• Corpus ID: 15440644

Comparative Analysis of ADS-B Verification Techniques

@inproceedings{Kovell2012ComparativeAO,
  title={Comparative Analysis of ADS-B Verification Techniques},
  author={Brandon Kovell and Benjamin P. Mellish and Thomas Newman},
  year={2012}
}
ADS-B is one of many Federal Aviation Administration (FAA) regulated technologies used to monitor air traffic with high precision, while reducing dependencies on dated and costly radar equipment [1]. The FAA hopes to decrease the separation between aircraft, reduce risk of collision as air traffic density increases, save fuel costs, and increase situational awareness of both commercial and general aviation aircraft within United States airspace. Several aviation technology experts have… 

Figures from this paper

How to protect ADS-B: Confidentiality framework for future air traffic communication
TLDR
This work proposes a Staged Identity Based Encryption (SIBE) scheme, which is an extended version of hybrid Identity-Based Encryption, and introduces a new confidentiality framework for future e-Enabled aircrafts with ADS-B capability.
ADS-B, Friend or Foe: ADS-B Message Authentication for NextGen Aircraft
  • Emily Cook
  • Computer Science
    2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
  • 2015
TLDR
A message authentication scheme that uses a Public Key Infrastructure (PKI) to verify all ADS-B signals are from FAA registered aircraft, and uses asymmetric cryptography to exchange a symmetric session key to validate data authenticity and integrity.
Security of ADS-B: State of the Art and Beyond
TLDR
This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security, and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption
TLDR
A Staged Identity-Based Encryption (SIBE) scheme is proposed, which modifies Boneh and Franklin's original IBE scheme to address the challenges to construct an efficient and functional encryption scheme for ADS-B system.
Short-Term and Long-Term Solutions for Secure Verification of Aircraft- Reported ADS-B Location in Air Traffic Networks
TLDR
This paper dismisses the need for encryption and focuses security strategies on location verification for effective and undemanding short-term and long-term location verification in automatic dependent surveillance-broadcast.
Holistic Air Protection Scheme of ADS-B Communication
TLDR
HAP is able to provide different levels of security by offering authentication of the payload with potential encryption of identifier and/or payload of the message and is also able to obtain faster authentication and a thus faster guarantee of a verified update.
Security Issues in Automatic Dependent Surveillance - Broadcast (ADS-B): A Survey
TLDR
A multi-layered security framework is proposed in future research work, which includes detecting and preventing different attacks in the ADS-B system, which is vulnerable to deliberate intrusions and attacks.
UAT ADS-B Data Anomalies and the Effect of Flight Parameters on Dropout Occurrences
TLDR
The data investigation revealed ADS-B message suffered from different anomalies including drop out; missing payload; data jump; low confident data and altitude discrepancy, which identified that altitude affected drop out more than any other flight parameters.
ADS-B Performance Monitoring and Potential Electromagnetic Interference
TLDR
Performance test analysis of ADS-B based surveillance equipments related to the most importance performance parameter namely the continuous reception of messages in terms of message drops and probability of update interval message receptions are discussed.
...
...

References

SHOWING 1-10 OF 38 REFERENCES
Visualization & assessment of ADS-B security for green ATM
TLDR
A solution to protect message integrity in ADS-B IN based airborne surveillance is presented, the accuracy and robustness of the solution in the presence of spoofed or compromised nodes and intentional jamming are discussed, and a security simulation tool concept and design are proposed.
Assessment and mitigation of cyber exploits in future aircraft surveillance
TLDR
This work is the first to identify the need for mechanisms to secure ADS-B based airborne surveillance and propose a security solution, and streamlines a threat assessment methodology for security evaluation of ADS- B based surveillance.
Aircraft ADS-B Data Integrity Check
TLDR
A system has been built to provide continuous real-time state estimates of the aircraft being tracked and a verification that the aircraft is following the ADS-B broadcast intent, and continuous Geometric Conformance and Intent Conformance metrics are defined to analyze ADS- B intent verification.
Integrated aviation security for defense-in-depth of next generation air transportation system
  • W. Li, P. Kamal
  • Computer Science
    2011 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2011
TLDR
This paper proposes an Integrated Aviation Security (IAS) framework for defense-in-depth of various aspects of NextGen security such as cyber security and aircraft anti-hijacking and presents a detailed implementation approach of IAS including the AlertEnterprise based Integrated Risk Management (IRM) Model.
Enhanced ADS-B Research
  • E. Valovage
  • Computer Science
    2006 ieee/aiaa 25TH Digital Avionics Systems Conference
  • 2006
TLDR
Research is currently being performed by Sensis Corporation in cooperation with NASA Glenn Research Center to provide enhancements to the ADS-B UAT (universal access transceiver) data link to encourage user acceptance by improving upon existing capability and usability.
Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond
TLDR
It is shown why performance targets such as safety, security, capacity, efficiency, environmental benefit, travel comfort, and convenience will heavily depend on communications, networking and cyber-physical security capabilities of the e-enabled aircraft.
NAV CANADA implements ADS-B
  • George T. Wright
  • Computer Science
    2009 Integrated Communications, Navigation and Surveillance Conference
  • 2009
TLDR
The Hudson Bay ADS-B project is described and the challenges the authors faced and the approach they applied to integrate the data from this CNS technology into their Air Traffic Management (ATM) environment are described.
L-DACS1 air-to-air data-link protocol design and performance
TLDR
The research towards the design and the performance evaluation of the proposed medium access control sub-layer and logical link control sublayer of the L-DACS1 air-to-air protocol stack are presented.
Privacy of future air traffic management broadcasts
TLDR
This paper identifies location privacy threats and proposes anonymity solutions that can enhance privacy level of aircraft operators and passengers without compromising airspace security.
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
TLDR
A new attack on network coordinate systems, Frog-Boiling, is described that is more disruptive than the previously known attacks and systems that attempt to reject “bad” inputs by statistical means or reputation cannot be used to secure a network coordinate system.
...
...