Skip to main content

LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication

  • Conference paper
  • First Online:
Big Data Intelligence and Computing (DataCom 2022)

Abstract

As a widely used air traffic monitoring and information transmission technology, the Automatic Dependent Surveillance - Broadcast (ADS-B) is gradually deployed to aircraft around the world. However, due to the openness of its communication protocol, it is vulnerable to malicious attacks. Aiming at the security threats of ADS-B system, this paper proposes an ADS-B data security scheme on the basis of tree-chain structure to realize the lightweight guarantee of ADS-B message reliability. Firstly, we used the idea of symmetric key delay disclosure in classical data authentication scheme to construct a tree-chain authentication model, which reduces the computation amount in authentication process and the length of key chain. Next, we used SM2 digital signature, which is more secure and computationally efficient, to authenticate the initial information in the signature phase. Compared with the original authentication scheme, our scheme improves the computation speed by about 4 times and reduces the number of keys in the authentication process, and is more applicable for ADS-B use cases with high real-time demand and tight computing resources.

This work was supported in part by the National Natural Science Foundation of China (Nos. 62172418, U1933108, and U2133203), the Natural Science Foundation of Tianjin China (21JCZDJC00830) the Scientific Research Project of Tianjin Municipal Education Commission (No. 2019KJ117), and the Fundamental Research Funds for the Central Universities of CAUC (No. 3122021026, 3122022081).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. D.O.T., F.A.A.: FAA Aerospace Forecast: Fiscal Years 2013–2033. Technical report, Federal Aviation Administration (2013)

    Google Scholar 

  2. Wu, Z., Guo, A., Yue, M., Liu, L.: An ADS-B message authentication method based on certificateless short signature. IEEE Trans. Aerosp. Electron. Syst. 56(3), 1742–1753 (2020)

    Article  Google Scholar 

  3. Atienza, E., Falah, R., Garcıa, S., Gutíerrez, L.: ADS-B: an air navigation revolution. Technical report, Universidad Rey Juan Carlos (2013)

    Google Scholar 

  4. Ali, B.S.: System specifications for developing an automatic dependent surveillance-broadcast (ADS-B) monitoring system. Int. J. Crit. Infr. Prot. 15, 40–46 (2016)

    Google Scholar 

  5. Post, J.: The next generation air transportation system of the united states: vision, accomplishments, and future directions. Engineering 7, 427–430 (2021)

    Article  Google Scholar 

  6. Rekkas, C.: ADS-B and WAM deployment in Europe. In: Tyrrhenian International Workshop on Digital Communications - Enhanced Surveillance of Aircraft and Vehicles, Capri, pp. 35–40. IEEE (2011)

    Google Scholar 

  7. Schäfer, M., Lenders, V., Martinovic, I.: Experimental analysis of attacks on next generation air traffic communication. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds.) ACNS 2013. LNCS, vol. 7954, pp. 253–271. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38980-1_16

    Chapter  Google Scholar 

  8. Slimane, H.O., Benouadah, S., Al Shamaileh, K., Devabhaktuni, V., Kaabouch, N.: ADS-B message injection attack on UAVs: assessment of SVM-based detection techniques. In: IEEE International Conference on Electro Information Technology, pp. 405–410. IEEE, Mankato (2022)

    Google Scholar 

  9. Wu, Z., Shang, T., Guo, A.: Security issues in automatic dependent surveillance - Broadcast (ADS-B): a survey. IEEE Access 8, 122147–122167 (2020)

    Article  Google Scholar 

  10. Pan, W.J., Feng, Z.L.: ADS-B data authentication based on ECC and X.509 certificate. J. Electron. Sci. Technol. 10, 51–55 (2012)

    Google Scholar 

  11. Richard, C.: Secure ADS-B: towards airborne communications security in the federal aviation administration’s next generation air transportation system. Technical report, Air Force Institute of Technology (2014)

    Google Scholar 

  12. Yang, H., Zhou, Q., Yao, M., Lu, R., Li, H., Zhang, X.: A practical and compatible cryptographic solution to ADS-B security. IEEE Internet Things J. 6(2), 3322–3334 (2019)

    Article  Google Scholar 

  13. Costin, A., Francillon, A.: Ghost in the air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. In: Proceedings of the Black Hat USA, pp. 1–12. Las Vegas (2012)

    Google Scholar 

  14. Zhou, J., Yan, J.: Secure and efficient identity-based batch verification signature scheme for ADS-B system. KSII Trans. Internet Inf. Syst. 13(12), 6243–6259 (2019)

    Google Scholar 

  15. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the S &P 2000, pp. 56–73. IEEE, Berkeley (2000)

    Google Scholar 

  16. ISO/IEC 14888–3:2018: IT Security techniques—Digital signatures with appendix—Part 3: Discrete logarithm based mechanisms (2018). https://www.iso.org/obp/ui/#iso:std:iso-iec:14888:-3:ed-4:v1:en. Accessed 12 Nov 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Yue .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cui, H., Zhu, S., Yue, M. (2023). LTCS: Lightweight Tree-Chain Scheme for ADS-B Data Authentication. In: Hsu, CH., Xu, M., Cao, H., Baghban, H., Shawkat Ali, A.B.M. (eds) Big Data Intelligence and Computing. DataCom 2022. Lecture Notes in Computer Science, vol 13864. Springer, Singapore. https://doi.org/10.1007/978-981-99-2233-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-2233-8_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-2232-1

  • Online ISBN: 978-981-99-2233-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics