• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages


Abstract

As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang and Xuefeng Ding, "An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages," KSII Transactions on Internet and Information Systems, vol. 7, no. 10, pp. 2544-2560, 2013. DOI: 10.3837/tiis.2013.10.013

[ACM Style]
Yang, H., Kim, H., Li, H., Yoon, E., Wang, X., and Ding, X. 2013. An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages. KSII Transactions on Internet and Information Systems, 7, 10, (2013), 2544-2560. DOI: 10.3837/tiis.2013.10.013