{"id":"https://openalex.org/W2901578417","doi":"https://doi.org/10.1109/jiot.2018.2882633","title":"A Practical and Compatible Cryptographic Solution to ADS-B Security","display_name":"A Practical and Compatible Cryptographic Solution to ADS-B Security","publication_year":2018,"publication_date":"2018-11-21","ids":{"openalex":"https://openalex.org/W2901578417","doi":"https://doi.org/10.1109/jiot.2018.2882633","mag":"2901578417"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2018.2882633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2882633","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048390686","display_name":"Haomiao Yang","orcid":"https://orcid.org/0000-0002-5968-3518"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haomiao Yang","raw_affiliation_strings":["School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100764003","display_name":"Qixian Zhou","orcid":"https://orcid.org/0000-0003-1138-6925"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qixian Zhou","raw_affiliation_strings":["School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042408848","display_name":"Mingxuan Yao","orcid":"https://orcid.org/0000-0002-0225-5141"},"institutions":[{"id":"https://openalex.org/I130701444","display_name":"Georgia Institute of Technology","ror":"https://ror.org/01zkghx44","country_code":"US","type":"education","lineage":["https://openalex.org/I130701444"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mingxuan Yao","raw_affiliation_strings":["College of Computing, Georgia Institute of Technology, Atlanta, GA, USA"],"affiliations":[{"raw_affiliation_string":"College of Computing, Georgia Institute of Technology, Atlanta, GA, USA","institution_ids":["https://openalex.org/I130701444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, Canadian Institute of Cybersecurity, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, Canadian Institute of Cybersecurity, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325334","display_name":"Hongwei Li","orcid":"https://orcid.org/0000-0002-1961-7946"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Li","raw_affiliation_strings":["School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering and Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048390686"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":13.7513,"has_fulltext":false,"cited_by_count":89,"citation_normalized_percentile":{"value":0.98868128,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"6","issue":"2","first_page":"3322","last_page":"3334"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.817324161529541},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6950785517692566},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6068138480186462},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5486472845077515},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.5203394889831543},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4651086926460266},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4650605320930481},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4579774737358093},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.45325571298599243},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.44424501061439514},{"id":"https://openalex.org/keywords/message-authentication-code","display_name":"Message authentication code","score":0.43229416012763977},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.4299316108226776},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2692779302597046},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.15968060493469238}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817324161529541},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6950785517692566},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6068138480186462},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5486472845077515},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.5203394889831543},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4651086926460266},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4650605320930481},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4579774737358093},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.45325571298599243},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.44424501061439514},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.43229416012763977},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.4299316108226776},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2692779302597046},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.15968060493469238},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2018.2882633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2882633","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