[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

Published: 01 March 2017 Publication History

Abstract

Automatic Dependent Surveillance-Broadcast (ADS-B) is one of the key technologies for future “e-Enabled” aircrafts. ADS-B uses avionics in the e-Enabled aircrafts to broadcast essential flight data such as call sign, altitude, heading, and other extra positioning information. On the one hand, ADS-B brings significant benefits to the aviation industry, but, on the other hand, it could pose security concerns as channels between ground controllers and aircrafts for the ADS-B communication are not secured, and ADS-B messages could be captured by random individuals who own ADS-B receivers. In certain situations, ADS-B messages contain sensitive information, particularly when communications occur among mission-critical civil airplanes. These messages need to be protected from any interruption and eavesdropping. The challenge here is to construct an encryption scheme that is fast enough for very frequent encryption and that is flexible enough for effective key management. In this paper, we propose a Staged Identity-Based Encryption (SIBE) scheme, which modifies Boneh and Franklin's original IBE scheme to address those challenges, that is, to construct an efficient and functional encryption scheme for ADS-B system. Based on the proposed SIBE scheme, we provide a confidentiality framework for future e-Enabled aircraft with ADS-B capability.

References

[1]
E. Hableel, J. Baek, Y. Byon, and D. S. Wong, “How to protect ADS-B: Confidentiality framework for future air traffic communication,” in Proc. IEEE INFOCOM Workshops, 2015, pp. 155–160.
[2]
K. Sampigethaya, R. Poovendran, S. Shetty, T. Davis, and C. Royalty, “Future e-enabled aircraft communications and security: The next 20 years and beyond,” Proc. IEEE, vol. Volume 99, no. Issue 11, pp. 2040–2055, 2011.
[3]
K. Gosling, “e-Enabled capabilities of the 787 dreamliner, ” <institution>Boeing Company, Seattle, WA, USA</institution>, AERO, QTR01-09, 2009.
[4]
“ Minimum aviation system performance. Standards for Automatic Dependent Surveillance Broadcast (ADS-B), ” <institution>Radio Tech. Commiss. Aeronaut. (RTCA), Washington, DC, USA</institution>, 2002.
[5]
E. Atienza, R. Falah, S. Garca, L. Gutierrez, and O. Robles, “ADS-B: An air navigation revolution, ” <institution>Report: Rey Juan Carlos Univ.—Fuenlabrada Campus, Madrid, Spain</institution>, 2013.
[6]
, 2013. {Online}. Available: http://planefinder.net/
[7]
K. Sampigethaya, R. Poovendran, and L. Bushnell, “Secure operation, control, and maintenance of future e-enabled airplanes,” Proc. IEEE, vol. Volume 96, no. Issue 12, pp. 1992–2007, 2008.
[8]
R. Barhydt and A. Warren, Development of intent information changes to revised minimum aviation system performance standards for automatic dependent surveillance broadcast (RTCA/DO-242A) .Hampton, VA, USA: Nat. Aeronaut. Space Admin., Langley Res. Center, 2002.
[9]
K. Sampigethaya, R. Poovendran, and L. Bushnell, “Assessment and mitigation of cyber exploits in future aircraft surveillance,” in Proc. IEEE Aerosp. Conf., 2010, pp. 1–10.
[10]
R. Poovendran, “A community report of the 2008 workshop on high confidence transportation cyber-physical systems,” in Proc. ENC-GNSS, 2009, pp. 1–66.
[11]
A. Costin and A. Francillon, “Ghost in the air(traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices,” in Proc. Black Hat USA, 2012, pp. 1–9.
[12]
K. Samuelson, E. Valovage, and D. Hall, “Enhanced ADS-B research,” in Proc. IEEE Aerosp, 2006, pp. 35–38.
[13]
F. Ziliang, P. Weijun, and W. Yang, “A data authentication solution of ADS-B system based on x.509 certificate,” in Proc. 27th Int. Congress Aeronaut. Sci., 2010, pp. 1–6.
[14]
J. Baek, Y. Byon, E. Hableel, and M. Al-Qutayri, “Making air traffic surveillance more reliable: A new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature,” Security Commun. Netw., vol. Volume 8, no. Issue 5, pp. 740–750, 2015.
[15]
D. Boneh and M. K. Franklin, “<chapter-title>Identity-based encryption from the weil pairing</chapter-title>,” in Proc. CRYPTO, 2001, vol. Volume 2139, pp. 213–229.
[16]
“ Automatic Dependent Surveillance Broadcast (ADSB) out performance requirements to support Air Traffic Control (ATC) service; final rule, ” <institution>Federal Aviation Admin. (FAA), Washington, DC, USA</institution>, 2010.
[17]
B. Kovell, B. Mellish, T. Newman, and O. Kajopaiye, “Comparative analysis of ADS-B verification techniques, ” <institution>Univ. Colorado, Boulder, CO, USA</institution>, Tech. Rep., 2012.
[18]
