Thabet Kacem, D. Wijesekera, P. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, A. Barreto
{"title":"Secure ADS-B design & evaluation","authors":"Thabet Kacem, D. Wijesekera, P. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, A. Barreto","doi":"10.1109/ICVES.2015.7396920","DOIUrl":null,"url":null,"abstract":"Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address the authenticity and integrity deficiencies of ADS-B protocol Previously. In this paper we extend it by improving the HMAC computation procedure at the transmitter and the HMAC verification procedure at the receiver. In addition, this new approach is also evaluated under some types of attacks, comparing its performance against unmodified ADS-B transmissions.","PeriodicalId":325462,"journal":{"name":"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVES.2015.7396920","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address the authenticity and integrity deficiencies of ADS-B protocol Previously. In this paper we extend it by improving the HMAC computation procedure at the transmitter and the HMAC verification procedure at the receiver. In addition, this new approach is also evaluated under some types of attacks, comparing its performance against unmodified ADS-B transmissions.