EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR
Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cy...
Saved in:
Published in | Chinese journal of aeronautics Vol. 27; no. 3; pp. 688 - 696 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.06.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 1000-9361 |
DOI | 10.1016/j.cja.2014.04.028 |
Cover
Abstract | Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. |
---|---|
AbstractList | Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. |
Author | Yang Haomiao Huang Rongshun Wang Xiaofen Deng Jiang Chen Ruidong |
AuthorAffiliation | School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China The Second Research Institute, Civil Aviation Administration of China, Chengdu 610041, China |
Author_xml | – sequence: 1 givenname: Haomiao surname: Yang fullname: Yang, Haomiao email: haomyang@uestc.edu.cn organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China – sequence: 2 givenname: Rongshun surname: Huang fullname: Huang, Rongshun organization: The Second Research Institute, Civil Aviation Administration of China, Chengdu 610041, China – sequence: 3 givenname: Xiaofen surname: Wang fullname: Wang, Xiaofen organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China – sequence: 4 givenname: Jiang surname: Deng fullname: Deng, Jiang organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China – sequence: 5 givenname: Ruidong surname: Chen fullname: Chen, Ruidong organization: School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China |
BookMark | eNp9kM1uFDEMx3MoUj8fgFu4cZnFmcxkdsVpthRaqQiJ9ogUJR6nm9VO0ibZSrwKz9J36iswyxYOHCpZsmX754__MTsIMRBjbwXMBAj1YT3DtZnVIJoZTFbPD9iRAIBqIZU4ZMc5rwHkohNwxH5cLPv--ekX7wMn5zx6CoXbFM2AJhdutmU1ZTya4mPgGVc0Encx8f7TTbXkGMdxG_6Wrck08Cm4Wt5UX7-fsjfObDKdvfgTdvv54vb8srr-9uXqvL-usJF1qTqUtlGgpLVKuk7NgSzWysDCGlCiJlRQt06htS10Tnbk5ohiAEWtrZ08Ye_3Y-9TfNhSLnr0GWmzMYHiNmuhFECrYCGnVrFvxRRzTuT0ffKjST-1AL0TT6_1JJ7eiadhsno-Md1_DPry59-SjN-8Sn7ckzQ9_-gp6bzTF2nwibDoIfpX6Xcve1cx3D34cPfv2BaE6Nqmkb8B0oGYyA |
CitedBy_id | crossref_primary_10_1049_cmu2_12152 crossref_primary_10_1109_JIOT_2018_2882633 crossref_primary_10_1016_j_cja_2023_03_008 crossref_primary_10_1109_ACCESS_2020_3007182 crossref_primary_10_1016_j_ijcip_2024_100728 crossref_primary_10_1109_JIOT_2023_3337543 crossref_primary_10_1109_TAES_2018_2890354 crossref_primary_10_1109_TITS_2016_2612584 crossref_primary_10_3390_data3020019 crossref_primary_10_1007_s10586_024_04566_5 crossref_primary_10_1109_TAES_2019_2933957 |
Cites_doi | 10.1109/JPROC.2011.2162209 10.1109/TIT.2009.2013048 10.1007/s001450010003 10.1109/COMSNETS.2011.5716527 10.1109/LCOMM.2002.808397 10.1109/CSQRWC.2012.6294960 10.1016/j.ijcip.2011.06.001 10.1007/3-540-36288-6_2 |
ContentType | Journal Article |
Copyright | 2014 |
Copyright_xml | – notice: 2014 |
DBID | 2RA 92L CQIGP W92 ~WA 6I. AAFTH AAYXX CITATION 7TB 8FD FR3 H8D L7M |
DOI | 10.1016/j.cja.2014.04.028 |
DatabaseName | 维普期刊资源整合服务平台 中文科技期刊数据库-CALIS站点 中文科技期刊数据库-7.0平台 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Aerospace Database Engineering Research Database Technology Research Database Mechanical & Transportation Engineering Abstracts Advanced Technologies Database with Aerospace |
DatabaseTitleList | Aerospace Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR |
EndPage | 696 |
ExternalDocumentID | 10_1016_j_cja_2014_04_028 S1000936114000983 50117544 |
