Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Lightweight secure authentication protocol for automatic dependent surveillance broadcast system

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

This article highlights the importance of Air Traffic Control in ensuring the security and efficiency of international aviation operations. Traditional RADAR systems face limitations in power consumption, coverage, and accuracy, leading to the development of innovative solutions like the Automatic Dependent Surveillance-Broadcast (ADS-B) system. However, the open nature of ADS-B’s unencrypted signals poses security challenges, allowing attackers to intercept and manipulate data. To address this, the paper emphasizes the need for symmetric authentication, which uses shared secret keys through schemes like Message Authentication Codes and block cipher encryption. The choice between these methods depends on factors such as security, performance, and usability. Symmetric authentication is a practical solution, requiring robust shared keys and careful encryption algorithm selection. The research underscores the need for secure ADS-B systems and the trade-offs required in designing authentication schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

Not Applicable.

References

  1. Zhou, J.X., Yan, J.H.: Secure and efficient identity-based batch verification signature scheme for ads-b system. KSII Trans. Internet Inform. Syst. (TIIS) 13(12), 6243–6259 (2019)

    Google Scholar 

  2. Roy, P., Dawn, D.: High-power and high-efficiency complementary metal–oxide–semiconductor voltage-controlled oscillator for automatic dependent surveillancebroadcast system. IET Microw. Antennas Propag. 9(14), 1632–1637 (2015)

    Article  Google Scholar 

  3. Ali, B.S., Ochieng, W.Y., Schuster, W., Majumdar, A., Chiew, T.K.: A safety assessment framework for the automatic dependent surveillance broadcast (ads-b) system. Saf. Sci. 78, 91–100 (2015)

    Article  Google Scholar 

  4. Leonardi, M., Piracci, E., Galati, G.: Ads-b jamming mitigation: a solution based on a multichannel receiver. IEEE Aerosp. Electron. Syst. Mag. 32(11), 44–51 (2017)

    Article  Google Scholar 

  5. Cestaro, R., Conti, M., Mancini, E., Turrin, F.: OpenScope-sec: an ADS-B simulator to support the security research. In Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1–6. (2023)

  6. Yang, H., Kim, H., Li, H., Yoon, E., Wang, X., Ding, X.: An efficient broadcast authentication scheme with batch verification for ads-b messages. KSII Trans. Internet Inform. Syst. 7(10), 2544 (2013)

    Google Scholar 

  7. Comert, C., Gul, O.M., Kulhandjian, M., Touazi, A., Ellement, C., Kantarci, B., D’Amours, C.: Secure design of cyber-physical systems at the radio frequency level: machine and deep learning-driven approaches, challenges and opportunities. In: Artificial Intelligence for Cyber-Physical Systems Hardening, pp. 123–154. Springer, Cham (2022)

    Google Scholar 

  8. Swidan, A., Khattab, S., Abouelseoud, Y., Elkamchouchi, H.: A secure geographical routing protocol for highly-dynamic aeronautical networks. In: MILCOM 2015-2015 IEEE Military Communications Conference, pp. 708–713. IEEE (2015)

  9. Yang, H., Li, H., Shen, X.S.: Secure Automatic Dependent Surveillance-Broadcast Systems, pp. 19–59. Springer, Cham (2022)

    Google Scholar 

  10. Chen, R., Si, C., Yang, H., Zhang, X.: ADS-B data authentication based on AH protocol. In: 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, pp. 21–24. IEEE (2013)

  11. Wu, Z., Guo, A., Yue, M., Liu, L.: An ads-b message authentication method based on certificateless short signature. IEEE Trans. Aerosp. Electron. Syst. 56(3), 1742–1753 (2019)

    Article  Google Scholar 

  12. Yang, H., Huang, R., Wang, X., Deng, J., Chen, R.: Ebaa: an efficient broadcast authentication scheme for ads-b communication based on ibs-mr. Chin. J. Aeronaut. 27(3), 688–696 (2014)

    Article  Google Scholar 

  13. Yang, X., Tan, J., Baek, D.S., Wong, A.: New ads-b authentication framework based on efficient hierarchical identity-based signature with batch verification. IEEE Trans. Serv. Comput. 10(2), 165–175 (2015)

    Article  Google Scholar 

  14. He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inform. Forensics Secur. 12(2), 454–464 (2016)

    Article  Google Scholar 

  15. Thumbur, G., Gayathri, N., Reddy, P.V., Rahman, M.Z.U., et al.: Efficient pairingfree identity-based ads-b authentication scheme with batch verification. IEEE Trans. Aerosp. Electron. Syst. 55(5), 2473–2486 (2019)

    Article  Google Scholar 

  16. Subramani, J., Maria, A., Neelakandan, R.B., Rajasekaran, A.S.: Efficient anonymous authentication scheme for automatic dependent surveillance-broadcast system with batch verification. IET Commun. 15(9), 1187–1197 (2021)

    Article  Google Scholar 

  17. Wesson, K. D., Humphreys, T. E., Evans, B. L.: Can cryptography secure next generation air traffic surveillance?. IEEE Security and Privacy Magazine. (2014)

  18. Wu, Z., Shang, T., Guo, A.: Security issues in automatic dependent surveillancebroadcast (ads-b): a survey. IEEE Access 8, 122147–122167 (2020)

