Abstract
This article highlights the importance of Air Traffic Control in ensuring the security and efficiency of international aviation operations. Traditional RADAR systems face limitations in power consumption, coverage, and accuracy, leading to the development of innovative solutions like the Automatic Dependent Surveillance-Broadcast (ADS-B) system. However, the open nature of ADS-B’s unencrypted signals poses security challenges, allowing attackers to intercept and manipulate data. To address this, the paper emphasizes the need for symmetric authentication, which uses shared secret keys through schemes like Message Authentication Codes and block cipher encryption. The choice between these methods depends on factors such as security, performance, and usability. Symmetric authentication is a practical solution, requiring robust shared keys and careful encryption algorithm selection. The research underscores the need for secure ADS-B systems and the trade-offs required in designing authentication schemes.
Similar content being viewed by others
Data availability
Not Applicable.
References
Zhou, J.X., Yan, J.H.: Secure and efficient identity-based batch verification signature scheme for ads-b system. KSII Trans. Internet Inform. Syst. (TIIS) 13(12), 6243–6259 (2019)
Roy, P., Dawn, D.: High-power and high-efficiency complementary metal–oxide–semiconductor voltage-controlled oscillator for automatic dependent surveillancebroadcast system. IET Microw. Antennas Propag. 9(14), 1632–1637 (2015)
Ali, B.S., Ochieng, W.Y., Schuster, W., Majumdar, A., Chiew, T.K.: A safety assessment framework for the automatic dependent surveillance broadcast (ads-b) system. Saf. Sci. 78, 91–100 (2015)
Leonardi, M., Piracci, E., Galati, G.: Ads-b jamming mitigation: a solution based on a multichannel receiver. IEEE Aerosp. Electron. Syst. Mag. 32(11), 44–51 (2017)
Cestaro, R., Conti, M., Mancini, E., Turrin, F.: OpenScope-sec: an ADS-B simulator to support the security research. In Proceedings of the 18th International Conference on Availability, Reliability and Security, pp. 1–6. (2023)
Yang, H., Kim, H., Li, H., Yoon, E., Wang, X., Ding, X.: An efficient broadcast authentication scheme with batch verification for ads-b messages. KSII Trans. Internet Inform. Syst. 7(10), 2544 (2013)
Comert, C., Gul, O.M., Kulhandjian, M., Touazi, A., Ellement, C., Kantarci, B., D’Amours, C.: Secure design of cyber-physical systems at the radio frequency level: machine and deep learning-driven approaches, challenges and opportunities. In: Artificial Intelligence for Cyber-Physical Systems Hardening, pp. 123–154. Springer, Cham (2022)
Swidan, A., Khattab, S., Abouelseoud, Y., Elkamchouchi, H.: A secure geographical routing protocol for highly-dynamic aeronautical networks. In: MILCOM 2015-2015 IEEE Military Communications Conference, pp. 708–713. IEEE (2015)
Yang, H., Li, H., Shen, X.S.: Secure Automatic Dependent Surveillance-Broadcast Systems, pp. 19–59. Springer, Cham (2022)
Chen, R., Si, C., Yang, H., Zhang, X.: ADS-B data authentication based on AH protocol. In: 2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing, pp. 21–24. IEEE (2013)
Wu, Z., Guo, A., Yue, M., Liu, L.: An ads-b message authentication method based on certificateless short signature. IEEE Trans. Aerosp. Electron. Syst. 56(3), 1742–1753 (2019)
Yang, H., Huang, R., Wang, X., Deng, J., Chen, R.: Ebaa: an efficient broadcast authentication scheme for ads-b communication based on ibs-mr. Chin. J. Aeronaut. 27(3), 688–696 (2014)
Yang, X., Tan, J., Baek, D.S., Wong, A.: New ads-b authentication framework based on efficient hierarchical identity-based signature with batch verification. IEEE Trans. Serv. Comput. 10(2), 165–175 (2015)
He, D., Kumar, N., Choo, K.K.R., Wu, W.: Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system. IEEE Trans. Inform. Forensics Secur. 12(2), 454–464 (2016)
Thumbur, G., Gayathri, N., Reddy, P.V., Rahman, M.Z.U., et al.: Efficient pairingfree identity-based ads-b authentication scheme with batch verification. IEEE Trans. Aerosp. Electron. Syst. 55(5), 2473–2486 (2019)
Subramani, J., Maria, A., Neelakandan, R.B., Rajasekaran, A.S.: Efficient anonymous authentication scheme for automatic dependent surveillance-broadcast system with batch verification. IET Commun. 15(9), 1187–1197 (2021)
Wesson, K. D., Humphreys, T. E., Evans, B. L.: Can cryptography secure next generation air traffic surveillance?. IEEE Security and Privacy Magazine. (2014)
Wu, Z., Shang, T., Guo, A.: Security issues in automatic dependent surveillancebroadcast (ads-b): a survey. IEEE Access 8, 122147–122167 (2020)
