Research Article

Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)

by  Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 180 - Issue 26
Published: Mar 2018
Authors: Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza
10.5120/ijca2018916598
PDF

Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza . Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B). International Journal of Computer Applications. 180, 26 (Mar 2018), 23-28. DOI=10.5120/ijca2018916598

                        @article{ 10.5120/ijca2018916598,
                        author  = { Fatimah Alghamdi,Amal Alshhrani,Nermin Hamza },
                        title   = { Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B) },
                        journal = { International Journal of Computer Applications },
                        year    = { 2018 },
                        volume  = { 180 },
                        number  = { 26 },
                        pages   = { 23-28 },
                        doi     = { 10.5120/ijca2018916598 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2018
                        %A Fatimah Alghamdi
                        %A Amal Alshhrani
                        %A Nermin Hamza
                        %T Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)%T 
                        %J International Journal of Computer Applications
                        %V 180
                        %N 26
                        %P 23-28
                        %R 10.5120/ijca2018916598
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Although air traffic is continuously increasing on a global scale, the next generation of management in this field is successfully handling this expansion and improving the safety of billions of future passengers. In this paper, Automatic Dependent Surveillance-Broadcast (ADS-B) was examined, which is a primary system, unlike traditional radar. This technology allows aircraft to automatically broadcast their intentions and location; however, it faces certain threats from which it requires some manner of protection. This paper discussed some techniques to encrypt and protect ADS-B messages. Staged Identity-Based Encryption (SIBE) was the most suitable means of solving the issues, providing, as it does, a sufficient level of security for ADS-B messages. In addition, the technique has attractive characteristics, such as confidentiality, efficiency, and a high enough degree of flexibility for effective key management and frequent encryption. This last attribute distinguishes the approach and renders it more popular than its peers.

References
  • THALES AIR SYSTEMS. air traffic management A guide to global surveillance, Parc tertiaire Silic ,
  • ICAO. 2007 Guidance Material on Comparison of Surveillance Technologies (GMST). International Civil Aviation Organization Asia and Pacific, (Sept 2007)
  • Martin, S., Vincent, L. and Ivan, M. 2015. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. In IEEE Communications Surveys & Tutorials, vol. 17, no. 2, pp. 1066-1087, Second quarter.
  • Christine, V. Automatic Dependent Surveillance Broadcast (ADS-B) Surveillance development for Air Traffic Management. AirBus
  • TextRon Aviation. Mandate and NextGen is 2020 ADS-B out mandate on your radar? Retrieved at: http://txtav.com/en/service/mandates-and-nextgen
  • Eman, H., Joonsang, B., Young-Ji, B. and Duncan S. 2015. How to protect ADS-B: Confidentiality framework for future air traffic communication. IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Hong Kong, 2015, pp. 155-160.
  • Martin, S., Matthias, S., Vincent, L. and Ivan, M. 2014. Realities and challenges of NexGen air traffic management: the case of ADS-B. In IEEE Communications Magazine, vol. 52, no. 5, pp. 111-118, (May 2014).
  • Emily, C. 2015. ADS-B, Friend or Foe: ADS-B Message Authentication for NexGen Aircraft. In IEEE 17th International Conference on High Performance Computing and Communications. IEEE 7th
  • International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, pp. 1256-1261.
  • Sahar, A., Tyler, C., Rennix, O. and Kate, S. 2014. Design of a cyber security framework for ADS-B based surveillance systems. Systems and Information Engineering Design Symposium (SIEDS), Charlottesville, VA, pp. 304-309.
  • Anjia, Y., Xiao, T., Joonsang, B.and Duncan S. W. 2017. A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification. In IEEE Transactions on Services Computing, vol. 10, no. 2, pp. 165-175, March-April.
  • Hao, W., Zhihua, Z. and Lei, W. 2014. Hierarchial Identity-Based Encryption Scheme from Multilinear Maps. Tenth International Conference on Computational Intelligence and Security, Kunming, pp. 455-458.
  • Pengtao, L., Chengyu, H., Shanqing, G. and Yilei W. 2015. Anonymous Identity-Based Encryption with Bounded Leakage Resilience. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, Gwangiu, pp. 287-292
  • Enrico, A. and Roberta, C. 2011. A new architecture to increase security of Air Traffic Control system. 8th European Radar Conference, Manchester, pp. 357-360
  • Sufyan, F.A. and Amer, K. O. 2012. Development of Certificate Authority services for web applications. International Conference on Future Communication Networks, Baghdad, pp. 135-140.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

ADS-B identity-based encryption Staged Identity-Based Encryption(SIBE). encryption technique

Powered by PhDFocusTM