    Article  Google Scholar 

  19. Baek, J., Byon, Y. J., Hableel, E., Al-Qutayri, M.: An authentication framework for automatic dependent surveillance-broadcast based on online/offline identity-based signature. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 358–363. IEEE (2013)

  20. Kacem, T., Wijesekera, D., Costa, P.: 2015 IEEE Aerospace Conference, pp. 1–8. IEEE (2015)

  21. Yang, H., Zhou, Q., Yao, M., Lu, R., Li, H., Zhang, X.: A practical and compatible cryptographic solution to ads-b security. IEEE Internet Things J. 6(2), 3322–3334 (2019). https://doi.org/10.1109/JIOT.2018.2882633

    Article  Google Scholar 

  22. Yang, H., Yao, M., Xu, Z., Liu, B.: GLOBECOM 2017–2017 IEEE Global Communications Conference, pp. 1–7. IEEE (2017)

  23. Alghamdi, F., Alshrahani, A., Hamza, N.: Effective security techniques for automatic dependent surveillance-broadcast (ads-b). Int. J. Comput. Appl. 180(26), 23–28 (2018)

    Google Scholar 

  24. de Boer, T.: Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing. (2020)

  25. Samuelson, K., Valovage, E., Hall, D.: 2006 IEEE Aerospace Conference, p. 7. IEEE (2006)

  26. Ahmed, H., Khan, H., Khan, M. A.: A Survey on Security and Privacy of Automatic Dependent Surveillance-Broadcast (ads-b) Protocol: Challenges, Potential Solutions and Future Directions. (2023)

  27. Robinson, R. V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., von Oheimb, D.: Proceedings of the First CEAS European Air and Space Conference Century Perspectives (CEAS). (2007)

  28. Perrig, A., Song, D., Canetti, R., Tygar, J. D., Briscoe, B.: Timed Efficient Stream Loss-Tolerant Authentication (Tesla): Multicast Source Authentication Transform Introduction. Tech. Rep. (2005)

  29. Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009, Revised Selected Papers 16, pp. 295–312. Springer (2009)

  30. Prakash, P., Abdelhadi, A., Pan, M.: Secure Authentication of Ads-b Aircraft Communications Using Retroactive Key Publication. arXiv preprint arXiv:1907.04909 (2019)

  31. Khan, H., Khan, H., Ghafoor, S.: Securing Ads-b Communications Through a Novel Authentication Framework. Authorea Preprints (2023)

  32. Gauthier, R., Seker, R.: Addressing Operator Privacy in Automatic Dependent Surveillance-Broadcast (Ads-b) (2018)

  33. Aissaoui, R., Deneuville, J. C., Guerber, C., Pirovano, A.: Uav Traffic Management: A Survey on Communication Security. arXiv preprint arXiv:2211.05640 (2022)

  34. Braeken, A.: Holistic air protection scheme of ads-b communication. IEEE Access 7, 65251–65262 (2019)

    Article  Google Scholar 

  35. Liu, Y., Wang, J., Chen, Y., Niu, S., Lv, Z., Wu, L., Song, H.: 2021 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. (2021)

  36. ElMarady, A.A., Rahouma, K.: High accuracy next generation air traffic surveillance system with potential cyber-attacks. J. Adv. Eng. Trends 43(1), 123–132 (2024)

    Article  Google Scholar 

  37. Eledlebi, K., Yeun, C.Y., Damiani, E., Al-Hammadi, Y.: Empirical studies of tesla protocol: properties, implementations, and replacement of public cryptography using biometric authentication. IEEE Access 10, 21941–21954 (2022)

    Article  Google Scholar 

  38. Braeken, P.P.: Efficient generalized signcryption based on ecc. Int. J. Cryptogr. Inform. Secur. 5(2), 1–13 (2015)

    Google Scholar 

  39. Kyntaja, T.: A Logic of Authentication by Burrows, Abadi and Needham. Science Helsinki University of Technology, Tehran. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/ban.html (1995)

  40. Blanchet, B. et al.: Modeling and verifying security protocols with the applied pi calculus and proverif. Foundations and Trends® in Privacy and Security 1(1–2), 1–135 (2016)

  41. Lumini, L.N.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)

    Article  Google Scholar 

  42. Liu, W., Wei, J., Liang, M., Cao, Y., Hwang, I.: Multi-sensor fusion and fault detection using hybrid estimation for air traffic surveillance. IEEE Trans. Aerospace Electron. Syst. 49(4), 2323–2339 (2013)

    Article  Google Scholar 

  43. Kilinc, H.H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2013)

    Article  Google Scholar 

Download references

Acknowledgements

We pay thanks to all authors, and National University of Sciences and Technology for providing us the platform to do our research.

Funding

There is no funding.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed equally wherever applicable.

Corresponding author

Correspondence to Yawar Abbas Bangash.

Ethics declarations

Conflict of interest

All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Ethical approval

Not Applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sher, B., Ahmad, M., Mansoor, K. et al. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system. Cluster Comput 27, 12267–12282 (2024). https://doi.org/10.1007/s10586-024-04566-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-024-04566-5

Keywords