000 03836nam a22006135i 4500
001 978-3-031-07021-1
003 DE-He213
005 20240207153738.0
007 cr nn 008mamaa
008 220823s2023 sz | s |||| 0|eng d
020 _a9783031070211
_9978-3-031-07021-1
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aYang, Haomiao.
_eauthor.
_0(orcid)0000-0002-5968-3518
_1https://orcid.org/0000-0002-5968-3518
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecure Automatic Dependent Surveillance-Broadcast Systems
_h[electronic resource] /
_cby Haomiao Yang, Hongwei Li, Xuemin Sherman Shen.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2023.
300 _aXV, 154 p. 65 illus., 41 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1445
500 _aAcceso multiusuario
505 0 _aIntroduction -- An Overview of ADS-B -- Basic Techniques for Securing ADS-B Systems -- Enabling Confidentiality for ADS-B Broadcast Messages -- Efficient ADS-B Broadcast -- Authentication with Batch Verification -- Efficient ADS-B Broadcast Authentication Using IBS-MR -- Practical and Compatible Cryptographic Solution to ADS-B Security -- Enable Aircraft Location Verification for Industrial ADS-B -- Future Research Directions -- Conclusion.
520 _aThis book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.
541 _fUABC ;
_cPerpetuidad
650 0 _aTelecommunication.
650 0 _aComputer networks .
650 0 _aCooperating objects (Computer systems).
650 0 _aComputational intelligence.
650 1 4 _aCommunications Engineering, Networks.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aComputational Intelligence.
700 1 _aLi, Hongwei.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aShen, Xuemin Sherman.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031070204
776 0 8 _iPrinted edition:
_z9783031070228
776 0 8 _iPrinted edition:
_z9783031070235
830 0 _aWireless Networks,
_x2366-1445
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-07021-1
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cLIBRO_ELEC
999 _c263128
_d263127