1537871330","https://openalex.org/W1569083856","https://openalex.org/W1607328905","https://openalex.org/W1673464365","https://openalex.org/W1900606988","https://openalex.org/W1946476891","https://openalex.org/W1958405958","https://openalex.org/W1981647260","https://openalex.org/W1987604905","https://openalex.org/W2038432767","https://openalex.org/W2066081186","https://openalex.org/W2087937661","https://openalex.org/W2089255914","https://openalex.org/W2090297307","https://openalex.org/W2101412886","https://openalex.org/W2121741511","https://openalex.org/W2127195678","https://openalex.org/W2130459259","https://openalex.org/W2134615993","https://openalex.org/W2144979223","https://openalex.org/W2151748484","https://openalex.org/W2187366271","https://openalex.org/W2320400345","https://openalex.org/W2343785519","https://openalex.org/W2754935323","https://openalex.org/W2766749922","https://openalex.org/W2783272084","https://openalex.org/W2793722525","https://openalex.org/W2794159901","https://openalex.org/W2889349423","https://openalex.org/W2889495307","https://openalex.org/W3040859755","https://openalex.org/W3104706117","https://openalex.org/W3145069203","https://openalex.org/W3148898049","https://openalex.org/W4245243716","https://openalex.org/W4255351512","https://openalex.org/W4285719527","https://openalex.org/W6639771353","https://openalex.org/W6647097721","https://openalex.org/W6675580129","https://openalex.org/W6792865153"],"related_works":["https://openalex.org/W2342603380","https://openalex.org/W1533109710","https://openalex.org/W2098263389","https://openalex.org/W2351737685","https://openalex.org/W4281963727","https://openalex.org/W2107515440","https://openalex.org/W2943977292","https://openalex.org/W3133364439","https://openalex.org/W4385590183","https://openalex.org/W2786293336"],"abstract_inverted_index":{"As":[0],"the":[1,8,18,39,112,163,177,190,197,218,227],"heart":[2],"of":[3,41,127,133,181,192,203,229],"next-generation":[4],"air":[5,113],"transportation":[6],"systems,":[7],"automatic":[9],"dependent":[10],"surveillance-broadcast":[11],"(ADS-B)":[12],"is":[13,52,124],"becoming":[14],"a":[15,53,93,221],"substitute":[16],"for":[17,68,138,196],"radar,":[19],"because":[20],"it":[21,146],"can":[22,72,147],"enhance":[23],"flight":[24,201,215],"safety":[25],"by":[26,100,199],"requiring":[27],"aircraft":[28],"to":[29,56,83,97,111,118],"regularly":[30],"broadcast":[31,160],"their":[32],"precise":[33],"geographic":[34],"positions.":[35],"Despite":[36],"its":[37],"promise,":[38],"lack":[40],"security":[42,99],"mechanisms,":[43],"e.g.,":[44],"not":[45,125],"providing":[46],"data":[47,140,202],"encryption":[48],"and":[49,80,107,142,152,167,179,194],"message":[50],"authentication,":[51],"significant":[54],"barrier":[55],"realistically":[57],"deploy":[58],"this":[59,89],"new":[60,94],"technology.":[61],"While":[62],"many":[63],"methods":[64],"have":[65],"been":[66],"proposed":[67,122,164],"ADS-B":[69,86,98,158,182,214],"security,":[70],"they":[71],"deal":[73],"with":[74,130],"either":[75],"privacy":[76],"or":[77],"integrity":[78],"unilaterally,":[79],"also":[81,136,148,188,225],"need":[82],"change":[84],"current":[85],"standards.":[87],"In":[88,116,184],"paper,":[90],"we":[91],"present":[92],"cryptographic":[95,105],"solution":[96,123,165],"first":[101],"carefully":[102],"exploiting":[103],"some":[104],"primitives,":[106],"then":[108],"adapting":[109],"them":[110],"traffic-monitoring":[114],"scenario.":[115],"contrast":[117],"previous":[119],"approaches,":[120],"our":[121,173,230],"only":[126],"high":[128],"compatibility":[129],"existing":[131],"protocols":[132],"ADS-B,":[134],"but":[135],"lightweight":[137],"congested":[139],"links":[141],"resource-constraint":[143],"avionics.":[144],"Furthermore,":[145],"tolerate":[149],"package":[150],"loss":[151],"disorder":[153],"that":[154,172,207],"frequently":[155],"occur":[156],"in":[157,220],"wireless":[159],"networks,":[161],"making":[162],"easy-to-deploy":[166],"practical.":[168],"Security":[169],"analysis":[170],"shows":[171],"proposal":[174,198],"simultaneously":[175],"achieves":[176],"confidentiality":[178],"authenticity":[180],"messages.":[183],"addition,":[185],"performance":[186],"evaluation":[187],"demonstrates":[189],"efficiency":[191],"communication":[193],"computation":[195],"using":[200],"OpenSky-a":[204],"sensor":[205],"network":[206],"covers":[208],"Central":[209],"Europe":[210],"aiming":[211],"at":[212],"gathering":[213],"data.":[216],"Finally,":[217],"deployment":[219],"real":[222],"airport":[223],"environment":[224],"proves":[226],"effectiveness":[228],"solution.":[231]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":20},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":11}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
