International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 180 - Issue 26 |
Published: Mar 2018 |
Authors: Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza |
![]() |
Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza . Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B). International Journal of Computer Applications. 180, 26 (Mar 2018), 23-28. DOI=10.5120/ijca2018916598
@article{ 10.5120/ijca2018916598, author = { Fatimah Alghamdi,Amal Alshhrani,Nermin Hamza }, title = { Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B) }, journal = { International Journal of Computer Applications }, year = { 2018 }, volume = { 180 }, number = { 26 }, pages = { 23-28 }, doi = { 10.5120/ijca2018916598 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2018 %A Fatimah Alghamdi %A Amal Alshhrani %A Nermin Hamza %T Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)%T %J International Journal of Computer Applications %V 180 %N 26 %P 23-28 %R 10.5120/ijca2018916598 %I Foundation of Computer Science (FCS), NY, USA
Although air traffic is continuously increasing on a global scale, the next generation of management in this field is successfully handling this expansion and improving the safety of billions of future passengers. In this paper, Automatic Dependent Surveillance-Broadcast (ADS-B) was examined, which is a primary system, unlike traditional radar. This technology allows aircraft to automatically broadcast their intentions and location; however, it faces certain threats from which it requires some manner of protection. This paper discussed some techniques to encrypt and protect ADS-B messages. Staged Identity-Based Encryption (SIBE) was the most suitable means of solving the issues, providing, as it does, a sufficient level of security for ADS-B messages. In addition, the technique has attractive characteristics, such as confidentiality, efficiency, and a high enough degree of flexibility for effective key management and frequent encryption. This last attribute distinguishes the approach and renders it more popular than its peers.