GroupedDBID | --K -SC -S~ 0R~ 0SF 1B1 1~5 29B 2B. 2C0 2RA 4.4 457 4G. 5GY 5VR 5VS 5XA 5XD 5XL 6I. 7-5 71M 92H 92I 92L 92R 93N 9D9 9DC AACTN AAEDT AAEDW AAFTH AAIKJ AALRI AAQFI AAXUO ABMAC ACGFS ADBBV ADEZE ADMUD AEKER AENEX AEXQZ AFTJW AFUIB AGHFR AI. AITUG ALMA_UNASSIGNED_HOLDINGS AMRAJ BCNDV CAJEC CAJUS CCEZO CEKLB CHBEP CQIGP CS3 CW9 DU5 EBS EJD EO9 EP2 EP3 FA0 FDB FNPLU GBLVA GROUPED_DOAJ HZ~ IPNFZ IXB J1W KQ8 M41 N9A NCXOZ O-L O9- OK1 OZT Q-- Q-2 RIG ROL SDF SDG SES SSZ TCJ TGT U1G U5M VH1 W92 ~M3 ~WA AAXDM ABWVN ACRPL ADNMO ADVLN AKRWK AAYWO AAYXX ACVFH ADCNI AEUPX AFPUW AIGII AKBMS AKYEP CITATION 7TB 8FD FR3 H8D L7M |
ID | FETCH-LOGICAL-c432t-7c3b46063bb63f7680ebc26a09ba0612ec6025f6cbb507f37ef8cc1d06e5b2f3 |
IEDL.DBID | IXB |
ISSN | 1000-9361 |
IngestDate | Fri Jul 11 09:55:51 EDT 2025 Thu Apr 24 22:54:17 EDT 2025 Tue Jul 01 04:47:59 EDT 2025 Thu Feb 27 05:28:16 EST 2025 Wed Feb 14 10:36:17 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Message recovery Broadcast authentication Identity-based signature Satellite communication Air traffic management |
Language | English |
License | http://creativecommons.org/licenses/by-nc-nd/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c432t-7c3b46063bb63f7680ebc26a09ba0612ec6025f6cbb507f37ef8cc1d06e5b2f3 |
Notes | Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM) systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortu- nately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR), an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters' private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link. Air traffic management; Broadcast authentication; Identity-based signature; Message recovery; Satellite communication 11-1732/V ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S1000936114000983 |
PQID | 1660056093 |
PQPubID | 23500 |
PageCount | 9 |
ParticipantIDs | proquest_miscellaneous_1660056093 crossref_primary_10_1016_j_cja_2014_04_028 crossref_citationtrail_10_1016_j_cja_2014_04_028 elsevier_sciencedirect_doi_10_1016_j_cja_2014_04_028 chongqing_primary_50117544 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-06-01 |
PublicationDateYYYYMMDD | 2014-06-01 |
PublicationDate_xml | – month: 06 year: 2014 text: 2014-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Chinese journal of aeronautics |
PublicationTitleAlternate | Chinese Journal of Aeronautics |
PublicationYear | 2014 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Washington D. C.; Federal Register; 2011. Hess (b0060) 2003 Federal Aviation Administration. RTCA DO-282 (b0075) 2002 Abe, Okamoto (b0055) 1999 Chen TC. An authenticated encryption scheme for automatic dependent surveillance-broadcast data link. In Mitsunari, Sakai, Kasahara (b0095) 2002; 85 Lee, Lee, Park (b0125) 2009; 55 RTCA DO-260A (b0080) 2002 Civil Aviation Administrati on of China. The overall planning and implementation of China’s civil aviation ADS-B (draft), Beijing; Air Traffic Management Bureau, CAAC; 2012. Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Desmedt YG, editor. McCallie, Butts, Mills (b0085) 2011; 4 Boneh, Boyen (b0090) 2004 Pointcheval, Stern (b0110) 2000; 13 2011 Jan 4–8; Banglore, India; 2011. p. 1–6. Li, Lin, Yang, Liang, Lu, Shen (b0105) 2013; PP Berlin Heidelberg: Springer; 2003. p. 18–30. 2012 Jul 23–27; New Taipei City; 2012. p. 127–31. Zhang, Susilo, Mu (b0045) 2005 Yi (b0065) 2003; 7 Washington D.C.; Federal Register; 2010. Boneh, Franklin (b0100) 2001 CertiVox – strong 2 factor authentication and security software [Internet], [updated 2014 January 16; cited 2014 March 1]. Available from . Sampigethaya, Poovendran, Shetty, Davis, Royalty (b0005) 2011; 99 Boneh, Lynn, Shacham (b0115) 2001 Pan, Feng, Wang (b0040) 2012; 10 Shamir (b0050) 1985 Perrig, Canetti, Tygar, Song (b0030) 2002; 5 Sampigethaya K, Poovendran R. Security and privacy of future aircraft wireless