{"id":"https://openalex.org/W4389370957","doi":"https://doi.org/10.1109/jiot.2023.3337543","title":"A Robust and Practical Solution to ADS-B Security Against Denial-of-Service Attacks","display_name":"A Robust and Practical Solution to ADS-B Security Against Denial-of-Service Attacks","publication_year":2023,"publication_date":"2023-12-06","ids":{"openalex":"https://openalex.org/W4389370957","doi":"https://doi.org/10.1109/jiot.2023.3337543"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2023.3337543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3337543","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052563154","display_name":"Qianyun Zhang","orcid":"https://orcid.org/0000-0002-2147-4059"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qianyun Zhang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103097512","display_name":"Zhendong Wang","orcid":"https://orcid.org/0009-0009-9361-6421"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhendong Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069318296","display_name":"Bi\u2010Yi Wu","orcid":"https://orcid.org/0000-0001-7790-3839"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biyi Wu","raw_affiliation_strings":["Center for Electromagnetic Simulation, School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing, China","School of Integrated Circuits and Electronics, Center for Electromagnetic Simulation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Center for Electromagnetic Simulation, School of Integrated Circuits and Electronics, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]},{"raw_affiliation_string":"School of Integrated Circuits and Electronics, Center for Electromagnetic Simulation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027367677","display_name":"Guan Gui","orcid":"https://orcid.org/0000-0003-3888-2881"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guan Gui","raw_affiliation_strings":["College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052563154"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":26.0164,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.99497933,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"11","issue":"8","first_page":"13647","last_page":"13659"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11489","display_name":"Air Traffic Management and Optimization","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9821000099182129,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12158","display_name":"Guidance and Control Systems","score":0.974399983882904,"subfield":{"id":"https://openalex.org/subfields/2202","display_name":"Aerospace Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7771844267845154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7604039907455444},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5802017450332642},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5381494760513306},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.463167279958725},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43904024362564087},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41112565994262695},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.11587217450141907}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7771844267845154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7604039907455444},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5802017450332642},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5381494760513306},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.463167279958725},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43904024362564087},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41112565994262695},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.11587217450141907},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2023.3337543","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2023.3337543","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1600165558","display_name":null,"funder_award_id":"62271046","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2834442495","display_name":null,"funder_award_id":"62022093","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1543653153","https://openalex.org/W1924366267","https://openalex.org/W1946476891","https://openalex.org/W1981647260","https://openalex.org/W1983553030","https://openalex.org/W1984661888","https://openalex.org/W2038432767","https://openalex.org/W2057742861","https://openalex.org/W2118756516","https://openalex.org/W2159329869","https://openalex.org/W2243712200","https://openalex.org/W2525841751","https://openalex.org/W2601019677","https://openalex.org/W2767200452","https://openalex.org/W2772531505","https://openalex.org/W2773943334","https://openalex.org/W2774222358","https://openalex.org/W2892142441","https://openalex.org/W2894577781","https://openalex.org/W2901578417","https://openalex.org/W2902834886","https://openalex.org/W2950568802","https://openalex.org/W2995089893","https://openalex.org/W3005752483","https://openalex.org/W3015448029","https://openalex.org/W3037545205","https://openalex.org/W3038900662","https://openalex.org/W3043857016","https://openalex.org/W3080499510","https://openalex.org/W3085604187","https://openalex.org/W3103998378","https://openalex.org/W3104706117","https://openalex.org/W3137268093","https://openalex.org/W3153937510","https://openalex.org/W3187521827","https://openalex.org/W3217401178","https://openalex.org/W4226330143","https://openalex.org/W4243683928","https://openalex.org/W4308655556","https://openalex.org/W6631925621","https://openalex.org/W6639721019","https://openalex.org/W6646719928"],"related_works":["https://openalex.org/W2765763546","https://openalex.org/W4386482731","https://openalex.org/W4385302085","https://openalex.org/W2360429410","https://openalex.org/W4390188535","https://openalex.org/W4256682929","https://openalex.org/W335511927","https://openalex.org/W2471811227","https://openalex.org/W2217591390","https://openalex.org/W2157496457"],"abstract_inverted_index":{"Automatic":[0],"dependent":[1],"surveillance-broadcast":[2],"(ADS-B)":[3],"has":[4],"been":[5],"widely":[6],"deployed":[7],"on":[8,68,71,116,127,159],"aircraft":[9,172],"to":[10,40,46,152],"facilitate":[11],"aviation":[12,129],"information":[13],"exchange":[14],"and":[15,24,31,74,82,97,104],"improve":[16],"air":[17],"traffic":[18],"safety.":[19],"However,":[20],"its":[21],"broadcast":[22],"nature":[23],"lack":[25],"of":[26,37,88,112],"security":[27,54,63,107,140],"considerations":[28],"like":[29],"encryption":[30],"authentication":[32],"have":[33,150],"caused":[34],"the":[35,113,137,165,176],"counterfeit":[36],"ADS-B":[38,69,94,139,160],"messages":[39,45,118,187],"be":[41],"straightforward.":[42],"Flooding":[43],"forged":[44,186],"legitimate":[47],"aircraft,":[48],"denial-of-service":[49],"(DoS)":[50],"attacks":[51,67,158,181],"threaten":[52],"flight":[53],"severely.":[55],"In":[56],"this":[57],"paper,":[58],"we":[59],"propose":[60],"a":[61],"practical":[62],"solution":[64,78,115,177],"against":[65],"DoS":[66,120,157,180],"based":[70],"high-precision":[72],"timestamp":[73],"position":[75],"information.":[76],"The":[77],"achieves":[79],"high":[80],"feasibility":[81],"reliability":[83],"by":[84,136,164],"accommodating":[85],"measurement":[86],"errors":[87],"physical":[89],"quantities.":[90],"Besides,":[91],"it":[92],"preserves":[93],"frame":[95,102],"size":[96],"ensures":[98],"efficient":[99],"computation":[100],"in":[101],"generation":[103],"verification.":[105],"Comprehensive":[106],"analyses":[108],"demonstrate":[109],"robust":[110],"filtrations":[111],"proposed":[114],"malicious":[117],"from":[119],"adversaries":[121,143,169],"with":[122,170],"different":[123],"capabilities.":[124],"Further":[125],"simulations":[126],"real-world":[128],"data":[130],"exhibit":[131],"significant":[132],"defensive":[133],"performance":[134],"realized":[135],"DoS-immune":[138],"solution.":[141,166],"Whether":[142],"can":[144],"only":[145],"intercept":[146],"ciphertext,":[147],"or":[148],"they":[149],"opportunities":[151],"acquire":[153],"decrypted":[154],"messages,":[155],"all":[156,179],"are":[161],"successfully":[162],"thwarted":[163],"Even":[167],"for":[168],"victim":[171],"location":[173],"estimation":[174],"capacity,":[175],"resists":[178],"transmitting":[182],"less":[183],"than":[184],"50":[185],"per":[188],"second.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":2}],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
