5/31/23 10:39 AM 1
Lightweight secure authentication protocol for Automatic
Dependent Surveillance Broadcast System
Presented by: Burhan Sher (211840)
MSCYS-III
211840@students.au.edu.pk
Supervisor Internal Examiner External Examiner
Mr. Khwaja Mansoor ul Hassan Dr. Ammara Gul Dr. Yawar Abbas Bangash
5/31/23 10:39 AM 2
Outline
1. Introduction
2. ADS-B System Architecture
3. Security Threats(ADSB)
4. Literature Review
5. Problem Statement
6. Objectives
7. Methodology
8. References
5/31/23 10:39 AM 3
Introduction
• ADS-B requires aircraft to broadcast their
GNS
location and speed gained through satellite
navigation.
• ADS-B has quickly replaced outdated radar.
• ADS-B surveillance gains precise geographic
coordinates through the Global Navigation
Satellite System (GNSS).
• Enhances situational awareness and
surveillance range, considerably improving
flight safety.
5/31/23 10:39 AM 4
ADS-B System Architecture
• ADS-B consists of two services such as ADS-
B IN and ADS-B OUT.
• ATC and ADS-B installed aircraft can receive
the messages immediately. Comparing to
other conventional technology, it provides
accurate tracking of aircraft.
• ADS-B consists of four parts such as
• Satellite constellation,
• Ground station,
• Extended Squitter (1090 ES), and
• Universal Access Transceiver (UAT).
5/31/23 10:39 AM 5
ADS-B System Architecture
5/31/23 10:39 AM 6
• Data confidentiality
• Resistance to replay attack
Security • Privacy-preservation
Threats(ADSB) • Data integrity and source
authentication
5/31/23 10:39 AM 7
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[1] A New ADS-B Authentication The propose a new framework for They either proposed to use • Additional multiplication
Framework Based on Efficient providing ADS-B with authentication Asymmetric key based operations are used which are
Hierarchical Identity-Based based on three-level hierarchical authentication methods like MAC computational intensive .
Signature with Batch identity-based signature (HIBS) with or suggested employ asymmetric
Verification batch verification. key based authentication solutions
like digital signatures.
[2] An Authentication Framework The authors develop a new type of Asymmetric-key based • Multiplication operations used
for Automatic Dependent online/offline identity-based signature authentication solution for ADS-B hence it is computational
Surveillance-Broadcast Based scheme. Out was suggested intensive .
on Online/Offline Identity-
Based Signature • Data packet size exceeded
1024 bits
[3] An efficient broadcast This paper proposes an effective Broadcast authentication scheme • Fail to achieve privacy issues
authentication scheme for ADS- broadcast authentication system for ADS- for ADS-B messages based on IBS- of general aviation aircraft.
B communication based on IBS- B communications based on identity- MR: consists of the following five
MR based signature with message recovery phases: • Computational intensive .
(IBS-MR). • system initialization,
• broadcaster registration,
• messages signing and broadcast,
• verification and recovery, and
• private key evolution.
5/31/23 10:39 AM 8
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[4] An Efficient Broadcast Authentication This paper, the authors suggest an effective the key evolving technique • Practically Unfeasible to
Scheme with Batch Verification for broadcast authentication method for ADS-B is adopted to reduce damage deploy for ADSB (did not
ADS-B Messages communications that uses identity-based caused by private key follow ADSB FAA and IATA
signatures and batch verification exposure. Standards )
(IBS).Evaluation
[5] Can Cryptography Secure Next This paper examines the issue of ADS-B Asymmetric-key • Broadcasting secret
Generation Air Traffic Surveillance? security using cryptography. or, put another encryption, message parameters signed ADS-B
way, is there a workable and efficient authentication codes, signals over a side channel
cryptographic solution that can be fitted to symmetric-key encryption,
the current ADS-B system and improve the and digital signatures are
security of this critical aviation technology? the four categories into
which each proposal fits.
[6] Anomalous Behavior Detection in In this paper, the intend to build a robust the authentication Authentication method not
Aircraft based Automatic Dependent Intrusion Detection System (IDS) to detect information is included in defined in this study
Surveillance–Broadcast (ADS-B) anomalous behavior and classify attacks in the Mode S squatters
system using Deep Graph Convolution an aircraft ADS-B protocol in real time
and Generative model (GA-GAN) during air-ground communication.
5/31/23 10:39 AM 9
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[7] Efficient anonymous authentication This paper is proposed for the ADS-B system Asymmetric Authentication • The proposed scheme
scheme for automatic dependent with batch verification based on Message Scheme used for aircraft to efficiently validates the aircraft
surveillance-broadcast system with Recovery Signature (MRS). aircraft communication. signature, only if the received
batch verification Aircraft generates the data data signature is correct.
signature and sends the same • Lack of Aircraft To ATC
to the nearby aircraft and the Communication
ground station.
[8] Intrusion Detection in Automatic The aim of the paper is to describe a dataset The lack of authentication • Explored Security attacks. For
Dependent Surveillance-Broadcast and machine learning algorithm that can be and encryption, it discusses example, ghost aircraft
(ADS-B) with Machine Learning used to improve the security of the the use of machine learning injection attacks, jamming
Automatic Dependent Surveillance-Broadcast algorithms to improve the attacks, and DoS attacks.
