2014
DOI: 10.3390/info5040622
|View full text |Cite
|
Sign up to set email alerts
|

Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems

Abstract: (CNS/ATM) systems utilize digital technologies, satellite systems, and various levels of automation to facilitate seamless global air traffic management. Automatic Dependent Surveillance-Broadcast (ADS-B), the core component of CNS/ATM, broadcasts important monitoring information, such as the location, altitude, and direction of aircraft, to the ground. However, ADS-B data are transmitted in an unencrypted (or unprotected) communication channel between ADS-B sensors and Air Traffic Control (ATC). Consequently,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…As one of the fundamental components of modern navigation systems, much research has been done and is still ongoing with respect to different aspects of ADS-B. This includes, but is not limited to, security and verification of messages [9][10][11][12][13][14][15][16] experimental attack analysis [17][18][19][20], data quality analysis [21][22][23][24][25], safety assessment [26,27], flight testing [21,28,29], etc. ADS-B security protocols have been a topic of many studies during the system evolution.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As one of the fundamental components of modern navigation systems, much research has been done and is still ongoing with respect to different aspects of ADS-B. This includes, but is not limited to, security and verification of messages [9][10][11][12][13][14][15][16] experimental attack analysis [17][18][19][20], data quality analysis [21][22][23][24][25], safety assessment [26,27], flight testing [21,28,29], etc. ADS-B security protocols have been a topic of many studies during the system evolution.…”
Section: Related Workmentioning
confidence: 99%
“…Various techniques were discussed to adopt while verifying original ADS-B messages. These include traditional Kalman filtering, group validation [10], cryptography [9,13,15,16], and identity-based signature with batch verification [30]. Each of the solutions is yet to be implemented in the real-time ADS-B network.…”
Section: Related Workmentioning
confidence: 99%
“…As one of the fundamental components of modern navigation systems, much research has been done and is still going on different aspects of ADS-B. This includes, but is not limited to, security and verification of messages [9][10][11][12][13][14][15][16] experimental attack analysis [17][18][19][20] data quality analysis [21][22][23][24][25] safety assessment [26] [27], flight testing [21,28,29], etc. ADS-B security protocol have been a topic of many studies during the system evolution.…”
Section: Related Workmentioning
confidence: 99%
“…Various techniques were discussed to adopt while verifying original ADS-B messages. These include traditional Kalman filtering, Group Validation [10], cryptography [9,13,15,16], Identity-Based Signature with Batch Verification [30]. Each of the solutions is yet to be implemented in the real-time ADS-B network.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we can improve the robustness against attacks: MITM (false base station), IMSI catcher, replay, impersonation, and ensure forward/backward secrecy FBS. Furthermore, this approach has low computational and communication cost with the ability to achieve handover security [69,70].…”
Section: Using Lightweight Cryptosystemsmentioning
confidence: 99%