Security Establishment in ADS-B by Format-Preserving Encryption and Blockchain Schemes

被引:8
作者
Markani, Jamal Habibi [1 ]
Amrhar, Abdessamad [1 ]
Gagne, Jean-Marc [1 ]
Landry, Rene, Jr. [2 ]
机构
[1] Ecole Technol Super ETS, LASSENA Lab, Montreal, PQ H3C 1K3, Canada
[2] Ecole Technol Super, Dept Elect Engn, Montreal, PQ H3C 1K3, Canada
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 05期
关键词
ADS-B; NextGen; SDR; format-preserving encryption; FFX; blockchain; BladeRF; SURVEILLANCE; FRAMEWORK;
D O I
10.3390/app13053105
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
In the next generation modernization plan, the automatic dependent surveillance-broadcast (ADS-B) system plays a pivotal role. However, the ADS-B's low level of security and its vulnerabilities have raised valid concerns. The main objectives of this paper are to highlight the limitations of legacy ADS-B systems and to assess the feasibility of using Format-preserving (F), Feistel-based encryption (F), with multiple implementation variances (X) (FFX) algorithms, for enhancing ADS-B's security. The offered solution is implemented in a standard software-defined radio (SDR) ADS-B to be utilized in real-time applications. Furthermore, a new proposed blockchain scheme is used as a secured database to manage the cipher key. The metric of message entropy is used to assess an algorithm's ability to confuse and diffuse predictable ADS-B messages; correlation and serial correlation of plain data and cipher data are deployed to evaluate the proposed method's security level. The authors provide both MATLAB simulations and flight test outcomes to demonstrate the feasibility of this approach. Based on our security analysis, ADS-B information can be kept confidential through our scheme. The performance evaluation results reveal that the proposed scheme is achievable, compatible, and efficient for the avionics industry.
引用
收藏
页数:16
相关论文
共 30 条
[1]  
Agbeyibor R.C., 2014, THESIS AIR FORCE I T
[2]  
[Anonymous], 2009, RTCADO260B
[3]  
Arora Arushi, 2019, Proceedings of 2nd International Conference on Communication, Computing and Networking. ICCCN 2018. Lecture Notes in Networks and Systems (LNNS 46), P233, DOI 10.1007/978-981-13-1217-5_23
[4]   How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption [J].
Baek, Joonsang ;
Hableel, Eman ;
Byon, Young-Ji ;
Wong, Duncan S. ;
Jang, Kitae ;
Yeo, Hwasoo .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (03) :690-700
[5]  
Bellare M., 2010, NATL I STAND TECHNOL, V20, P1
[6]  
Costin A., 2012, Black Hat USA, P1
[7]   Enhancing the security of aircraft surveillance in the next generation air traffic control system [J].
Finke, Cindy ;
Butts, Jonathan ;
Mills, Robert ;
Grimaila, Michael .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2013, 6 (01) :3-11
[8]  
Guggenberger T., 2021, ARXIV, DOI DOI 10.1016/J.CIE.2022.108716
[9]  
Hasin Farah, 2021, Proceedings of International Conference on Trends in Computational and Cognitive Engineering. Proceedings of TCCE 2020. Advances in Intelligent Systems and Computing (AISC 1309), P545, DOI 10.1007/978-981-33-4673-4_44
[10]  
Jochum J., 2001, THESIS MIT BOSTON