Addressing Operator Privacy in Automatic Dependent Surveillance - Broadcast (ADS-B)

We investigate security of ADS-B system and propose a framework composed of two solutions that would require minimal change to the existing system. The investigation focuses on providing an encrypted ADS-B system that provides confidentiality, availability, and integrity while requiring minimal changes to the existing ADS-B specification. The proposed framework consisting of two solutions is envisioned to be implemented through software updates while providing backwards compatibility. The most challenging requirement during this study was to work within the constraints of the existing ADS-B

[1]  Robert F. Mills,et al.  Security analysis of the ADS-B implementation in the next generation air transportation system , 2011, Int. J. Crit. Infrastructure Prot..

[2]  Robert F. Mills,et al.  Enhancing the security of aircraft surveillance in the next generation air traffic control system , 2013, Int. J. Crit. Infrastructure Prot..

[3]  Ivan Martinovic,et al.  Realities and challenges of nextgen air traffic management: the case of ADS-B , 2014, IEEE Communications Magazine.

[4]  井口 克也,et al.  海外技術基準の動向 将来の空港面通信システムAeronautical Mobile Airport Communications System (AeroMACS)の動向について , 2010 .

[5]  Radha Poovendran,et al.  Assessment and mitigation of cyber exploits in future aircraft surveillance , 2010, 2010 IEEE Aerospace Conference.

[6]  R. D. Apaza,et al.  AeroMACS system characterization and demonstrations , 2013, 2013 IEEE Aerospace Conference.

[7]  Robert Mills,et al.  ADS-B encryption: confidentiality in the friendly skies , 2013, CSIIRW '13.

[8]  D. Hall,et al.  Enhanced ADS-B research , 2006, 2006 IEEE Aerospace Conference.

[9]  Duminda Wijesekera,et al.  Key distribution mechanism in secure ADS-B networks , 2015, 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS).

[10]  Naoki Kanada,et al.  Basic characteristic evaluation of aeromacs prototype system in Sendai airport , 2015, 2015 Integrated Communication, Navigation and Surveillance Conference (ICNS).

[11]  Ivan Martinovic,et al.  On the Security of the Automatic Dependent Surveillance-Broadcast Protocol , 2013, IEEE Communications Surveys & Tutorials.

[12]  Andrei Costin,et al.  Ghost is in the Air(Traffic) , 2012 .

[13]  Wenke Lee,et al.  Increased DNS forgery resistance through 0x20-bit encoding: security via leet queries , 2008, CCS.

[14]  Ivan Martinovic,et al.  Experimental Analysis of Attacks on Next Generation Air Traffic Communication , 2013, ACNS.

[15]  Zhang Xuejun,et al.  An application of fuzzy mathematics in ADS-B data validation , 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems.

[16]  Radha Poovendran,et al.  Privacy of future air traffic management broadcasts , 2009, 2009 IEEE/AIAA 28th Digital Avionics Systems Conference.

[17]  Sahar Amin,et al.  Design of a cyber security framework for ADS-B based surveillance systems , 2014, 2014 Systems and Information Engineering Design Symposium (SIEDS).

[18]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[19]  M. Bellare,et al.  The FFX Mode of Operation for Format-Preserving Encryption Draft 1 . 1 , 2010 .