A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification

被引:55
|
作者
Yang, Anjia [1 ]
Tan, Xiao [1 ]
Baek, Joonsang [2 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Khalifa Univ Sci Technol & Res, Dept Elect & Comp Engn, Abu Dhabi, U Arab Emirates
关键词
ADS-B; authentication; batch verification; aviation communication security; hierarchical identity-based signature;
D O I
10.1109/TSC.2015.2459709
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Automatic dependent surveillance-broadcast (ADS-B) has become a crucial part of next generation air traffic surveillance technology and will be mandatorily deployed for most of the airspaces worldwide by 2020. Each aircraft equipped with an ADS-B device keeps broadcasting plaintext messages to other aircraft and the ground station controllers once or twice per second. The lack of security measures in ADS-B systems makes it susceptible to different attacks. Among the various security issues, we investigate the integrity and authenticity of ADS-B messages. We propose a new framework for providing ADS-B with authentication based on three-level hierarchical identity-based signature (HIBS) with batch verification. Previous signature-based ADS-B authentication protocols focused on how to generate signatures efficiently, while our schemes can also significantly reduce the verification cost, which is critical to ADS-B systems, since at any time an ADS-B receiver may receive lots of signatures. We design two concrete schemes. The basic scheme supports partial batch verification and the extended scheme provides full batch verification. We give a formal security proof for the extended scheme. Experiment results show that our schemes with batch verification are tremendously more efficient in batch verifying n signatures than verifying n signatures independently. For example, the running time of verifying 100 signatures is 502 and 484 ms for the basic scheme and the extended scheme respectively, while the time is 2500 ms if verifying the signatures independently.
引用
收藏
页码:165 / 175
页数:11
相关论文
共 50 条
  • [31] Research on Identity-based Batch Anonymous Authentication Scheme for VANET
    Song, Cheng
    Gu, Xinan
    Wang, Lei
    Liu, Zhizhong
    Ping, Yuan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6175 - 6189
  • [32] New designed hierarchical computing technique for identity-based signature in the mobile networks
    Wu, Q. (xidianwq@yahoo.com.cn), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [33] A new hierarchical identity-based signature scheme from lattices in the standard model
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    International Journal of Network Security, 2012, 14 (06) : 310 - 315
  • [34] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [35] A New Identity-based Authentication Scheme for SIP
    Peng, Shengbo
    Ruan, Ou
    Zhou, Jing
    Chen, Zaixing
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
  • [36] (Hierarchical) Identity-Based Encryption from Affine Message Authentication
    Blazy, Olivier
    Kiltz, Eike
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I, 2014, 8616 : 408 - 425
  • [37] Combining user authentication with role-based authorazition based on identity-based signature
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Bai, Xi
    Jia, Zhongtian
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 847 - +
  • [38] Identity-Based Threshold Group Signature Scheme of Blockchain Verification
    Wang, Lipeng
    Hu, Mingsheng
    Jia, Zhijuan
    Cheng, Yage
    Fu, Junjun
    Wang, Yubo
    Gong, Bei
    TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019, 2020, 1149 : 144 - 158
  • [39] A new construction of identity-based group signature
    Ma, Liqiong
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2014, 6 (01) : 38 - 43
  • [40] A new identity-based group signature scheme
    Cheng, Xiangguo
    Guo, Lifeng
    Yu, Jia
    Ma, Huiran
    Wu, Yuexiu
    International Journal of Computers and Applications, 2013, 35 (01) : 1 - 5