0% found this document useful (0 votes)
71 views16 pages

Synopsis Presentation

The document presents an outline for a project on developing a lightweight secure authentication protocol for the Automatic Dependent Surveillance Broadcast (ADS-B) system. The outline includes sections on ADS-B system architecture, security threats to ADS-B, literature review of existing authentication techniques, the problem statement, objectives, methodology, and references. The introduction discusses how ADS-B uses satellite navigation to broadcast location and speed data from aircraft, enhancing safety but raising security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views16 pages

Synopsis Presentation

The document presents an outline for a project on developing a lightweight secure authentication protocol for the Automatic Dependent Surveillance Broadcast (ADS-B) system. The outline includes sections on ADS-B system architecture, security threats to ADS-B, literature review of existing authentication techniques, the problem statement, objectives, methodology, and references. The introduction discusses how ADS-B uses satellite navigation to broadcast location and speed data from aircraft, enhancing safety but raising security issues.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

5/31/23 10:39 AM 1

Lightweight secure authentication protocol for Automatic


Dependent Surveillance Broadcast System

Presented by: Burhan Sher (211840)


MSCYS-III
211840@students.au.edu.pk

Supervisor Internal Examiner External Examiner


Mr. Khwaja Mansoor ul Hassan Dr. Ammara Gul Dr. Yawar Abbas Bangash

5/31/23 10:39 AM 2
Outline
1. Introduction
2. ADS-B System Architecture
3. Security Threats(ADSB)
4. Literature Review
5. Problem Statement
6. Objectives
7. Methodology
8. References

5/31/23 10:39 AM 3
Introduction
• ADS-B requires aircraft to broadcast their
GNS
location and speed gained through satellite
navigation.
• ADS-B has quickly replaced outdated radar.
• ADS-B surveillance gains precise geographic
coordinates through the Global Navigation
Satellite System (GNSS).
• Enhances situational awareness and
surveillance range, considerably improving
flight safety.

5/31/23 10:39 AM 4
ADS-B System Architecture
• ADS-B consists of two services such as ADS-
B IN and ADS-B OUT.
• ATC and ADS-B installed aircraft can receive
the messages immediately. Comparing to
other conventional technology, it provides
accurate tracking of aircraft.
• ADS-B consists of four parts such as
• Satellite constellation,
• Ground station,
• Extended Squitter (1090 ES), and
• Universal Access Transceiver (UAT).

5/31/23 10:39 AM 5
ADS-B System Architecture

5/31/23 10:39 AM 6
• Data confidentiality
• Resistance to replay attack
Security • Privacy-preservation
Threats(ADSB) • Data integrity and source
authentication

5/31/23 10:39 AM 7
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[1] A New ADS-B Authentication The propose a new framework for They either proposed to use • Additional multiplication
Framework Based on Efficient providing ADS-B with authentication Asymmetric key based operations are used which are
Hierarchical Identity-Based based on three-level hierarchical authentication methods like MAC computational intensive .
Signature with Batch identity-based signature (HIBS) with or suggested employ asymmetric
Verification batch verification. key based authentication solutions
like digital signatures.

[2] An Authentication Framework The authors develop a new type of Asymmetric-key based • Multiplication operations used
for Automatic Dependent online/offline identity-based signature authentication solution for ADS-B hence it is computational
Surveillance-Broadcast Based scheme. Out was suggested intensive .
on Online/Offline Identity-
Based Signature • Data packet size exceeded
1024 bits

[3] An efficient broadcast This paper proposes an effective Broadcast authentication scheme • Fail to achieve privacy issues
authentication scheme for ADS- broadcast authentication system for ADS- for ADS-B messages based on IBS- of general aviation aircraft.
B communication based on IBS- B communications based on identity- MR: consists of the following five
MR based signature with message recovery phases: • Computational intensive .
(IBS-MR). • system initialization,
• broadcaster registration,
• messages signing and broadcast,
• verification and recovery, and
• private key evolution.
5/31/23 10:39 AM 8
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[4] An Efficient Broadcast Authentication This paper, the authors suggest an effective the key evolving technique • Practically Unfeasible to
Scheme with Batch Verification for broadcast authentication method for ADS-B is adopted to reduce damage deploy for ADSB (did not
ADS-B Messages communications that uses identity-based caused by private key follow ADSB FAA and IATA
signatures and batch verification exposure. Standards )
(IBS).Evaluation

[5] Can Cryptography Secure Next This paper examines the issue of ADS-B Asymmetric-key • Broadcasting secret
Generation Air Traffic Surveillance? security using cryptography. or, put another encryption, message parameters signed ADS-B
way, is there a workable and efficient authentication codes, signals over a side channel
cryptographic solution that can be fitted to symmetric-key encryption,
the current ADS-B system and improve the and digital signatures are
security of this critical aviation technology? the four categories into
which each proposal fits.

[6] Anomalous Behavior Detection in In this paper, the intend to build a robust the authentication Authentication method not
Aircraft based Automatic Dependent Intrusion Detection System (IDS) to detect information is included in defined in this study
Surveillance–Broadcast (ADS-B) anomalous behavior and classify attacks in the Mode S squatters
system using Deep Graph Convolution an aircraft ADS-B protocol in real time
and Generative model (GA-GAN) during air-ground communication.