communications with offboard systems. In Hess (10.1016/j.cja.2014.04.028_b0060) 2003 Lee (10.1016/j.cja.2014.04.028_b0125) 2009; 55 10.1016/j.cja.2014.04.028_b0025 Mitsunari (10.1016/j.cja.2014.04.028_b0095) 2002; 85 10.1016/j.cja.2014.04.028_b0020 Pointcheval (10.1016/j.cja.2014.04.028_b0110) 2000; 13 10.1016/j.cja.2014.04.028_b0120 Abe (10.1016/j.cja.2014.04.028_b0055) 1999 Sampigethaya (10.1016/j.cja.2014.04.028_b0005) 2011; 99 Li (10.1016/j.cja.2014.04.028_b0105) 2013; PP 10.1016/j.cja.2014.04.028_b0035 Yi (10.1016/j.cja.2014.04.028_b0065) 2003; 7 10.1016/j.cja.2014.04.028_b0015 Shamir (10.1016/j.cja.2014.04.028_b0050) 1985 Perrig (10.1016/j.cja.2014.04.028_b0030) 2002; 5 Boneh (10.1016/j.cja.2014.04.028_b0090) 2004 10.1016/j.cja.2014.04.028_b0130 10.1016/j.cja.2014.04.028_b0010 RTCA DO-282 (10.1016/j.cja.2014.04.028_b0075) 2002 Zhang (10.1016/j.cja.2014.04.028_b0045) 2005 Boneh (10.1016/j.cja.2014.04.028_b0100) 2001 Boneh (10.1016/j.cja.2014.04.028_b0115) 2001 Pan (10.1016/j.cja.2014.04.028_b0040) 2012; 10 RTCA DO-260A (10.1016/j.cja.2014.04.028_b0080) 2002 McCallie (10.1016/j.cja.2014.04.028_b0085) 2011; 4 |
References_xml | – reference: Civil Aviation Administrati on of China. The overall planning and implementation of China’s civil aviation ADS-B (draft), Beijing; Air Traffic Management Bureau, CAAC; 2012. – start-page: 56 year: 2004 end-page: 73 ident: b0090 article-title: Short signatures without random oracles. Advances in Cryptology-EUROCRYPT – volume: PP start-page: 1 year: 2013 ident: b0105 article-title: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid publication-title: IEEE Trans Parallel Distrib Sys – reference: Sampigethaya K, Poovendran R. Security and privacy of future aircraft wireless communications with offboard systems. In: – reference: Federal Aviation Administration. – start-page: 47 year: 1985 end-page: 53 ident: b0050 article-title: Identity-based cryptosystems and signature schemes. Advances in cryptology – reference: CertiVox – strong 2 factor authentication and security software [Internet], [updated 2014 January 16; cited 2014 March 1]. Available from: – reference: ; 2011 Jan 4–8; Banglore, India; 2011. p. 1–6. – volume: 55 start-page: 1793 year: 2009 end-page: 1803 ident: b0125 article-title: Efficient and generalized pairing computation on abelian varieties publication-title: IEEE Trans Inf Theory – reference: ; 2012 Jul 23–27; New Taipei City; 2012. p. 127–31. – start-page: 45 year: 2005 end-page: 56 ident: b0045 article-title: Identity-based partial message recovery signatures (or how to shorten ID-based signatures). Financial Cryptography and Data Security – year: 2003 ident: b0060 article-title: Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography – volume: 7 start-page: 76 year: 2003 end-page: 78 ident: b0065 article-title: An identity-based signature scheme from the Weil pairing publication-title: IEEE Commun Lett – reference: . Berlin Heidelberg: Springer; 2003. p. 18–30. – reference: . Washington D.C.; Federal Register; 2010. – volume: 99 start-page: 2040 year: 2011 end-page: 2055 ident: b0005 article-title: Future e-enabled aircraft communications and security: the next 20 years and beyond publication-title: Proc IEEE – volume: 10 start-page: 51 year: 2012 end-page: 55 ident: b0040 article-title: ADS-B data authentication based on ECC and X. 509 certificate publication-title: J Electron Sci Technol – start-page: 514 year: 2001 end-page: 532 ident: b0115 article-title: Short signatures from the Weil pairing. Advances in Cryptology-ASIACRYPT – volume: 13 start-page: 361 year: 2000 end-page: 396 ident: b0110 article-title: