{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:22:52Z","timestamp":1769300572737,"version":"3.49.0"},"reference-count":12,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,25]]},"DOI":"10.1109\/icspis51252.2020.9340152","type":"proceedings-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T13:05:49Z","timestamp":1612962349000},"page":"1-4","source":"Crossref","is-referenced-by-count":15,"title":["A Microservices Architecture for ADS-B Data Security Using Blockchain"],"prefix":"10.1109","author":[{"given":"Haitham Abu","family":"Damis","sequence":"first","affiliation":[{"name":"College of Engineering and IT University of Dubai,Dubai,UAE"}]},{"given":"Dina","family":"Shehada","sequence":"additional","affiliation":[{"name":"College of Engineering and IT University of Dubai,Dubai,UAE"}]},{"given":"Claude","family":"Fachkha","sequence":"additional","affiliation":[{"name":"College of Engineering and IT University of Dubai,Dubai,UAE"}]},{"given":"Amjad","family":"Gawanmeh","sequence":"additional","affiliation":[{"name":"College of Engineering and IT University of Dubai,Dubai,UAE"}]},{"given":"Jamal N.","family":"Al-Karaki","sequence":"additional","affiliation":[{"name":"Abu Dhabi Polytechnic University,Dept. of Information Security Engineering Technology,Abu Dhabi,UAE"}]}],"member":"263","reference":[{"key":"ref4","first-page":"1066","article-title":"On the security of the automatic dependent surveillance-broadcast protocol","volume":"17","author":"martin","year":"2014","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref3","year":"0","journal-title":"Live flight tracker real-time flight tracker map"},{"key":"ref10","first-page":"2203","article-title":"Blockchain serverless public\/private key infrastructure for ADS-B security, authentication, and privacy","author":"ronald","year":"2019","journal-title":"AIAA Scitech 2019 Forum"},{"key":"ref6","first-page":"3322","article-title":"A practical and compatible cryptographic solution to ADS-B security","volume":"6","author":"haomiao","year":"2018","journal-title":"IEEE Internet of Things Journal"},{"key":"ref11","first-page":"22","article-title":"Implementing a microservices system with blockchain smart contracts","author":"roberto","year":"0","journal-title":"2019 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE)"},{"key":"ref5","article-title":"Can cryptography secure next generation air traffic surveillance?","author":"kyle","year":"2014","journal-title":"IEEE Security and Privacy Magazine"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1007\/s10291-015-0453-5","article-title":"Analysis of anomalies in ADS-B and its GPS data","volume":"20","author":"busyairah","year":"2016","journal-title":"GPS Solutions"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2017.10.002"},{"key":"ref7","article-title":"ADS-B spoofing attack detection method based on lstm","author":"zou","year":"2020","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"122147","DOI":"10.1109\/ACCESS.2020.3007182","article-title":"Security issues in automatic dependent surveillance-broadcast (ADS-B): A survey","volume":"8","author":"zhijun","year":"2020","journal-title":"IEEE Access"},{"key":"ref9","first-page":"64","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"mario","year":"0","journal-title":"2008 IEEE Symposium on Security and Privacy (sp 2008)"},{"key":"ref1","author":"ricardo","year":"2016","journal-title":"Automatic dependent surveillance broadcast (ADS-B) system for ownership and traffic situational awareness"}],"event":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","location":"DUBAI, United Arab Emirates","start":{"date-parts":[[2020,11,25]]},"end":{"date-parts":[[2020,11,26]]}},"container-title":["2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9340125\/9340126\/09340152.pdf?arnumber=9340152","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:25:05Z","timestamp":1656375905000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340152\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icspis51252.2020.9340152","relation":{},"subject":[],"published":{"date-parts":[[2020,11,25]]}}}