Browse > Article
http://dx.doi.org/10.3837/tiis.2019.12.024

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System  

Zhou, Jing-xian (Information Security Evaluation Center, Civil Aviation University of China)
Yan, Jian-hua (School of Information and Electric Engineering, Ludong University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.12, 2019 , pp. 6243-6259 More about this Journal
Abstract
As a foundation of next-generation air transportation systems, automatic dependent surveillance-broadcast (ADS-B) helps pilots and air traffic controllers create a safer and more efficient national airspace system. Owing to the open communication environment, it is easy to insert fake aircraft into the system via spoofing or the insertion of false messages. Efforts have thus been made in academic research and practice in the aviation industry to ensure the security of transmission of messages of the ADS-B system. An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the application of complex hash-to-point operations or bilinear pairing operations. In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message verification and against the replaying attack. The proposed IBV scheme needs only a small and constant number of point multiplication and point addition computations instead of hash-to-point or pairing operations. Detailed performance analyses were conducted to show that the proposed IBV scheme has clear advantages over prevalent schemes in terms of computational cost and transmission overhead.
Keywords
ADS-B; identity-based signature; batch verification; efficient; pairing free;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 U.S. Department of Commerce, "Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4," CreateSpace Independent Publishing Platform, 2015.
2 J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo, "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, 2014.   DOI
3 D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, no. 3, pp. 361-396, Jul. 2000.   DOI
4 J. Camenisch, S. Hohenberger, and M. O. Pedersen, "Batch verification of short signatures," in Proc. of Advances in Cryptology - EUROCRYPT 2007, pp. 246-263, 2007.
5 S. Meijer, "Secure location verification for ADS-B," Radboud University, Bachelor's thesis, 2016.
6 H. M. Yang, H. Kim, H. W. Li, E. Yoon, X. F. Wang, and X. F. Ding, "An efficient broadcast authentication scheme with batch verification for ADS-B messages," KSII Transactions on Internet & Information Systems, vol. 7, no. 10, pp. 2544-2560, 2013.   DOI
7 M. Strohmeier, M. Schafer, V. Lenders, and I. Martinovic, "Realities and challenges of nextgen air traffic management: The case of ADS-B," IEEE Communications Society, vol. 52, no. 5, pp. 111-118, 2014.
8 Civil Aviation Administration of China, "China Civil Aviation ADS-B implementation plan," 2017.
9 J. Baek, E. Hableel, Y. J. Byon, D. S. Wong, K. Jang, and H. Yeo, "How to protect ads-b: confidentiality framework and efficient realization based on staged identity-based encryption," IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 3, pp. 690-700, 2017.   DOI
10 M. Schafer, V. Lenders, and I. Martinovic, "Experimental analysis of attacks on next generation air traffic communication," in Proc. of Applied Cryptography and Network Security conference 2013, Lecture Notes in Computer Science, vol. 7954, pp. 253-271, 2013.
11 Y. Kim, J. Y. Jo, and S. Lee, "ADS-B vulnerabilities and a security solution with a timestamp," IEEE Aerospace & Electronic Systems Magazine, vol. 32, no. 11, pp. 52-61, 2017.   DOI
12 M. Leonardi, E. Piracci, and G. Galati, "ADS-B jamming mitigation: a solution based on a multichannel receiver," IEEE Aerospace & Electronic Systems Magazine, vol. 32, no. 11, pp. 44-51, 2017.   DOI
13 C. Zhang, P. H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.   DOI
14 D. B. He, N. Kumar, K. K. R. Choo, and W. Wu, "Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System," IEEE Transactions on Information Forensics & Security, vol. 12, no. 2, pp. 454-464, 2017.   DOI
15 A. J. Yang, X. Tan, J. Baek, and D. Wong, "A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification," IEEE Transactions on Services Computing, vol. 10, no. 2, pp. 165-175, 2017.   DOI
16 W. J. Pan, Z. L. Feng, and Y. Wang, "ADS-B Data Authentication Based on ECC and X.509 Certificate," Journal of Electronic Science and Technology, vol. 10, no. 1, pp. 51-55, 2012.
17 K. Sampigethaya, R. Poovendran, S. Shetty, et al., "Future E-Enabled aircraft communications and security: the next 20 years and beyond," Proceedings of the IEEE, vol. 99, no. 11, pp. 2040-2055, 2011.   DOI
18 C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. of 27th IEEE INFOCOM, pp. 816-824, 2008.
19 C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, no. 6, pp. 1441-1449, 2013.   DOI
20 S F Tzeng, S J Horng, T Li, et al., "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3235-3248, 2017.   DOI
21 RTCA DO-282, "Minimum Operational Performance Standards for Universal Access Transceiver (UAT) automatic dependent surveillance - broadcast," 2009.
22 RTCA DO-260A, "Minimum Operational Performance Standard for 1090 MHz Extended Squitter ADS-B and TIS-B," 2002.
23 Federal Aviation Administration, "Aeronautical Information Manual," Washington: Government Printing Office, 2012.
24 D. McCallie, J. Butts, and R. Mills, "Security analysis of the ADS-B implementation in the next generation air transportation system," International Journal of Critical Infrastructure Protection, vol. 4, no. 2, pp. 78-87, 2011.   DOI
25 K. Samuelson, E. Valovage, and D. Hall, "Enhanced ads-b research," IEEE Aerospace & Electronic Systems Magazine, vol. 22, no. 5, pp. 35-38, 2006.   DOI
26 M. Strohmeier, V. Lenders, and I. Martinovic, "Security of ads-b: State of the art and beyond," arXiv preprint arXiv:1307.3664, 2013.
27 A. Costin, and A. Francillon, "Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices," in Proc. of Black Hat '2012, July 21-26, Las Vegas, NV, USA, pp. 1-10, 2012.