Thabet Kacem, D. Wijesekera, P. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, A. Barreto
{"title":"安全ADS-B设计与评估","authors":"Thabet Kacem, D. Wijesekera, P. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, A. Barreto","doi":"10.1109/ICVES.2015.7396920","DOIUrl":null,"url":null,"abstract":"Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address the authenticity and integrity deficiencies of ADS-B protocol Previously. In this paper we extend it by improving the HMAC computation procedure at the transmitter and the HMAC verification procedure at the receiver. In addition, this new approach is also evaluated under some types of attacks, comparing its performance against unmodified ADS-B transmissions.","PeriodicalId":325462,"journal":{"name":"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Secure ADS-B design & evaluation\",\"authors\":\"Thabet Kacem, D. Wijesekera, P. Costa, Jeronymo M. A. Carvalho, Marcio Monteiro, A. Barreto\",\"doi\":\"10.1109/ICVES.2015.7396920\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address the authenticity and integrity deficiencies of ADS-B protocol Previously. In this paper we extend it by improving the HMAC computation procedure at the transmitter and the HMAC verification procedure at the receiver. In addition, this new approach is also evaluated under some types of attacks, comparing its performance against unmodified ADS-B transmissions.\",\"PeriodicalId\":325462,\"journal\":{\"name\":\"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICVES.2015.7396920\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Vehicular Electronics and Safety (ICVES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICVES.2015.7396920","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automatic Dependent Surveillance Broadcast (ADSB) is a newer air traffic surveillance protocol that is expected to strengthen and replace current RADAR-based surveillance systems, which has brought worldwide attention. However, its nature of clear text broadcast introduces many vulnerabilities to the system. We proposed a solution that uses keyed-hash message authentication code (HMAC) to address the authenticity and integrity deficiencies of ADS-B protocol Previously. In this paper we extend it by improving the HMAC computation procedure at the transmitter and the HMAC verification procedure at the receiver. In addition, this new approach is also evaluated under some types of attacks, comparing its performance against unmodified ADS-B transmissions.