The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The la...The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The lack of security features in ADS-B leaves any processes dependent upon the information vulnerable to a variety of threats from compromised and dishonest UAVs.This could result in substantial losses or damage to properties.This research proposes a new distance-bounding scheme for verifying the distance and flight trajectory in the ADS-B broadcast data from surrounding UAVs.The proposed scheme enables UAVs or ground stations to identify fraudulent UAVs and avoid collisions.The scheme was implemented and tested in the ArduPilot SITL(Software In The Loop)simulator to verify its ability to detect fraudulent UAVs.The experiments showed that the scheme achieved the desired accuracy in both flight trajectory measurement and attack detection.展开更多
利用双光子吸收,将Na(3S)原子激发到4D态,测量了Na(4D)+Na(3S)Na(4F)+Na(3S)碰撞能量转移截面,因为直接由4F→3D的荧光不能探测,所以检测3D→3P级联荧光讯号。结合基态钠原子密度的测量,给出了截面值σ_4D→4F=1.3 x 10^(-14)±28...利用双光子吸收,将Na(3S)原子激发到4D态,测量了Na(4D)+Na(3S)Na(4F)+Na(3S)碰撞能量转移截面,因为直接由4F→3D的荧光不能探测,所以检测3D→3P级联荧光讯号。结合基态钠原子密度的测量,给出了截面值σ_4D→4F=1.3 x 10^(-14)±28%(cm^2)。展开更多
An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system d...An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode.展开更多
基金This research was partially funded by Texas State University Research Enhancement Program.
文摘The Automatic Dependent Surveillance-Broadcast(ADS-B)protocol is being adopted for use in unmanned aerial vehicles(UAVs)as the primary source of information for emerging multi-UAV collision avoidance algorithms.The lack of security features in ADS-B leaves any processes dependent upon the information vulnerable to a variety of threats from compromised and dishonest UAVs.This could result in substantial losses or damage to properties.This research proposes a new distance-bounding scheme for verifying the distance and flight trajectory in the ADS-B broadcast data from surrounding UAVs.The proposed scheme enables UAVs or ground stations to identify fraudulent UAVs and avoid collisions.The scheme was implemented and tested in the ArduPilot SITL(Software In The Loop)simulator to verify its ability to detect fraudulent UAVs.The experiments showed that the scheme achieved the desired accuracy in both flight trajectory measurement and attack detection.
文摘利用双光子吸收,将Na(3S)原子激发到4D态,测量了Na(4D)+Na(3S)Na(4F)+Na(3S)碰撞能量转移截面,因为直接由4F→3D的荧光不能探测,所以检测3D→3P级联荧光讯号。结合基态钠原子密度的测量,给出了截面值σ_4D→4F=1.3 x 10^(-14)±28%(cm^2)。
基金supported by the National Natural Science Foundation of China under Grant No. 61179072the Civil Aviation Science Foundation of China
文摘An automatic dependent surveillance- broadcast (ADS-B) system has serious security problems, and the data can be spoofed during broadcasting precise position information of aircraft. A solution of the ADS-B system data authentication based on the elliptic curve cipher (ECC) and X.509 certificate is proposed. It can avoid the key distribution problem by using the symmetric key algorithm and prevent the ADS-B data from being spoofed thoroughly. Experimental test results show that the solution is valid and appropriate in ADS-B universal access transceiver (UAT) mode.