Security arguments for digital signatures and blind signatures publication-title: J Cryptol – reference: , Washington D. C.; Federal Register; 2011. – volume: 4 start-page: 78 year: 2011 end-page: 87 ident: b0085 article-title: Security analysis of the ADS-B implementation in the next generation air transportation system publication-title: Int J Crit Infrastruct Prot – reference: . – start-page: 378 year: 1999 end-page: 389 ident: b0055 article-title: A signature scheme with message recovery as secure as discrete logarithm. Advances in Cryptology-ASIACRYPT’99 – year: 2002 ident: b0075 article-title: Minimum operational performance standards for universal access transceiver (UAT) automatic dependent surveillance – broadcast – year: 2002 ident: b0080 article-title: Minimum operational performance standard for 1090 MHz extended squitter ADS-B and TIS-B – volume: 85 start-page: 481 year: 2002 end-page: 484 ident: b0095 article-title: A new traitor tracing publication-title: IEICE Trans Fundam Electron Commun Comput Sci – reference: Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups. In: Desmedt YG, editor. – volume: 5 start-page: 2 year: 2002 end-page: 13 ident: b0030 article-title: The TESLA broadcast authentication protocol publication-title: CryptoBytes – reference: Chen TC. An authenticated encryption scheme for automatic dependent surveillance-broadcast data link. In: – start-page: 213 year: 2001 end-page: 229 ident: b0100 article-title: Identity-based encryption from the Weil pairing. Advances in Cryptology-CRYPTO – ident: 10.1016/j.cja.2014.04.028_b0015 – volume: 99 start-page: 2040 issue: 11 year: 2011 ident: 10.1016/j.cja.2014.04.028_b0005 article-title: Future e-enabled aircraft communications and security: the next 20 years and beyond publication-title: Proc IEEE doi: 10.1109/JPROC.2011.2162209 – ident: 10.1016/j.cja.2014.04.028_b0120 – year: 2003 ident: 10.1016/j.cja.2014.04.028_b0060 – volume: 55 start-page: 1793 issue: 4 year: 2009 ident: 10.1016/j.cja.2014.04.028_b0125 article-title: Efficient and generalized pairing computation on abelian varieties publication-title: IEEE Trans Inf Theory doi: 10.1109/TIT.2009.2013048 – volume: 5 start-page: 2 issue: 2 year: 2002 ident: 10.1016/j.cja.2014.04.028_b0030 article-title: The TESLA broadcast authentication protocol publication-title: CryptoBytes – start-page: 47 year: 1985 ident: 10.1016/j.cja.2014.04.028_b0050 – volume: 13 start-page: 361 issue: 3 year: 2000 ident: 10.1016/j.cja.2014.04.028_b0110 article-title: Security arguments for digital signatures and blind signatures publication-title: J Cryptol doi: 10.1007/s001450010003 – volume: 85 start-page: 481 issue: 2 year: 2002 ident: 10.1016/j.cja.2014.04.028_b0095 article-title: A new traitor tracing publication-title: IEICE Trans Fundam Electron Commun Comput Sci – ident: 10.1016/j.cja.2014.04.028_b0025 doi: 10.1109/COMSNETS.2011.5716527 – start-page: 378 year: 1999 ident: 10.1016/j.cja.2014.04.028_b0055 – year: 2002 ident: 10.1016/j.cja.2014.04.028_b0075 – start-page: 213 year: 2001 ident: 10.1016/j.cja.2014.04.028_b0100 – start-page: 514 year: 2001 ident: 10.1016/j.cja.2014.04.028_b0115 – start-page: 45 year: 2005 ident: 10.1016/j.cja.2014.04.028_b0045 – volume: PP start-page: 1 issue: 99 year: 2013 ident: 10.1016/j.cja.2014.04.028_b0105 article-title: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid publication-title: IEEE Trans Parallel Distrib Sys – ident: 10.1016/j.cja.2014.04.028_b0010 – volume: 7 start-page: 76 issue: 2 year: 2003 ident: 10.1016/j.cja.2014.04.028_b0065 article-title: An identity-based signature scheme from the Weil pairing