{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:06Z","timestamp":1726003086161},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_2","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"15-32","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["SOS - Securing Open Skies"],"prefix":"10.1007","author":[{"given":"Savio","family":"Sciancalepore","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"7","key":"2_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MAES.2017.160175","volume":"32","author":"Y Lim","year":"2017","unstructured":"Lim, Y., Bassien-Capsa, V., Ramasamy, S., et al.: Commercial airline single-pilot operations: system design and pathways to certification. IEEE Aerosp. Electron. Syst. Mag. 32(7), 4\u201321 (2017)","journal-title":"IEEE Aerosp. Electron. Syst. Mag."},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"1066","DOI":"10.1109\/COMST.2014.2365951","volume":"17","author":"M Strohmeier","year":"2015","unstructured":"Strohmeier, M., Lenders, V., Martinovic, I.: On the security of the automatic dependent surveillance-broadcast protocol. IEEE Commun. Surv. Tuts. 17(2), 1066\u20131087 (2015)","journal-title":"IEEE Commun. Surv. Tuts."},{"key":"2_CR3","unstructured":"Radio-Technology-Commission-Aeronautics: Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance \u2013 Broadcast (ADS-B) and Traffic Information Services \u2013 Broadcast (TIS-B). Technical report (2014)"},{"issue":"5","key":"2_CR4","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/MCOM.2014.6815901","volume":"52","author":"M Strohmeier","year":"2014","unstructured":"Strohmeier, M., Sch\u00e4fer, M., Lenders, V., Martinovic, I.: Realities and challenges of NextGen air traffic management: the case of ADS-B. IEEE Commun. Mag. 52(5), 111\u2013118 (2014)","journal-title":"IEEE Commun. Mag."},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Strohmeier, M., Lenders, V., Martinovic, I.: Lightweight location verification in air traffic surveillance networks. In: Proceedings of ACM Workshop on Cyber-Physical System Security, pp. 49\u201360 (2015)","DOI":"10.1145\/2732198.2732202"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-319-20550-2_4","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"Martin Strohmeier","year":"2015","unstructured":"Strohmeier, M., Lenders, V., Martinovic, I.: Intrusion detection for airborne communication using PHY-layer information. In: Proceedings of International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 67\u201377 (2015)"},{"key":"2_CR7","unstructured":"Alhazbi, S., Sciancalepore, S., Di Pietro, R.: A hole in the sky: de-anonymizing OpenSky receivers. T.R. 2018-2 (2018). \nhttps:\/\/cri-lab.net\/wp-content\/uploads\/2018\/10\/Alhazbi_PERCOM2019.pdf"},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1109\/TITS.2016.2586301","volume":"18","author":"J Baek","year":"2017","unstructured":"Baek, J., Hableel, E., Byon, Y., et al.: How to protect ADS-B: confidentiality framework and efficient realization based on staged identity-based encryption. IEEE Trans. Intell. Transp. Syst. 18(3), 690\u2013700 (2017)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TSC.2015.2459709","volume":"10","author":"A Yang","year":"2017","unstructured":"Yang, A., Tan, X., Baek, J., Wong, D.S.: A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification. IEEE Trans. Serv. Comput. 10(2), 165\u2013175 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Kacem, T., Wijesekera, D., Costa, P.: Integrity and authenticity of ADS-B broadcasts. In: IEEE Aerospace Conference, pp. 1\u20138, March 2015","DOI":"10.1109\/AERO.2015.7119293"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kacem, T., Wijesekera, D., Costa, P., Barreto, A.B.: Secure ADS-B framework: ADS-Bsec. In: IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 2681\u20132686, November 2016","DOI":"10.1109\/ITSC.2016.7795987"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Berthier, P., Fernandez, J.M., Robert, J.M.: SAT: security in the air using Tesla. In: IEEE\/AIAA Digital Avionics Systems Conference, pp. 1\u201310, September 2017","DOI":"10.1109\/DASC.2017.8102003"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Yang, H., Yao, M., Xu, Z., Liu, B.: LHCSAS: a lightweight and highly-compatible solution for ADS-B security. In: IEEE Global Communications Conference, pp. 1\u20137, December 2017","DOI":"10.1109\/GLOCOM.2017.8254500"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Calvo-Palomino, R., Ricciato, F., Repas, B., et al.: Nanosecond-precision time-of-arrival estimation for aircraft signals with low-cost SDR receivers. In: Proceedings of ACM\/IEEE International Conference on Information Processing in Sensor Networks, pp. 272\u2013277 (2018)","DOI":"10.1109\/IPSN.2018.00055"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Di Pietro, R., Chessa, S., Maestrini, P.: Computation, memory and bandwidth efficient distillation codes to mitigate DoS in multicast. In: International Conference on Security and Privacy for Emerging Areas in Communications Networks, pp. 13\u201322, September 2005","DOI":"10.1109\/SECURECOMM.2005.15"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, M., Strohmeier, M., Lenders, V., Martinovic, I., Wilhelm, M.: Bringing up OpenSky: a large-scale ADS-B sensor network for research. In: Proceedings of International Symposium on Information Processing in Sensor, pp. 83\u201394, April 2014","DOI":"10.1109\/IPSN.2014.6846743"},{"key":"2_CR17","volume-title":"Software Defined Radio: Enabling Technologies","author":"W Tuttlebee","year":"2002","unstructured":"Tuttlebee, W.: Software Defined Radio: Enabling Technologies. Wiley, Hoboken (2002)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 56\u201373 (2000)","DOI":"10.1109\/SECPRI.2000.848446"},{"issue":"5","key":"2_CR19","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wirel. Netw. 8(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw."},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H., Bellare, M., Canetti, R.: HMAC: keyed-hashing for message authentication. In: RFC 2104, February 1997","DOI":"10.17487\/rfc2104"},{"key":"2_CR21","unstructured":"Alhazbi, S., Sciancalepore, S., Di Pietro, R.: Reliability of ADS-B communications: novel insights based on an experimental assessment. T.R. 2018-1 (2018). \nhttps:\/\/cri-lab.net\/wp-content\/uploads\/2018\/10\/AlHazbi_SAC2019_noanonym.pdf"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:09:45Z","timestamp":1544173785000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}