CFP last date
22 April 2024
Reseach Article

Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)

by Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Number 26
Year of Publication: 2018
Authors: Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza
10.5120/ijca2018916598

Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza . Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B). International Journal of Computer Applications. 180, 26 ( Mar 2018), 23-28. DOI=10.5120/ijca2018916598

@article{ 10.5120/ijca2018916598,
author = { Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza },
title = { Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B) },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 180 },
number = { 26 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume180/number26/29121-2018916598/ },
doi = { 10.5120/ijca2018916598 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:01:51.751429+05:30
%A Fatimah Alghamdi
%A Amal Alshhrani
%A Nermin Hamza
%T Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)
%J International Journal of Computer Applications
%@ 0975-8887
%V 180
%N 26
%P 23-28
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Although air traffic is continuously increasing on a global scale, the next generation of management in this field is successfully handling this expansion and improving the safety of billions of future passengers. In this paper, Automatic Dependent Surveillance-Broadcast (ADS-B) was examined, which is a primary system, unlike traditional radar. This technology allows aircraft to automatically broadcast their intentions and location; however, it faces certain threats from which it requires some manner of protection. This paper discussed some techniques to encrypt and protect ADS-B messages. Staged Identity-Based Encryption (SIBE) was the most suitable means of solving the issues, providing, as it does, a sufficient level of security for ADS-B messages. In addition, the technique has attractive characteristics, such as confidentiality, efficiency, and a high enough degree of flexibility for effective key management and frequent encryption. This last attribute distinguishes the approach and renders it more popular than its peers.

References
  1. THALES AIR SYSTEMS. air traffic management A guide to global surveillance, Parc tertiaire Silic ,
  2. ICAO. 2007 Guidance Material on Comparison of Surveillance Technologies (GMST). International Civil Aviation Organization Asia and Pacific, (Sept 2007)
  3. Martin, S., Vincent, L. and Ivan, M. 2015. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. In IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1066-1087, Second quarter.
  4. Christine, V. Automatic Dependent Surveillance Broadcast (ADS-B) Surveillance development for Air Traffic Management. AirBus
  5. TextRon Aviation. Mandate and NextGen is 2020 ADS-B out mandate on your radar? Retrieved at: http://txtav.com/en/service/mandates-and-nextgen
  6. Eman, H., Joonsang, B., Young-Ji, B. and Duncan S. 2015. How to protect ADS-B: Confidentiality framework for future air traffic communication. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, 2015, pp. 155-160.
  7. Martin, S., Matthias, S., Vincent, L. and Ivan, M. 2014. Realities and challenges of NexGen air traffic management: the case of ADS-B. In IEEE Communications Magazine, vol. 52, no. 5, pp. 111-118, (May 2014).
  8. Emily, C. 2015. ADS-B, Friend or Foe: ADS-B Message Authentication for NexGen Aircraft. In IEEE 17th International Conference on High Performance Computing and Communications. IEEE 7th
  9. International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, pp. 1256-1261.
  10. Sahar, A., Tyler, C., Rennix, O. and Kate, S. 2014. Design of a cyber security framework for ADS-B based surveillance systems. Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, pp. 304-309.
  11. Anjia, Y., Xiao, T., Joonsang, B.and Duncan S. W. 2017. A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. In IEEE Transactions on Services Computing, vol. 10, no. 2, pp. 165-175, March-April.
  12. Hao, W., Zhihua, Z. and Lei, W. 2014. Hierarchial Identity-Based Encryption Scheme from Multilinear Maps. Tenth International Conference on Computational Intelligence and Security, Kunming, pp. 455-458.
  13. Pengtao, L., Chengyu, H., Shanqing, G. and Yilei W. 2015. Anonymous Identity-Based Encryption with Bounded Leakage Resilience. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, pp. 287-292
  14. Enrico, A. and Roberta, C. 2011. A new architecture to increase security of Air Traffic Control system. 8th European Radar Conference, Manchester, pp. 357-360
  15. Sufyan, F.A. and Amer, K. O. 2012. Development of Certificate Authority services for web applications. International Conference on Future Communication Networks, Baghdad, pp. 135-140.
Index Terms

Computer Science
Information Sciences

Keywords

ADS-B identity-based encryption Staged Identity-Based Encryption(SIBE). encryption technique