LEADER 03778nam 22006855 450 001 9910627251703321 005 20251113203130.0 010 $a3-031-07021-6 024 7 $a10.1007/978-3-031-07021-1 035 $a(MiAaPQ)EBC7077196 035 $a(Au-PeEL)EBL7077196 035 $a(CKB)24738997500041 035 $a(PPN)264193741 035 $a(OCoLC)1344160881 035 $a(DE-He213)978-3-031-07021-1 035 $a(EXLCZ)9924738997500041 100 $a20220823d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure Automatic Dependent Surveillance-Broadcast Systems /$fby Haomiao Yang, Hongwei Li, Xuemin Sherman Shen 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (166 pages) 225 1 $aWireless Networks,$x2366-1445 311 08$aPrint version: Yang, Haomiao Secure Automatic Dependent Surveillance-Broadcast Systems Cham : Springer International Publishing AG,c2022 9783031070204 320 $aIncludes bibliographical references and index. 327 $aIntroduction -- An Overview of ADS-B -- Basic Techniques for Securing ADS-B Systems -- Enabling Confidentiality for ADS-B Broadcast Messages -- Efficient ADS-B Broadcast -- Authentication with Batch Verification -- Efficient ADS-B Broadcast Authentication Using IBS-MR -- Practical and Compatible Cryptographic Solution to ADS-B Security -- Enable Aircraft Location Verification for Industrial ADS-B -- Future Research Directions -- Conclusion. 330 $aThis book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security. 410 0$aWireless Networks,$x2366-1445 606 $aTelecommunication 606 $aComputer networks 606 $aCooperating objects (Computer systems) 606 $aComputational intelligence 606 $aCommunications Engineering, Networks 606 $aComputer Communication Networks 606 $aCyber-Physical Systems 606 $aComputational Intelligence 615 0$aTelecommunication. 615 0$aComputer networks. 615 0$aCooperating objects (Computer systems) 615 0$aComputational intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aComputer Communication Networks. 615 24$aCyber-Physical Systems. 615 24$aComputational Intelligence. 676 $a629.135 676 $a629.135 700 $aYang$b Haomiao$01267136 702 $aLi$b Hongwei 702 $aShen$b Xuemin Sherman 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910627251703321 996 $aSecure automatic dependent surveillance-broadcast systems$93362827 997 $aUNINA