Baek, J., Byon, Y. J., Hableel, E., Al-Qutayri, M.: An authentication framework for automatic dependent surveillance-broadcast based on online/offline identity-based signature. In: 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, pp. 358–363. IEEE (2013)
Kacem, T., Wijesekera, D., Costa, P.: 2015 IEEE Aerospace Conference, pp. 1–8. IEEE (2015)
Yang, H., Zhou, Q., Yao, M., Lu, R., Li, H., Zhang, X.: A practical and compatible cryptographic solution to ads-b security. IEEE Internet Things J. 6(2), 3322–3334 (2019). https://doi.org/10.1109/JIOT.2018.2882633
Yang, H., Yao, M., Xu, Z., Liu, B.: GLOBECOM 2017–2017 IEEE Global Communications Conference, pp. 1–7. IEEE (2017)
Alghamdi, F., Alshrahani, A., Hamza, N.: Effective security techniques for automatic dependent surveillance-broadcast (ads-b). Int. J. Comput. Appl. 180(26), 23–28 (2018)
de Boer, T.: Securing the Automatic Dependent Surveillance-Broadcast (ADS-B) protocol against spoofing. (2020)
Samuelson, K., Valovage, E., Hall, D.: 2006 IEEE Aerospace Conference, p. 7. IEEE (2006)
Ahmed, H., Khan, H., Khan, M. A.: A Survey on Security and Privacy of Automatic Dependent Surveillance-Broadcast (ads-b) Protocol: Challenges, Potential Solutions and Future Directions. (2023)
Robinson, R. V., Sampigethaya, K., Li, M., Lintelman, S., Poovendran, R., von Oheimb, D.: Proceedings of the First CEAS European Air and Space Conference Century Perspectives (CEAS). (2007)
Perrig, A., Song, D., Canetti, R., Tygar, J. D., Briscoe, B.: Timed Efficient Stream Loss-Tolerant Authentication (Tesla): Multicast Source Authentication Transform Introduction. Tech. Rep. (2005)
Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009, Revised Selected Papers 16, pp. 295–312. Springer (2009)
Prakash, P., Abdelhadi, A., Pan, M.: Secure Authentication of Ads-b Aircraft Communications Using Retroactive Key Publication. arXiv preprint arXiv:1907.04909 (2019)
Khan, H., Khan, H., Ghafoor, S.: Securing Ads-b Communications Through a Novel Authentication Framework. Authorea Preprints (2023)
Gauthier, R., Seker, R.: Addressing Operator Privacy in Automatic Dependent Surveillance-Broadcast (Ads-b) (2018)
Aissaoui, R., Deneuville, J. C., Guerber, C., Pirovano, A.: Uav Traffic Management: A Survey on Communication Security. arXiv preprint arXiv:2211.05640 (2022)
Braeken, A.: Holistic air protection scheme of ads-b communication. IEEE Access 7, 65251–65262 (2019)
Liu, Y., Wang, J., Chen, Y., Niu, S., Lv, Z., Wu, L., Song, H.: 2021 IEEE Globecom Workshops (GC Wkshps), pp. 1–6. (2021)
ElMarady, A.A., Rahouma, K.: High accuracy next generation air traffic surveillance system with potential cyber-attacks. J. Adv. Eng. Trends 43(1), 123–132 (2024)
Eledlebi, K., Yeun, C.Y., Damiani, E., Al-Hammadi, Y.: Empirical studies of tesla protocol: properties, implementations, and replacement of public cryptography using biometric authentication. IEEE Access 10, 21941–21954 (2022)
Braeken, P.P.: Efficient generalized signcryption based on ecc. Int. J. Cryptogr. Inform. Secur. 5(2), 1–13 (2015)
Kyntaja, T.: A Logic of Authentication by Burrows, Abadi and Needham. Science Helsinki University of Technology, Tehran. http://www.tml.tkk.fi/Opinnot/Tik-110.501/1995/ban.html (1995)
Blanchet, B. et al.: Modeling and verifying security protocols with the applied pi calculus and proverif. Foundations and Trends® in Privacy and Security 1(1–2), 1–135 (2016)
Lumini, L.N.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057–1065 (2007)
Liu, W., Wei, J., Liang, M., Cao, Y., Hwang, I.: Multi-sensor fusion and fault detection using hybrid estimation for air traffic surveillance. IEEE Trans. Aerospace Electron. Syst. 49(4), 2323–2339 (2013)
Kilinc, H.H., Yanik, T.: A survey of sip authentication and key agreement schemes. IEEE Commun. Surv. Tutor. 16(2), 1005–1023 (2013)
Acknowledgements
We pay thanks to all authors, and National University of Sciences and Technology for providing us the platform to do our research.
Funding
There is no funding.
Author information
Authors and Affiliations
Contributions
All authors contributed equally wherever applicable.
Corresponding author
Ethics declarations
Conflict of interest
All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.
Ethical approval
Not Applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Sher, B., Ahmad, M., Mansoor, K. et al. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system. Cluster Comput 27, 12267–12282 (2024). https://doi.org/10.1007/s10586-024-04566-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-024-04566-5