Abstract
As a widely used air traffic monitoring and information transmission technology, the Automatic Dependent Surveillance - Broadcast (ADS-B) is gradually deployed to aircraft around the world. However, due to the openness of its communication protocol, it is vulnerable to malicious attacks. Aiming at the security threats of ADS-B system, this paper proposes an ADS-B data security scheme on the basis of tree-chain structure to realize the lightweight guarantee of ADS-B message reliability. Firstly, we used the idea of symmetric key delay disclosure in classical data authentication scheme to construct a tree-chain authentication model, which reduces the computation amount in authentication process and the length of key chain. Next, we used SM2 digital signature, which is more secure and computationally efficient, to authenticate the initial information in the signature phase. Compared with the original authentication scheme, our scheme improves the computation speed by about 4 times and reduces the number of keys in the authentication process, and is more applicable for ADS-B use cases with high real-time demand and tight computing resources.
This work was supported in part by the National Natural Science Foundation of China (Nos. 62172418, U1933108, and U2133203), the Natural Science Foundation of Tianjin China (21JCZDJC00830) the Scientific Research Project of Tianjin Municipal Education Commission (No. 2019KJ117), and the Fundamental Research Funds for the Central Universities of CAUC (No. 3122021026, 3122022081).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D.O.T., F.A.A.: FAA Aerospace Forecast: Fiscal Years 2013–2033. Technical report, Federal Aviation Administration (2013)
Wu, Z., Guo, A., Yue, M., Liu, L.: An ADS-B message authentication method based on certificateless short signature. IEEE Trans. Aerosp. Electron. Syst. 56(3), 1742–1753 (2020)
Atienza, E., Falah, R., Garcıa, S., Gutíerrez, L.: ADS-B: an air navigation revolution. Technical report, Universidad Rey Juan Carlos (2013)
Ali, B.S.: System specifications for developing an automatic dependent surveillance-broadcast (ADS-B) monitoring system. Int. J. Crit. Infr. Prot. 15, 40–46 (2016)
Post, J.: The next generation air transportation system of the united states: vision, accomplishments, and future directions. Engineering 7, 427–430 (2021)
Rekkas, C.: ADS-B and WAM deployment in Europe. In: Tyrrhenian International Workshop on Digital Communications - Enhanced Surveillance of Aircraft and Vehicles, Capri, pp. 35–40. IEEE (2011)
Schäfer, M., Lenders, V., Martinovic, I.: Experimental analysis of attacks on next generation air traffic communication. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 253–271. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38980-1_16
Slimane, H.O., Benouadah, S., Al Shamaileh, K., Devabhaktuni, V., Kaabouch, N.: ADS-B message injection attack on UAVs: assessment of SVM-based detection techniques. In: IEEE International Conference on Electro Information Technology, pp. 405–410. IEEE, Mankato (2022)
Wu, Z., Shang, T., Guo, A.: Security issues in automatic dependent surveillance - Broadcast (ADS-B): a survey. IEEE Access 8, 122147–122167 (2020)
Pan, W.J., Feng, Z.L.: ADS-B data authentication based on ECC and X.509 certificate. J. Electron. Sci. Technol. 10, 51–55 (2012)
Richard, C.: Secure ADS-B: towards airborne communications security in the federal aviation administration’s next generation air transportation system. Technical report, Air Force Institute of Technology (2014)
Yang, H., Zhou, Q., Yao, M., Lu, R., Li, H., Zhang, X.: A practical and compatible cryptographic solution to ADS-B security. IEEE Internet Things J. 6(2), 3322–3334 (2019)
Costin, A., Francillon, A.: Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. In: Proceedings of the Black Hat USA, pp. 1–12. Las Vegas (2012)
Zhou, J., Yan, J.: Secure and efficient identity-based batch verification signature scheme for ADS-B system. KSII Trans. Internet Inf. Syst. 13(12), 6243–6259 (2019)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the S &P 2000, pp. 56–73. IEEE, Berkeley (2000)
ISO/IEC 14888–3:2018: IT Security techniques—Digital signatures with appendix—Part 3: Discrete logarithm based mechanisms (2018). https://www.iso.org/obp/ui/#iso:std:iso-iec:14888:-3:ed-4:v1:en. Accessed 12 Nov 2018
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Cui, H., Zhu, S., Yue, M. (2023). LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication. In: Hsu, CH., Xu, M., Cao, H., Baghban, H., Shawkat Ali, A.B.M. (eds) Big Data Intelligence and Computing. DataCom 2022. Lecture Notes in Computer Science, vol 13864. Springer, Singapore. https://doi.org/10.1007/978-981-99-2233-8_12
Download citation
DOI: https://doi.org/10.1007/978-981-99-2233-8_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-2232-1
Online ISBN: 978-981-99-2233-8
eBook Packages: Computer ScienceComputer Science (R0)