A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification

被引:56
|
作者
Yang, Anjia [1 ]
Tan, Xiao [1 ]
Baek, Joonsang [2 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Khalifa Univ Sci Technol & Res, Dept Elect & Comp Engn, Abu Dhabi, U Arab Emirates
关键词
ADS-B; authentication; batch verification; aviation communication security; hierarchical identity-based signature;
D O I
10.1109/TSC.2015.2459709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic dependent surveillance-broadcast (ADS-B) has become a crucial part of next generation air traffic surveillance technology and will be mandatorily deployed for most of the airspaces worldwide by 2020. Each aircraft equipped with an ADS-B device keeps broadcasting plaintext messages to other aircraft and the ground station controllers once or twice per second. The lack of security measures in ADS-B systems makes it susceptible to different attacks. Among the various security issues, we investigate the integrity and authenticity of ADS-B messages. We propose a new framework for providing ADS-B with authentication based on three-level hierarchical identity-based signature (HIBS) with batch verification. Previous signature-based ADS-B authentication protocols focused on how to generate signatures efficiently, while our schemes can also significantly reduce the verification cost, which is critical to ADS-B systems, since at any time an ADS-B receiver may receive lots of signatures. We design two concrete schemes. The basic scheme supports partial batch verification and the extended scheme provides full batch verification. We give a formal security proof for the extended scheme. Experiment results show that our schemes with batch verification are tremendously more efficient in batch verifying n signatures than verifying n signatures independently. For example, the running time of verifying 100 signatures is 502 and 484 ms for the basic scheme and the extended scheme respectively, while the time is 2500 ms if verifying the signatures independently.
引用
收藏
页码:165 / 175
页数:11
相关论文
共 50 条
  • [21] An efficient identity-based batch verification scheme for Vehicular Sensor Networks
    Zhang, Chenxi
    Lu, Rongxing
    Lin, Xiaodong
    Ho, Pin-Han
    Shen, Xuemin
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 816 - 824
  • [22] New Constructions of Hierarchical Identity-Based Signature in the Standard Model
    Wu Qing
    Sun Suxia
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1356 - 1361
  • [23] A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks
    Feng, Meng
    Lai, Chin-Feng
    Liu, Hong
    Qi, Rongxin
    Shen, Jian
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1303 - 1311
  • [24] Hierarchical Identity-Based Signature in Polynomial Rings
    Yang, Zhichao
    Duong, Dung H.
    Susilo, Willy
    Yang, Guomin
    Li, Chao
    Chen, Rongmao
    COMPUTER JOURNAL, 2020, 63 (10): : 1490 - 1499
  • [25] ADS-B Data Authentication based on AH Protocol
    Chen, Ruidong
    Si, Chengxiang
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 21 - 24
  • [26] A New Construction of Short Hierarchical Identity-based Signature in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 180 - 186
  • [27] An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature
    Baek, Joonsang
    Byon, Young-ji
    Hableel, Eman
    Al-Qutayri, Mahmoud
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 358 - 363
  • [28] Novel efficient identity-based signature on lattices
    Chen, Jiang-shan
    Hu, Yu-pu
    Liang, Hong-mei
    Gao, Wen
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (02) : 244 - 250
  • [29] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [30] Comparing Performance of Hierarchical Identity-Based Signature Schemes
    Chen, Peixin
    Wu, Yilun
    Su, Jinshu
    Wang, Xiaofeng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3181 - 3184