publication-title: IEEE Commun Lett doi: 10.1109/LCOMM.2002.808397 – year: 2002 ident: 10.1016/j.cja.2014.04.028_b0080 – ident: 10.1016/j.cja.2014.04.028_b0035 doi: 10.1109/CSQRWC.2012.6294960 – volume: 4 start-page: 78 issue: 2 year: 2011 ident: 10.1016/j.cja.2014.04.028_b0085 article-title: Security analysis of the ADS-B implementation in the next generation air transportation system publication-title: Int J Crit Infrastruct Prot doi: 10.1016/j.ijcip.2011.06.001 – ident: 10.1016/j.cja.2014.04.028_b0130 doi: 10.1007/3-540-36288-6_2 – start-page: 56 year: 2004 ident: 10.1016/j.cja.2014.04.028_b0090 – volume: 10 start-page: 51 issue: 1 year: 2012 ident: 10.1016/j.cja.2014.04.028_b0040 article-title: ADS-B data authentication based on ECC and X. 509 certificate publication-title: J Electron Sci Technol – ident: 10.1016/j.cja.2014.04.028_b0020 |
SSID | ssj0039710 |
Score | 2.1054635 |
Snippet | Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on... Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on... Automatic dependent surveillance-broadcast (ADS-B) systems can broadcast satellitebased aircraft position, identification, etc., periodically, and are now on... |
SourceID | proquest crossref elsevier chongqing |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 688 |
SubjectTerms | ADS-B Air traffic management Aircraft Authentication Backbone Broadcast authentication Broadcasting Data links Identity-based signature Message recovery Messages Satellite communication Signatures 基于身份的签名 安全性分析 广播 消息恢复 自动相关监视 认证 通信开销 |
Title | EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR |
URI | http://lib.cqvip.com/qk/83889X/201403/50117544.html https://dx.doi.org/10.1016/j.cja.2014.04.028 https://www.proquest.com/docview/1660056093 |
Volume | 27 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NS8MwFA-yi3oQP3HzgwiehLC0TdPVWzuVKejBTRheQpImsqHd1O7_9yVrRQU9CD2kJQnhvdf3kbz3C0KnyhYgJtQSqVJKWCILosIeJWkiU6NYXEQ-5f_2jg8e2M04Hq-gflML49Iqa92_1OleW9dfujU1u_PJpDsMfDjOwaF3jZ5D_HRVpa6Ib5w32hjMbY1IQGEB0Ls52fQ5XnrqoIcC5tFO3YXsq6BzyqdXsBq_2akfGtuboatNtFH7jzhbLnELrZhyG61_QRXcQY-XeZad46zExuNDgFnB6m0mCy3fKyxdSntZ1Vt1GIJb82IwuK44uxiSHOuvFSPYGbkCQ-M6H5Lb-100uroc9QekvkKBaBaFFUl0pBjEKJFSPLIQWlCjdMglTZV0zo3RHJwey7VS4BjaKDG2p3VQUG5iFdpoD7XKWWn2EWaFBVLHhoUJZ6kF3rOApjLgqaYy5raNOp-0E_MlUoaIPRIoY21EG2IKXWOPuyswnkWTZDYVwAvheCEoPGGvjc4-hzTT_dGZNRwS36RHgGH4a9hJw00Bf5U7KpGlmS3eRcC5A0kF-er8b-oDtObelkllh6hVvS3MEbgvlTr28vkBrOPqnA |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT9swED_x8QA8oAGbVj6GkfY0yaqTOE6zt5SBWqA8rEWqeLFsx55AWwpt-P93dhPEkMYDUh6sxI6su8vd7-LzzwBftSvRTJijSueM8kyVVMc9RvNM5VbztExCyf_oWgxu-MU0na7AabsXxpdVNr5_6dODt27udBtpdh_u7rrjKKTjAgG9b_SSVVhHNCA8gf5w2m_dMcbbhpKA4Qywe7u0GYq8zL3nHop4oDv1J7JvoNOpfj1i2PhfoHrlskMcOv8A2w2AJMVyjjuwYqtd2HpBK7gHt2f9ovhOiorYQBCBcYXo-UyVRi1qonxNe1U3_-oIZrf2jyWIXUnxY0z7xLzcMkJ8lCsJNob9MR39_AiT87PJ6YA2ZyhQw5O4pplJNMckJdFaJA5zC2a1iYViuVYe3VgjEPU4YbRGZOiSzLqeMVHJhE117JJPsFbNKvsZCC8dyjq1PM4Ezx0qn0csV5HIDVOpcB3Yf5adfFhSZcg0UIFy3gHWClOahnzcn4HxW7ZVZvcSdSG9LiTDK-514NvzkPZ1b3TmrYbkP-YjMTK8Neyk1abEz8qvlajKzp4WMhLCs6Sige2_79XHsDGYjK7k1fD68gA2_ZNlhdkhrNXzJ3uEWKbWX4Kt_gWONe3A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=EBAA%3A+An+efficient+broadcast+authentication+scheme+for+ADS-B+communication+based+on+IBS-MR&rft.jtitle=Chinese+journal+of+aeronautics&rft.au=Haomiao%2C+Yang&rft.au=Rongshun%2C+Huang&rft.au=Xiaofen%2C+Wang&rft.au=Jiang%2C+Deng&rft.date=2014-06-01&rft.issn=1000-9361&rft.volume=27&rft.issue=3&rft.spage=688&rft.epage=696&rft_id=info:doi/10.1016%2Fj.cja.2014.04.028&rft.externalDBID=NO_FULL_TEXT |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83889X%2F83889X.jpg |