|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 180 - Issue 26 |
| Published: Mar 2018 |
| Authors: Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza |
10.5120/ijca2018916598
|
Fatimah Alghamdi, Amal Alshhrani, Nermin Hamza . Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B). International Journal of Computer Applications. 180, 26 (Mar 2018), 23-28. DOI=10.5120/ijca2018916598
@article{ 10.5120/ijca2018916598,
author = { Fatimah Alghamdi,Amal Alshhrani,Nermin Hamza },
title = { Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B) },
journal = { International Journal of Computer Applications },
year = { 2018 },
volume = { 180 },
number = { 26 },
pages = { 23-28 },
doi = { 10.5120/ijca2018916598 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2018
%A Fatimah Alghamdi
%A Amal Alshhrani
%A Nermin Hamza
%T Effective Security Techniques for Automatic Dependent Surveillance-Broadcast (ADS-B)%T
%J International Journal of Computer Applications
%V 180
%N 26
%P 23-28
%R 10.5120/ijca2018916598
%I Foundation of Computer Science (FCS), NY, USA
Although air traffic is continuously increasing on a global scale, the next generation of management in this field is successfully handling this expansion and improving the safety of billions of future passengers. In this paper, Automatic Dependent Surveillance-Broadcast (ADS-B) was examined, which is a primary system, unlike traditional radar. This technology allows aircraft to automatically broadcast their intentions and location; however, it faces certain threats from which it requires some manner of protection. This paper discussed some techniques to encrypt and protect ADS-B messages. Staged Identity-Based Encryption (SIBE) was the most suitable means of solving the issues, providing, as it does, a sufficient level of security for ADS-B messages. In addition, the technique has attractive characteristics, such as confidentiality, efficiency, and a high enough degree of flexibility for effective key management and frequent encryption. This last attribute distinguishes the approach and renders it more popular than its peers.