期刊文献+

ADS-B Data Authentication Based on ECC and X.509 Certificate 被引量:5

ADS-B Data Authentication Based on ECC and X.509 Certificate
下载PDF
导出
摘要 An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode. An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode.
出处 《Journal of Electronic Science and Technology》 CAS 2012年第1期51-55,共5页 电子科技学刊(英文版)
基金 supported by the National Natural Science Foundation of China under Grant No. 61179072 the Civil Aviation Science Foundation of China
关键词 Automatic dependent surveillance-broadcast data authentication elliptic curve cipher X.509. Automatic dependent surveillance-broadcast, data authentication, elliptic curve cipher,X.509.
  • 相关文献

参考文献4

二级参考文献35

  • 1秦志光,张险峰,周世杰,刘锦德.基于ECC的门限数字签名方案及其安全性[J].电子科技大学学报,2005,34(1):109-112. 被引量:9
  • 2杨军,周贤伟,覃伯平.On the Selection of Random Numbers in the ElGamal Algorithm[J].Journal of Electronic Science and Technology of China,2006,4(1):55-58. 被引量:4
  • 3HABUTSU T, ISHIO Y N, SASASE I, et al. A secret cryptosystem by iterating a chaotic map[C]//Advances in Cryptology EU-RCRYPT'91. Berlin: Springer -Verlag, 1991: 127-140.
  • 4ZHANG Han, WANG Xiu-feng, LI Zhao-hui, et al. A new image encryption algorithm based on chaos system [C]//International Conference on Robotic, In Telligent Systems and Signals processing. Changsha, China: IEEE Press, 2003: 778-782.
  • 5DANG P P, CHAU P M. Image encryption for secure Intemet multimedia applications[J]. IEEE Transactions on Consumer Electronics, 2000, 46(8): 395-403.
  • 6JUNG K H, LEE C W. Image compression using projection vector quantization with quadtree decomposition[J]. Signal Processing: Image Communication, 1996, 8(5): 379-368.
  • 7LIN T W. Compressed quadtree representations for storing similar images[J]. Image and Vision Computing, 1997, 15(11): 833-843.
  • 8WONG W T, SHIH F Y, SU T F. Thinning algorithms based on quadtree and octree representations[J]. Information Sciences, 2006, 176(10): 1379-139.
  • 9BOURBAKIS N, ALEXOPOULOS C. Picture data encryption using scan patterns[J]. Pattern Recognition, 1992, 25(6): 567-581.
  • 10MUZAFFAR T, CHOI T S. Linked significant tree wavelet-based image compression[J]. Signal Processing. 2008, 88(10): 2554-2563.

共引文献13

同被引文献29

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部