1 |
U.S. Department of Commerce, "Secure Hash Standard - SHS: Federal Information Processing Standards Publication 180-4," CreateSpace Independent Publishing Platform, 2015.
|
2 |
J. K. Liu, T. H. Yuen, M. H. Au, and W. Susilo, "Improvements on an authentication scheme for vehicular sensor networks," Expert Systems with Applications, vol. 41, no. 5, pp. 2559-2564, 2014.
DOI
|
3 |
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, vol. 13, no. 3, pp. 361-396, Jul. 2000.
DOI
|
4 |
J. Camenisch, S. Hohenberger, and M. O. Pedersen, "Batch verification of short signatures," in Proc. of Advances in Cryptology - EUROCRYPT 2007, pp. 246-263, 2007.
|
5 |
S. Meijer, "Secure location verification for ADS-B," Radboud University, Bachelor's thesis, 2016.
|
6 |
H. M. Yang, H. Kim, H. W. Li, E. Yoon, X. F. Wang, and X. F. Ding, "An efficient broadcast authentication scheme with batch verification for ADS-B messages," KSII Transactions on Internet & Information Systems, vol. 7, no. 10, pp. 2544-2560, 2013.
DOI
|
7 |
M. Strohmeier, M. Schafer, V. Lenders, and I. Martinovic, "Realities and challenges of nextgen air traffic management: The case of ADS-B," IEEE Communications Society, vol. 52, no. 5, pp. 111-118, 2014.
|
8 |
Civil Aviation Administration of China, "China Civil Aviation ADS-B implementation plan," 2017.
|
9 |
J. Baek, E. Hableel, Y. J. Byon, D. S. Wong, K. Jang, and H. Yeo, "How to protect ads-b: confidentiality framework and efficient realization based on staged identity-based encryption," IEEE Transactions on Intelligent Transportation Systems, vol. 18, no. 3, pp. 690-700, 2017.
DOI
|
10 |
M. Schafer, V. Lenders, and I. Martinovic, "Experimental analysis of attacks on next generation air traffic communication," in Proc. of Applied Cryptography and Network Security conference 2013, Lecture Notes in Computer Science, vol. 7954, pp. 253-271, 2013.
|
11 |
Y. Kim, J. Y. Jo, and S. Lee, "ADS-B vulnerabilities and a security solution with a timestamp," IEEE Aerospace & Electronic Systems Magazine, vol. 32, no. 11, pp. 52-61, 2017.
DOI
|
12 |
M. Leonardi, E. Piracci, and G. Galati, "ADS-B jamming mitigation: a solution based on a multichannel receiver," IEEE Aerospace & Electronic Systems Magazine, vol. 32, no. 11, pp. 44-51, 2017.
DOI
|
13 |
C. Zhang, P. H. Ho, and J. Tapolcai, "On batch verification with group testing for vehicular communications," Wireless Networks, vol. 17, no. 8, pp. 1851-1865, 2011.
DOI
|
14 |
D. B. He, N. Kumar, K. K. R. Choo, and W. Wu, "Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System," IEEE Transactions on Information Forensics & Security, vol. 12, no. 2, pp. 454-464, 2017.
DOI
|
15 |
A. J. Yang, X. Tan, J. Baek, and D. Wong, "A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification," IEEE Transactions on Services Computing, vol. 10, no. 2, pp. 165-175, 2017.
DOI
|
16 |
W. J. Pan, Z. L. Feng, and Y. Wang, "ADS-B Data Authentication Based on ECC and X.509 Certificate," Journal of Electronic Science and Technology, vol. 10, no. 1, pp. 51-55, 2012.
|
17 |
K. Sampigethaya, R. Poovendran, S. Shetty, et al., "Future E-Enabled aircraft communications and security: the next 20 years and beyond," Proceedings of the IEEE, vol. 99, no. 11, pp. 2040-2055, 2011.
DOI
|
18 |
C. Zhang, R. Lu, X. Lin, P. H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. of 27th IEEE INFOCOM, pp. 816-824, 2008.
|
19 |
C. C. Lee and Y. M. Lai, "Toward a secure batch verification with group testing for VANET," Wireless Networks, vol. 19, no. 6, pp. 1441-1449, 2013.
DOI
|
20 |
S F Tzeng, S J Horng, T Li, et al., "Enhancing Security and Privacy for Identity-based Batch Verification Scheme in VANET," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3235-3248, 2017.
DOI
|
21 |
RTCA DO-282, "Minimum Operational Performance Standards for Universal Access Transceiver (UAT) automatic dependent surveillance - broadcast," 2009.
|
22 |
RTCA DO-260A, "Minimum Operational Performance Standard for 1090 MHz Extended Squitter ADS-B and TIS-B," 2002.
|
23 |
Federal Aviation Administration, "Aeronautical Information Manual," Washington: Government Printing Office, 2012.
|
24 |
D. McCallie, J. Butts, and R. Mills, "Security analysis of the ADS-B implementation in the next generation air transportation system," International Journal of Critical Infrastructure Protection, vol. 4, no. 2, pp. 78-87, 2011.
DOI
|
25 |
K. Samuelson, E. Valovage, and D. Hall, "Enhanced ads-b research," IEEE Aerospace & Electronic Systems Magazine, vol. 22, no. 5, pp. 35-38, 2006.
DOI
|
26 |
M. Strohmeier, V. Lenders, and I. Martinovic, "Security of ads-b: State of the art and beyond," arXiv preprint arXiv:1307.3664, 2013.
|
27 |
A. Costin, and A. Francillon, "Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices," in Proc. of Black Hat '2012, July 21-26, Las Vegas, NV, USA, pp. 1-10, 2012.
|