J. Krozel and D. Andrisani, “Independent ADS-B verification and validation,” in In Proc. AIAA Aviation, Technol., Integr., Oper. Conf., 2005, pp. 1–11.
[19]
“ Minimum operating performance standard for Universal Access Transceiver (UAT) automatic dependent surveillance broadcast, ” <institution>Radio Tech. Commiss. Aeronaut., Washington, DC, USA</institution>, 2004.
[20]
M. Strohmeier, V. Lenders, and I. Martinovic, “On the security of the automatic dependent surveillance-broadcast protocol,” IEEE Commun. Surveys Tuts., vol. Volume 17, no. Issue 2, pp. 1066–1087, 2014.
[21]
D. McCalline, J. Butts, and R. Mills, “Security analysis of the ADS-B implementation in the next generation air transportation system,” Int. J. Crit. Infrastruct. Protect., vol. Volume 4, no. Issue 2, pp. 78–87, 2011.
[22]
C. Pöpper, N. Tippenhauer, B. Danev, and S. Capkun, Investigation of Signal and Message Manipulations on the Wireless Channel .New York, NY, USA: Springer, 2011.
[23]
M. Wilhias, J. Schmitt, and V. Lenders, “Practical message manipulation attacks in ieee 802.15. 4 wireless networks,” in Proc. MMB DFT Workshop, 2012, pp. 29–31.
[24]
K. Sampingthaya, S. Lintelman, R. Robinson, and M. Li, “Challenges in aviation CPS asset collection and distribution,” presented at the Position Paper, National Workshop for Research on Transportation CPS: Automotive, Aviation and Rail, 2008.
[25]
L. Purton, H. Abbass, and S. Alam, “Identification of ADS-B system vulnerabilities and threats,” in Proc. Australian Transp. Res. Forum, Canberra, Australia, 2010, pp. 1–16.
[26]
C. Wargo and C. Dhas, “Security considerations for the e-enabled aircraft,” in Proc. IEEE Aeros. Conf., 2003, pp. 4_1533–4_1550.
[27]
E. Laster, “Military position source challenges for worldwide ADS-B out compliance,” in Proc. IEEE ICNS Conf., 2013, pp. 1–12.
[28]
S. Lo, B. Peterson, and P. Enge, “Assessing the security of a navigation system: A case study using enhanced loran,” in Proc. ENC-GNSS, 2009.
[29]
M. Schäfer, I. Martinovic, and V. Lenders, “<chapter-title>Experimental analysis of attacks on next generation air traffic communication</chapter-title>,” in Applied Cryptography and Network Security .New York, NY, USA: Springer, pp. 253–271, 2013.
[30]
A. Shamir, “<chapter-title>Identity-based cryptosystems and signature schemes</chapter-title>,” in Advances in cryptology, CRYPTO '84 .Berlin, Germany: Springer, 1985, pp. 47–53.
[31]
W. Han and Z. Zhu, “An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem,” Int. J. Commun. Syst., vol. Volume 27, no. Issue 8, pp. 1173–1185, 2014.
[32]
X. Boyen, “A tapestry of identity-based encryption: Practical frameworks compared,” Int. J. Appl. Cryptogr., vol. Volume 1, no. Issue 1, pp. 3–21, 2008.
[33]
J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2nd ed.Boca Raton, FL, USA: CRC Press, 2015.
[34]
B. Kaliski. <institution>Network Working Group, Internet Eng. Task Force (IETF), Fremont, CA, USA</institution>, 1998. {Online}. Available: https://tools.ietf.org/html/rfc2315
[35]
A. Perrig, R. Szewczyk, J. D. Tygar, W. Wen, and D. E. Culler, “Spins: Security protocols for sensor networks,” Wireless Netw., vol. Volume 8, no. Issue 5, pp. 521–534, 2002.
[36]
C. Sheedy, “Privacy enhanced protocols using pairing based cryptography, ” Ph.D. dissertation. Dublin City Univ., Dublin, Ireland, 2010.
[37]
E. Kiltz, “Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts,” in Proc. ACISP, 2006, vol. Volume 4058, pp. 336–347.
[38]
C. Vigier, “Automatic Dependent Surveillance Broadcast (ADS-B) surveillance development for air traffic management,” in Proc. FAST Mag., 2011, pp. 8–13.
[39]
M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, “<chapter-title>Relations among notions of security for public-key encryption schemes</chapter-title>,” in Advances in cryptology, CRYPTO .Berlin, Germany: Springer-Verlag, 1998, pp. 26–45.
[40]
C. Dong. {Online}. Available: https://personal.cis.strath.ac.uk/changyu.dong/jpair/intro.html
[41]
X. Boyen and D. Boneh, “<chapter-title>Efficient selective-ID secure identity based encryption without random oracles</chapter-title>,” in Eurocrypt, vol. Volume 3027 .Berlin, Germany: Springer, 2004, pp. 223–238.

Cited By

View all
  1. How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image IEEE Transactions on Intelligent Transportation Systems
        IEEE Transactions on Intelligent Transportation Systems  Volume 18, Issue 3
        March 2017
        252 pages

        Publisher

        IEEE Press

        Publication History

        Published: 01 March 2017

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 21 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media