Skip to main content

The ADS-B Protection Method for Next-Generation Air Traffic Management System

  • Conference paper
  • First Online:
Ubiquitous Computing Application and Wireless Sensor

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 331))

Abstract

ADS-B data is an important data to effectively utilize limited airspace as it contains main flight information including the location, altitude, speed, and others of plane but it is very vulnerable to hacking attack such as Ground Station Flood Denial, Ground Station Target Ghost Injection, etc. Therefore, the purpose of this study lies in proposing ground-to-ground security framework using SPKI certificate to protect ADS-B data received from the plane. In security framework proposed in this study, each ADS-B sensor connected to ATC is authenticated using SPKI certificate and creates encrypted ADS-B data using the authenticated data. Also, the verification on validity of transmission delayed ADS-B is conducted using timer information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lee SH et al (2013) The route adherence monitoring method for performance based navigation. In: 2013 summer conference of Korea information and communications society, June 2013

    Google Scholar 

  2. Australian Government Civil Aviation Safety Authority (2012) ADS-B, Civil Aviation Safety Authority, Nov 2012

    Google Scholar 

  3. McCallie D, Butts J, Mills R (2011) Security analysis of the ADS-B implementation in the next generation air transportation system. Int J Crit Infrastruct Protect 4:78–87

    Google Scholar 

  4. RTCA Inc (1994) VHF air-ground communications system improvements alternative study and selection of proposals for future action. In: RTCA/DO-255

    Google Scholar 

  5. Australian Government CASA (Civil Aviation Safety Authority), ADS-B(Automatic Dependent Surveillance-Broadcast, CASA, Nov 2012

    Google Scholar 

  6. Costin A, Francillon A (2012) Ghost in the Air (traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. In: Black Hat, USA

    Google Scholar 

  7. Ellison C et al (1999) SPKI certificate theory. Request for comments, RBC 2693, Sept 1999

    Google Scholar 

  8. Hwa Shin J et al (2003) An access control using SPKI certificate in peer-to-peer environment. J Inf Process Syst 10-C(6):793–798

    Google Scholar 

  9. Lee YK et al (2002) SPKI/SDSI HTTP secure server to support role-based access control & confidential communication. J Korea Institut Inf Secur Cryptol 12(6):256–261

    Google Scholar 

  10. Lee SH et al (2008) The research about the grid delegation service using the SPKI certificate. Inf J 2(6):215–230

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seoung-Hyeon Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Lee, SH., Han, JW., Lee, DG. (2015). The ADS-B Protection Method for Next-Generation Air Traffic Management System. In: Park, J., Pan, Y., Chao, HC., Yi, G. (eds) Ubiquitous Computing Application and Wireless Sensor. Lecture Notes in Electrical Engineering, vol 331. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9618-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-9618-7_10

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-017-9617-0

  • Online ISBN: 978-94-017-9618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics