Authenticating aviation augmentation system broadcasts
This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 717 |
---|---|
container_issue | |
container_start_page | 708 |
container_title | |
container_volume | |
creator | Lo, Sherman C Enge, Per K |
description | This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations. |
doi_str_mv | 10.1109/PLANS.2010.5507223 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5507223</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5507223</ieee_id><sourcerecordid>5507223</sourcerecordid><originalsourceid>FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</originalsourceid><addsrcrecordid>eNpFUF1LAzEQjB8F29o_oC_9A1c32ewleTyKX3CooIJvJZfL1RPvKpdU6L830qL7MLOzA8OwjF1wWHAO5uqpLB6eFwKSJgIlBB6xCZdCSgJUeMzGghNmSEaf_Bs5nf4Z-m3EJgLAGFAg8zM2C-ED0pDUqGDM8mIb330fW2dj26_n9rtNy6af2-26S_e9CLsQfTevho2tnQ0xnLNRYz-Dnx14yl5vrl-Wd1n5eHu_LMrMcTQxa5x0hrj5xdyQ0kaSrxtd2YoSCWpApcpKA3heC9toD6Z2yEF6RKNwyi73ua33fvU1tJ0ddqvDM_AHJGJMrA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Authenticating aviation augmentation system broadcasts</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Lo, Sherman C ; Enge, Per K</creator><creatorcontrib>Lo, Sherman C ; Enge, Per K</creatorcontrib><description>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</description><identifier>ISSN: 2153-358X</identifier><identifier>ISBN: 1424450365</identifier><identifier>ISBN: 9781424450367</identifier><identifier>EISSN: 2153-3598</identifier><identifier>EISBN: 1424450373</identifier><identifier>EISBN: 9781424450374</identifier><identifier>DOI: 10.1109/PLANS.2010.5507223</identifier><identifier>LCCN: 2009907046</identifier><language>eng</language><publisher>IEEE</publisher><subject>Aerospace electronics ; Authentication ; Bandwidth ; Broadcasting ; Cryptography ; Global Positioning System ; Laboratories ; Proposals ; Robustness ; Satellite navigation systems</subject><ispartof>IEEE/ION Position, Location and Navigation Symposium, 2010, p.708-717</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5507223$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5507223$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Lo, Sherman C</creatorcontrib><creatorcontrib>Enge, Per K</creatorcontrib><title>Authenticating aviation augmentation system broadcasts</title><title>IEEE/ION Position, Location and Navigation Symposium</title><addtitle>PLANS</addtitle><description>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</description><subject>Aerospace electronics</subject><subject>Authentication</subject><subject>Bandwidth</subject><subject>Broadcasting</subject><subject>Cryptography</subject><subject>Global Positioning System</subject><subject>Laboratories</subject><subject>Proposals</subject><subject>Robustness</subject><subject>Satellite navigation systems</subject><issn>2153-358X</issn><issn>2153-3598</issn><isbn>1424450365</isbn><isbn>9781424450367</isbn><isbn>1424450373</isbn><isbn>9781424450374</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFUF1LAzEQjB8F29o_oC_9A1c32ewleTyKX3CooIJvJZfL1RPvKpdU6L830qL7MLOzA8OwjF1wWHAO5uqpLB6eFwKSJgIlBB6xCZdCSgJUeMzGghNmSEaf_Bs5nf4Z-m3EJgLAGFAg8zM2C-ED0pDUqGDM8mIb330fW2dj26_n9rtNy6af2-26S_e9CLsQfTevho2tnQ0xnLNRYz-Dnx14yl5vrl-Wd1n5eHu_LMrMcTQxa5x0hrj5xdyQ0kaSrxtd2YoSCWpApcpKA3heC9toD6Z2yEF6RKNwyi73ua33fvU1tJ0ddqvDM_AHJGJMrA</recordid><startdate>201005</startdate><enddate>201005</enddate><creator>Lo, Sherman C</creator><creator>Enge, Per K</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>201005</creationdate><title>Authenticating aviation augmentation system broadcasts</title><author>Lo, Sherman C ; Enge, Per K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c139t-fc4c95194c9569578945edf8bab5df825f074507800e1d2af8e09dc3104e33973</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Aerospace electronics</topic><topic>Authentication</topic><topic>Bandwidth</topic><topic>Broadcasting</topic><topic>Cryptography</topic><topic>Global Positioning System</topic><topic>Laboratories</topic><topic>Proposals</topic><topic>Robustness</topic><topic>Satellite navigation systems</topic><toplevel>online_resources</toplevel><creatorcontrib>Lo, Sherman C</creatorcontrib><creatorcontrib>Enge, Per K</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Lo, Sherman C</au><au>Enge, Per K</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Authenticating aviation augmentation system broadcasts</atitle><btitle>IEEE/ION Position, Location and Navigation Symposium</btitle><stitle>PLANS</stitle><date>2010-05</date><risdate>2010</risdate><spage>708</spage><epage>717</epage><pages>708-717</pages><issn>2153-358X</issn><eissn>2153-3598</eissn><isbn>1424450365</isbn><isbn>9781424450367</isbn><eisbn>1424450373</eisbn><eisbn>9781424450374</eisbn><abstract>This paper studies the feasibility and means by which authentication can be overlaid upon the existing SBAS and GBAS designs. It considers how to achieve the authentication that is compatible with the current augmentation system and its users. It also considers how to perform the security necessary to support authentication within the current NAS framework. One important issue is secure key distribution and the paper presents some options designed to be reasonable for aviation infrastructure and operations. One means is a key distribution protocol that utilizes the operation of the aircraft and air traffic to aid in key verification. This provides to distribute keys and provide some ability to validate them without significant additions to the NAS. Another issue is bandwidth. The paper presents ways of modifying protocols such as TESLA to reduce bandwidth use while maintaining an acceptable level of security. The paper uses the current L1 SBAS and GBAS as case studies. The paper presents reasonable method to provide authentication on the current SBAS using about ten percent of bandwidth. The method is compatible to current SBAS user equipment in that they will not be adversely affected. GBAS can employ similar means. As it has greater data bandwidth, a more critical issue for GBAS is key distribution to the ground stations.</abstract><pub>IEEE</pub><doi>10.1109/PLANS.2010.5507223</doi><tpages>10</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2153-358X |
ispartof | IEEE/ION Position, Location and Navigation Symposium, 2010, p.708-717 |
issn | 2153-358X 2153-3598 |
language | eng |
recordid | cdi_ieee_primary_5507223 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Aerospace electronics Authentication Bandwidth Broadcasting Cryptography Global Positioning System Laboratories Proposals Robustness Satellite navigation systems |
title | Authenticating aviation augmentation system broadcasts |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T10%3A25%3A18IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Authenticating%20aviation%20augmentation%20system%20broadcasts&rft.btitle=IEEE/ION%20Position,%20Location%20and%20Navigation%20Symposium&rft.au=Lo,%20Sherman%20C&rft.date=2010-05&rft.spage=708&rft.epage=717&rft.pages=708-717&rft.issn=2153-358X&rft.eissn=2153-3598&rft.isbn=1424450365&rft.isbn_list=9781424450367&rft_id=info:doi/10.1109/PLANS.2010.5507223&rft_dat=%3Cieee_6IE%3E5507223%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424450373&rft.eisbn_list=9781424450374&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5507223&rfr_iscdi=true |