2015
DOI: 10.1109/comst.2014.2365951
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

Abstract: Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recentl… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
155
0
5

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 211 publications
(160 citation statements)
references
References 79 publications
0
155
0
5
Order By: Relevance
“…Distance bounding protocols [24,8,9,10] are two-way ranging protocols that rely on cryptographic techniques to enable a verifier to establish an upper bound on the physical distance to a prover. Mutlilateration is a passive localization technique based on the time difference of arrival (TDoA) of signals at geographically distributed stations that can be used for location verification [25,26,27]. However, these approaches only allow for verification of the position of a target, not its velocity and heading.…”
Section: Related Workmentioning
confidence: 99%
“…Distance bounding protocols [24,8,9,10] are two-way ranging protocols that rely on cryptographic techniques to enable a verifier to establish an upper bound on the physical distance to a prover. Mutlilateration is a passive localization technique based on the time difference of arrival (TDoA) of signals at geographically distributed stations that can be used for location verification [25,26,27]. However, these approaches only allow for verification of the position of a target, not its velocity and heading.…”
Section: Related Workmentioning
confidence: 99%
“…Advances in software, hardware, and communication generate new opportunities for malicious activities (Fig 1). An example is Automatic dependent surveillancebroadcast (ADSB) which poses challenges for confidentiality, availability, and integrity over security and safety concerns [27], [56], [69], [79]. Current constructs include the system design as a cyberphysical system (CPS), as well as the devices operating at the edge to include the internet of things (IoT), that require consideration to mitigate cyber vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Related WorkTo achieve perfect security, the conventional encryption schemes are typically implemented at the upper layer using cryptographic methods. However, this is often achieved at the cost of high computational complexity [16].Unlike the traditional cryptographic methods, physical layer security (PLS), using the information-theoretic and signal processing approaches, has been widely investigated in the UAV-enabled wireless networks [17]-[20]. They enhance the coverage and security of the wireless systems by exploiting physical characteristics of the wireless channel.…”
mentioning
confidence: 99%