5/31/23 10:39 AM 9
Literature Review
Ref.
No
Name of Paper Aim and work Authentication Demerits
technique
[7] Efficient anonymous authentication This paper is proposed for the ADS-B system Asymmetric Authentication • The proposed scheme
scheme for automatic dependent with batch verification based on Message Scheme used for aircraft to efficiently validates the aircraft
surveillance-broadcast system with Recovery Signature (MRS). aircraft communication. signature, only if the received
batch verification Aircraft generates the data data signature is correct.
signature and sends the same • Lack of Aircraft To ATC
to the nearby aircraft and the Communication
ground station.
[8] Intrusion Detection in Automatic The aim of the paper is to describe a dataset The lack of authentication • Explored Security attacks. For
Dependent Surveillance-Broadcast and machine learning algorithm that can be and encryption, it discusses example, ghost aircraft
(ADS-B) with Machine Learning used to improve the security of the the use of machine learning injection attacks, jamming
Automatic Dependent Surveillance-Broadcast algorithms to improve the attacks, and DoS attacks.
(ADS-B) communication system in aviation. security of the Automatic • Lack of Authentication
the generating the dataset with new attacks, Dependent Surveillance- Mechanism
performing data pre-processing, and applying Broadcast (ADS-B)
machine learning algorithms communication system in
aviation.
[9] Physical layer protection for ADS-B This paper proposing a method and Signal authentication method • Huge Data Payload
against spoofing and jamming system architecture for verification of is used • Data packet Fragmentation
received signal authenticity on ADS-B In Issue
enabled aircraft. This system architecture • Lack of Authentication
includes a directional slotted antenna system Mechanism
and multi-channel receiver on ADS-B

5/31/23 10:39 AM 10
Problem Statement
• Researchers offer an Asymmetric authentication scheme with a high
computational cost. Communication Network (ADS-B) faces
numerous security and privacy threats, including unauthorized data
access, and message modification. There is still room for a lightweight
authentication system to overcome these issues for ADSB systems.

5/31/23 10:39 AM 11
Objectives
• Our aims and objectives are to provide improved symmetric key based
authentication scheme for ADSB System , which has the ability to provide
security against Well known common security attacks

• Our proposed secure light-weight authentication scheme will provide:

• Low computational cost


• Slighter communication cost
• Provides mutual authentication
• Improved and Efficient authentication mechanism

5/31/23 10:39 AM 12
Methodology
• Design Lightweight Secure Authentication Scheme for ADSB System
• The security and overall efficiency of the proposed scheme will be tested formally and informally

• Formal analysis will be tested by


• Automated verification tool ProVerif
• BurrowsAbadiNeedham logic (BAN logic)

• Informal analysis would be analyzed against all possible attacks

• At last we will compare and evaluate performance of our proposed Scheme with others Schemes

5/31/23 10:39 AM 13
Reference
1. Zhou, J.-X., Yan, J.H.: Secure and efficient identity-based batch verification signature scheme for
ADS-B system. KSII Trans. Internet Inf. Syst. 13(12), 6243–6259 (2019).
https://doi.org/10.3837/tiis.2019.12.024
2. Roy, P., Dawn, D.: High-power and high-efficiency complementary metal oxide semiconductor
voltage-controlled oscillator for automatic dependent surveillance broadcast system. IET Microw.
Antennas Propag. 9(14), 1632–1637 (2015)
3. Ali, B., et al.: A safety assessment framework for the Automatic Dependent Surveillance Broadcast
(ADS-B) system. Saf. Sci. 78, 91–100 (2015).
4. Leonardi, M., et al.: ADS-B jamming mitigation: A solution based on a multi-channel receiver. IEEE
Aerosp. Electron. Syst. Mag. 32, 44–51 (2017), https://doi.org/10.1109/MAES.2017.160276.
5. Robinson, R.V.,et al.: Secure network-enabled commercial airplane operations: It support
infrastructure challenges. In: First CEAS European Air and Space Conference Century
Perspectives, pp. 1–10.DGLR, Berlin (2007).
6. Baek, J., et al.: An authentication framework for automatic dependent surveillance-broadcast
based on online/offline identity-based signature. In: 2013 Eighth International Conference on P2P,
Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 358–363.IEEE, Piscataway (2013).
7. Strohmeier, M., et al.: Realities and challenges of nextgen air traffic management: The case of
ADS-B. IEEE Commun. Mag. 52(5), 111–118 (2014).
5/31/23 10:39 AM 14
Reference
8. Wesson, K.D., et al.: Can cryptography secure next generation air traffic surveillance? IEEE
Security Privacy Mag. (2014).
9. Kacem, T., et al.: Integrity and authenticity of ads-b broadcasts. In: 2015 IEEE Aerospace
Conference, pp. 1–8.IEEE, Piscataway (2015)
10. Subramani, J., Maria, A., Neelakandan, R. B., & Rajasekaran, A. S. (2021). Efficient anonymous
authentication scheme for automatic dependent surveillance‐broadcast system with batch
verification. IET Communications, 15(9), 1187-1197.
11. Khan, S., Thorn, J., Wahlgren, A., & Gurtov, A. (2021, October). Intrusion Detection in Automatic
Dependent Surveillance-Broadcast (ADS-B) with Machine Learning. In 2021 IEEE/AIAA 40th
Digital Avionics Systems Conference (DASC) (pp. 1-10). IEEE.
12. Suram, S. R., Prasad, N., & Gottapu, S. R. (2022, April). Signal Authentication against Spoofing
Attacks on Aircraft Automatic Dependent Surveillance-Broadcast Signals. In 2022 International
Conference on Breakthrough in Heuristics And Reciprocation of Advanced Technologies
(BHARAT) (pp. 71-76). IEEE.
13. Rudys, S., Aleksandravicius, J., Aleksiejunas, R., Konovaltsev, A., Zhu, C., & Greda, L. (2022).
Physical layer protection for ADS-B against spoofing and jamming. International Journal of Critical
Infrastructure Protection, 38, 100555.
14. Kenaudekar, J. (2022). Anomalous Behavior Detection in Aircraft based Automatic Dependent
Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model
(GA-GAN).
5/31/23 10:39 AM 15
5/31/23 10:39 AM 16

You might also like