2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC) 2018
DOI: 10.1109/pccc.2018.8711001
|View full text |Cite
|
Sign up to set email alerts
|

Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…AODV is decentralized, reactive, and has less overhead for management, which is robust to the dynamic topology. Nevertheless, the main drawbacks of AODV are the consumption of path discovery and the local optimization for routing generation [40,41]. In contrast, OLSR is a centralized algorithm that could achieve global optimization of routing generation with the sacrifice of overhead [42].…”
Section: Introductionmentioning
confidence: 99%
“…AODV is decentralized, reactive, and has less overhead for management, which is robust to the dynamic topology. Nevertheless, the main drawbacks of AODV are the consumption of path discovery and the local optimization for routing generation [40,41]. In contrast, OLSR is a centralized algorithm that could achieve global optimization of routing generation with the sacrifice of overhead [42].…”
Section: Introductionmentioning
confidence: 99%
“…But, it was pointed out in [21] that the cost of the AntNet algorithm increases when searching for the shortest path in non-ad hoc environments, and degradation as the network size increases. It is vital to note that the OLSR algorithms achieve global optimization in routing generation but incur a higher overhead [22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…We first propose a blockchain enabled framework for the authentication of flight plans and exchanging secret keys between UAS and ATM infrastructures. We then provide an enhanced ADS-B protocol using fountain code [22], [23] for the reliable transmission of authentication information in capacity-limited wireless channels. Our contributions are as follows:…”
Section: Introductionmentioning
confidence: 99%