Authenticating aviation augmentation system broadcasts

This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Lo, Sherman C, Enge, Per K
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 717
container_issue
container_start_page 708
container_title
container_volume
creator Lo, Sherman C
Enge, Per K
description This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.
doi_str_mv 10.1109/PLANS.2010.5507223
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5507223</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5507223</ieee_id><sourcerecordid>5507223</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</originalsourceid><addsrcrecordid>eNpFUF1LAzEQjB8F29o_oC_9A1c32ewleTyKX3CooIJvJZfL1RPvKpdU6L830qL7MLOzA8OwjF1wWHAO5uqpLB6eFwKSJgIlBB6xCZdCSgJUeMzGghNmSEaf_Bs5nf4Z-m3EJgLAGFAg8zM2C-ED0pDUqGDM8mIb330fW2dj26_n9rtNy6af2-26S_e9CLsQfTevho2tnQ0xnLNRYz-Dnx14yl5vrl-Wd1n5eHu_LMrMcTQxa5x0hrj5xdyQ0kaSrxtd2YoSCWpApcpKA3heC9toD6Z2yEF6RKNwyi73ua33fvU1tJ0ddqvDM_AHJGJMrA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticating aviation augmentation system broadcasts</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lo, Sherman C ; Enge, Per K</creator><creatorcontrib>Lo, Sherman C ; Enge, Per K</creatorcontrib><description>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</description><identifier>ISSN: 2153-358X</identifier><identifier>ISBN: 1424450365</identifier><identifier>ISBN: 9781424450367</identifier><identifier>EISSN: 2153-3598</identifier><identifier>EISBN: 1424450373</identifier><identifier>EISBN: 9781424450374</identifier><identifier>DOI: 10.1109/PLANS.2010.5507223</identifier><identifier>LCCN: 2009907046</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aerospace electronics ; Authentication ; Bandwidth ; Broadcasting ; Cryptography ; Global Positioning System ; Laboratories ; Proposals ; Robustness ; Satellite navigation systems</subject><ispartof>IEEE/ION Position, Location and Navigation Symposium, 2010, p.708-717</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5507223$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5507223$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lo, Sherman C</creatorcontrib><creatorcontrib>Enge, Per K</creatorcontrib><title>Authenticating aviation augmentation system broadcasts</title><title>IEEE/ION Position, Location and Navigation Symposium</title><addtitle>PLANS</addtitle><description>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</description><subject>Aerospace electronics</subject><subject>Authentication</subject><subject>Bandwidth</subject><subject>Broadcasting</subject><subject>Cryptography</subject><subject>Global Positioning System</subject><subject>Laboratories</subject><subject>Proposals</subject><subject>Robustness</subject><subject>Satellite navigation systems</subject><issn>2153-358X</issn><issn>2153-3598</issn><isbn>1424450365</isbn><isbn>9781424450367</isbn><isbn>1424450373</isbn><isbn>9781424450374</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUF1LAzEQjB8F29o_oC_9A1c32ewleTyKX3CooIJvJZfL1RPvKpdU6L830qL7MLOzA8OwjF1wWHAO5uqpLB6eFwKSJgIlBB6xCZdCSgJUeMzGghNmSEaf_Bs5nf4Z-m3EJgLAGFAg8zM2C-ED0pDUqGDM8mIb330fW2dj26_n9rtNy6af2-26S_e9CLsQfTevho2tnQ0xnLNRYz-Dnx14yl5vrl-Wd1n5eHu_LMrMcTQxa5x0hrj5xdyQ0kaSrxtd2YoSCWpApcpKA3heC9toD6Z2yEF6RKNwyi73ua33fvU1tJ0ddqvDM_AHJGJMrA</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Lo, Sherman C</creator><creator>Enge, Per K</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201005</creationdate><title>Authenticating aviation augmentation system broadcasts</title><author>Lo, Sherman C ; Enge, Per K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Aerospace electronics</topic><topic>Authentication</topic><topic>Bandwidth</topic><topic>Broadcasting</topic><topic>Cryptography</topic><topic>Global Positioning System</topic><topic>Laboratories</topic><topic>Proposals</topic><topic>Robustness</topic><topic>Satellite navigation systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Lo, Sherman C</creatorcontrib><creatorcontrib>Enge, Per K</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lo, Sherman C</au><au>Enge, Per K</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticating aviation augmentation system broadcasts</atitle><btitle>IEEE/ION Position, Location and Navigation Symposium</btitle><stitle>PLANS</stitle><date>2010-05</date><risdate>2010</risdate><spage>708</spage><epage>717</epage><pages>708-717</pages><issn>2153-358X</issn><eissn>2153-3598</eissn><isbn>1424450365</isbn><isbn>9781424450367</isbn><eisbn>1424450373</eisbn><eisbn>9781424450374</eisbn><abstract>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</abstract><pub>IEEE</pub><doi>10.1109/PLANS.2010.5507223</doi><tpages>10</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2153-358X
ispartof IEEE/ION Position, Location and Navigation Symposium, 2010, p.708-717
issn 2153-358X
2153-3598
language eng
recordid cdi_ieee_primary_5507223
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Aerospace electronics
Authentication
Bandwidth
Broadcasting
Cryptography
Global Positioning System
Laboratories
Proposals
Robustness
Satellite navigation systems
title Authenticating aviation augmentation system broadcasts
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T10%3A25%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticating%20aviation%20augmentation%20system%20broadcasts&rft.btitle=IEEE/ION%20Position,%20Location%20and%20Navigation%20Symposium&rft.au=Lo,%20Sherman%20C&rft.date=2010-05&rft.spage=708&rft.epage=717&rft.pages=708-717&rft.issn=2153-358X&rft.eissn=2153-3598&rft.isbn=1424450365&rft.isbn_list=9781424450367&rft_id=info:doi/10.1109/PLANS.2010.5507223&rft_dat=%3Cieee_6IE%3E5507223%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424450373&rft.eisbn_list=9781424450374&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5507223&rfr_iscdi=true