(ADS-B) communication system in aviation. security of the Automatic • Lack of Authentication
the generating the dataset with new attacks, Dependent Surveillance- Mechanism
performing data pre-processing, and applying Broadcast (ADS-B)
machine learning algorithms communication system in
aviation.
[9] Physical layer protection for ADS-B This paper proposing a method and Signal authentication method • Huge Data Payload
against spoofing and jamming system architecture for verification of is used • Data packet Fragmentation
received signal authenticity on ADS-B In Issue
enabled aircraft. This system architecture • Lack of Authentication
includes a directional slotted antenna system Mechanism
and multi-channel receiver on ADS-B
5/31/23 10:39 AM 10
Problem Statement
• Researchers offer an Asymmetric authentication scheme with a high
computational cost. Communication Network (ADS-B) faces
numerous security and privacy threats, including unauthorized data
access, and message modification. There is still room for a lightweight
authentication system to overcome these issues for ADSB systems.
5/31/23 10:39 AM 11
Objectives
• Our aims and objectives are to provide improved symmetric key based
authentication scheme for ADSB System , which has the ability to provide
security against Well known common security attacks
• Our proposed secure light-weight authentication scheme will provide:
• Low computational cost
• Slighter communication cost
• Provides mutual authentication
• Improved and Efficient authentication mechanism
5/31/23 10:39 AM 12
Methodology
• Design Lightweight Secure Authentication Scheme for ADSB System
• The security and overall efficiency of the proposed scheme will be tested formally and informally
• Formal analysis will be tested by
• Automated verification tool ProVerif
• BurrowsAbadiNeedham logic (BAN logic)
• Informal analysis would be analyzed against all possible attacks
• At last we will compare and evaluate performance of our proposed Scheme with others Schemes
5/31/23 10:39 AM 13
Reference
1. Zhou, J.-X., Yan, J.H.: Secure and efficient identity-based batch verification signature scheme for
ADS-B system. KSII Trans. Internet Inf. Syst. 13(12), 6243–6259 (2019).
https://doi.org/10.3837/tiis.2019.12.024
2. Roy, P., Dawn, D.: High-power and high-efficiency complementary metal oxide semiconductor
voltage-controlled oscillator for automatic dependent surveillance broadcast system. IET Microw.
Antennas Propag. 9(14), 1632–1637 (2015)
3. Ali, B., et al.: A safety assessment framework for the Automatic Dependent Surveillance Broadcast
(ADS-B) system. Saf. Sci. 78, 91–100 (2015).
4. Leonardi, M., et al.: ADS-B jamming mitigation: A solution based on a multi-channel receiver. IEEE
Aerosp. Electron. Syst. Mag. 32, 44–51 (2017), https://doi.org/10.1109/MAES.2017.160276.
5. Robinson, R.V.,et al.: Secure network-enabled commercial airplane operations: It support
infrastructure challenges. In: First CEAS European Air and Space Conference Century
Perspectives, pp. 1–10.DGLR, Berlin (2007).
6. Baek, J., et al.: An authentication framework for automatic dependent surveillance-broadcast
based on online/offline identity-based signature. In: 2013 Eighth International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 358–363.IEEE, Piscataway (2013).
7. Strohmeier, M., et al.: Realities and challenges of nextgen air traffic management: The case of
ADS-B. IEEE Commun. Mag. 52(5), 111–118 (2014).
5/31/23 10:39 AM 14
Reference
8. Wesson, K.D., et al.: Can cryptography secure next generation air traffic surveillance? IEEE
Security Privacy Mag. (2014).
9. Kacem, T., et al.: Integrity and authenticity of ads-b broadcasts. In: 2015 IEEE Aerospace
Conference, pp. 1–8.IEEE, Piscataway (2015)
10. Subramani, J., Maria, A., Neelakandan, R. B., & Rajasekaran, A. S. (2021). Efficient anonymous
authentication scheme for automatic dependent surveillance‐broadcast system with batch
verification. IET Communications, 15(9), 1187-1197.
11. Khan, S., Thorn, J., Wahlgren, A., & Gurtov, A. (2021, October). Intrusion Detection in Automatic
Dependent Surveillance-Broadcast (ADS-B) with Machine Learning. In 2021 IEEE/AIAA 40th
Digital Avionics Systems Conference (DASC) (pp. 1-10). IEEE.
12. Suram, S. R., Prasad, N., & Gottapu, S. R. (2022, April). Signal Authentication against Spoofing
Attacks on Aircraft Automatic Dependent Surveillance-Broadcast Signals. In 2022 International
Conference on Breakthrough in Heuristics And Reciprocation of Advanced Technologies
(BHARAT) (pp. 71-76). IEEE.
13. Rudys, S., Aleksandravicius, J., Aleksiejunas, R., Konovaltsev, A., Zhu, C., & Greda, L. (2022).
Physical layer protection for ADS-B against spoofing and jamming. International Journal of Critical
Infrastructure Protection, 38, 100555.
14. Kenaudekar, J. (2022). Anomalous Behavior Detection in Aircraft based Automatic Dependent
Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model
(GA-GAN).
5/31/23 10:39 AM 15
5/31/23 10:39 AM 16