04.028_b0010
– volume: 7
  start-page: 76
  issue: 2
  year: 2003
  ident: 10.1016/j.cja.2014.04.028_b0065
  article-title: An identity-based signature scheme from the Weil pairing
  publication-title: IEEE Commun Lett
  doi: 10.1109/LCOMM.2002.808397
– year: 2002
  ident: 10.1016/j.cja.2014.04.028_b0080
– ident: 10.1016/j.cja.2014.04.028_b0035
  doi: 10.1109/CSQRWC.2012.6294960
– volume: 4
  start-page: 78
  issue: 2
  year: 2011
  ident: 10.1016/j.cja.2014.04.028_b0085
  article-title: Security analysis of the ADS-B implementation in the next generation air transportation system
  publication-title: Int J Crit Infrastruct Prot
  doi: 10.1016/j.ijcip.2011.06.001
– ident: 10.1016/j.cja.2014.04.028_b0130
  doi: 10.1007/3-540-36288-6_2
– start-page: 56
  year: 2004
  ident: 10.1016/j.cja.2014.04.028_b0090
– volume: 10
  start-page: 51
  issue: 1
  year: 2012
  ident: 10.1016/j.cja.2014.04.028_b0040
  article-title: ADS-B data authentication based on ECC and X. 509 certificate
  publication-title: J Electron Sci Technol
– ident: 10.1016/j.cja.2014.04.028_b0020
SSID ssj0039710
Score 2.1054635
Snippet Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on...
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on...
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on...
SourceID proquest
crossref
elsevier
chongqing
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 688
SubjectTerms ADS-B
Air traffic management
Aircraft
Authentication
Backbone
Broadcast authentication
Broadcasting
Data links
Identity-based signature
Message recovery
Messages
Satellite communication
Signatures
基于身份的签名
安全性分析
广播
消息恢复
自动相关监视
认证
通信开销
Title EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR
URI http://lib.cqvip.com/qk/83889X/201403/50117544.html
https://dx.doi.org/10.1016/j.cja.2014.04.028
https://www.proquest.com/docview/1660056093
Volume 27
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA-yi3oQP3HzgwiehLC0TdPVWzuVKejBTRheQpImsqHd1O7_9yVrRQU9CD2kJQnhvdf3kbz3C0KnyhYgJtQSqVJKWCILosIeJWkiU6NYXEQ-5f_2jg8e2M04Hq-gflML49Iqa92_1OleW9dfujU1u_PJpDsMfDjOwaF3jZ5D_HRVpa6Ib5w32hjMbY1IQGEB0Ls52fQ5XnrqoIcC5tFO3YXsq6BzyqdXsBq_2akfGtuboatNtFH7jzhbLnELrZhyG61_QRXcQY-XeZad46zExuNDgFnB6m0mCy3fKyxdSntZ1Vt1GIJb82IwuK44uxiSHOuvFSPYGbkCQ-M6H5Lb-100uroc9QekvkKBaBaFFUl0pBjEKJFSPLIQWlCjdMglTZV0zo3RHJwey7VS4BjaKDG2p3VQUG5iFdpoD7XKWWn2EWaFBVLHhoUJZ6kF3rOApjLgqaYy5raNOp-0E_MlUoaIPRIoY21EG2IKXWOPuyswnkWTZDYVwAvheCEoPGGvjc4-hzTT_dGZNRwS36RHgGH4a9hJw00Bf5U7KpGlmS3eRcC5A0kF-er8b-oDtObelkllh6hVvS3MEbgvlTr28vkBrOPqnA
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED_x8QA8oAGbVj6GkfY0yaqTOE6zt5SBWqA8rEWqeLFsx55AWwpt-P93dhPEkMYDUh6sxI6su8vd7-LzzwBftSvRTJijSueM8kyVVMc9RvNM5VbztExCyf_oWgxu-MU0na7AabsXxpdVNr5_6dODt27udBtpdh_u7rrjKKTjAgG9b_SSVVhHNCA8gf5w2m_dMcbbhpKA4Qywe7u0GYq8zL3nHop4oDv1J7JvoNOpfj1i2PhfoHrlskMcOv8A2w2AJMVyjjuwYqtd2HpBK7gHt2f9ovhOiorYQBCBcYXo-UyVRi1qonxNe1U3_-oIZrf2jyWIXUnxY0z7xLzcMkJ8lCsJNob9MR39_AiT87PJ6YA2ZyhQw5O4pplJNMckJdFaJA5zC2a1iYViuVYe3VgjEPU4YbRGZOiSzLqeMVHJhE117JJPsFbNKvsZCC8dyjq1PM4Ezx0qn0csV5HIDVOpcB3Yf5adfFhSZcg0UIFy3gHWClOahnzcn4HxW7ZVZvcSdSG9LiTDK-514NvzkPZ1b3TmrYbkP-YjMTK8Neyk1abEz8qvlajKzp4WMhLCs6Sige2_79XHsDGYjK7k1fD68gA2_ZNlhdkhrNXzJ3uEWKbWX4Kt_gWONe3A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EBAA%3A+An+efficient+broadcast+authentication+scheme+for+ADS-B+communication+based+on+IBS-MR&rft.jtitle=Chinese+journal+of+aeronautics&rft.au=Haomiao%2C+Yang&rft.au=Rongshun%2C+Huang&rft.au=Xiaofen%2C+Wang&rft.au=Jiang%2C+Deng&rft.date=2014-06-01&rft.issn=1000-9361&rft.volume=27&rft.issue=3&rft.spage=688&rft.epage=696&rft_id=info:doi/10.1016%2Fj.cja.2014.04.028&rft.externalDBID=NO_FULL_TEXT
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83889X%2F83889X.jpg