Holistic Air Protection Scheme of ADS-B Communication

被引:9
作者
Braeken, An [1 ]
机构
[1] Vrije Univ Brussel, Ind Engn Dept INDI, B-1050 Brussels, Belgium
关键词
ADS-B; TESLA; broadcast communication; ECQV; signcryption; authentication;
D O I
10.1109/ACCESS.2019.2917793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The avionics world is making the transition in the coming years to the automatic dependent surveillance-broadcast (ADS-B) communication in order to determine parameters like for instance position and velocity of the aircraft in the air. The standard does not currently include any kind of authentication or encryption in the transmitted messages and is therefore vulnerable against different types of attacks. In this paper, a system, called holistic air protection (HAP), is proposed, which is able to provide different levels of security by offering authentication of the payload with potential encryption of identifier and/or payload of the message. As a consequence, a holistic solution is obtained, which can be applied by both commercial and military aircraft or in case of a security attack. HAP relies on implicit certificates and a generalized elliptic curve-based signcryption scheme. The resulting overhead due to the cryptographic operations is in the same range as the timed efficient stream loss-tolerant authentication (TESLA)-based proposed security schemes, considering the same security strength. Moreover, HAP is also able to obtain faster authentication and a thus faster guarantee of a verified update.
引用
收藏
页码:65251 / 65262
页数:12
相关论文
共 40 条
  • [1] Abelson H., 1997, World Wide Web J., V2, P241
  • [2] [Anonymous], 2006, DO242A RTCA
  • [3] [Anonymous], 2011, REGULATIONS ICAO PUB
  • [4] [Anonymous], 2004, DO282 RTCA
  • [5] [Anonymous], 2015, SHA 3 STAND
  • [6] [Anonymous], 2013, IEEE COMMUN SURV TUT
  • [7] How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption
    Baek, Joonsang
    Hableel, Eman
    Byon, Young-Ji
    Wong, Duncan S.
    Jang, Kitae
    Yeo, Hwasoo
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (03) : 690 - 700
  • [8] Bernstein D. J., 2016, TECH REP
  • [9] Bernstein D.J., SafeCurves: choosing safe curves for elliptic-curve cryptography
  • [10] Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207