{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:14:00Z","timestamp":1774541640345,"version":"3.50.1"},"reference-count":41,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T00:00:00Z","timestamp":1488326400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/tits.2016.2586301","type":"journal-article","created":{"date-parts":[[2016,8,15]],"date-time":"2016-08-15T22:24:18Z","timestamp":1471299858000},"page":"690-700","source":"Crossref","is-referenced-by-count":49,"title":["How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption"],"prefix":"10.1109","volume":"18","author":[{"given":"Joonsang","family":"Baek","sequence":"first","affiliation":[]},{"given":"Eman","family":"Hableel","sequence":"additional","affiliation":[]},{"given":"Young-Ji","family":"Byon","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Kitae","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Hwasoo","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1007\/BFb0055718","article-title":"Relations among notions of security for public-key encryption schemes","author":"bellare","year":"1998","journal-title":"Advances in Cryptology CRYPTO"},{"key":"ref38","first-page":"8","article-title":"Automatic Dependent Surveillance Broadcast (ADS-B) surveillance development for air traffic management","author":"vigier","year":"0","journal-title":"Proc FAST Mag"},{"key":"ref33","author":"katz","year":"2015","journal-title":"Introduction to Modern Cryptography"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1504\/IJACT.2008.017047"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2405"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref37","first-page":"336","article-title":"Chosen-ciphertext secure identity-based encryption in the standard model with short ciphertexts","volume":"4058","author":"kiltz","year":"0","journal-title":"Proc ACISP"},{"key":"ref36","author":"sheedy","year":"2010","journal-title":"Privacy enhanced protocols using pairing based cryptography"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016598314198"},{"key":"ref34","author":"kaliski","year":"1998"},{"key":"ref10","first-page":"1","article-title":"A community report of the 2008 workshop on high confidence transportation cyber-physical systems","author":"poovendran","year":"0","journal-title":"Proc ENC-GNSS"},{"key":"ref40","author":"dong","year":"0"},{"key":"ref11","first-page":"1","article-title":"Ghost in the air(traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices","author":"costin","year":"0","journal-title":"Proc Black Hat USA"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2006.1655886"},{"key":"ref13","first-page":"1","article-title":"A data authentication solution of ADS-B system based on x.509 certificate","author":"ziliang","year":"0","journal-title":"Proc 27th Int Congr Aeronautical Sci"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1021"},{"key":"ref15","first-page":"213","article-title":"Identity-based encryption from the weil pairing","volume":"2139","author":"boneh","year":"2001","journal-title":"Proc Crypto"},{"key":"ref16","year":"2010","journal-title":"Automatic Dependent Surveillance Broadcast (ADSB) out performance requirements to support Air Traffic Control (ATC) service final rule"},{"key":"ref17","author":"kovell","year":"2012","journal-title":"Comparative analysis of ADS-B verification techniques"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2514\/6.2005-7351"},{"key":"ref19","year":"2004","journal-title":"Minimum Operating Performance Standard for Universal Access Transceiver (UAT) Automatic Dependent Surveillance Broadcast"},{"key":"ref28","article-title":"Assessing the security of a navigation system: A case study using enhanced loran","author":"lo","year":"0","journal-title":"Proc ENC-GNSS"},{"key":"ref4","year":"2002","journal-title":"Minimum aviation system performance standards for Automatic Dependent Surveillance Broadcast (ADS-B)"},{"key":"ref27","first-page":"1","article-title":"Military position source challenges for worldwide ADS-B out compliance","author":"laster","year":"0","journal-title":"Proc Conf IEEE ICN"},{"key":"ref3","author":"gosling","year":"2009","journal-title":"E-enabled Capabilities of the 787 Dreamliner"},{"key":"ref6","year":"2013"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-38980-1_16","article-title":"Experimental analysis of attacks on next generation air traffic communication","author":"sch\u00e4fer","year":"2013","journal-title":"Applied Cryptography and Network Security"},{"key":"ref5","author":"atienza","year":"2013","journal-title":"ADS-B An air navigation revolution"},{"key":"ref8","author":"barhydt","year":"0","journal-title":"Development of Intent Information Changes to Revised Minimum Aviation System Performance Standards for Automatic Dependent Surveillance Broadcast (RTCA\/DO-242A)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2008.2006123"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2162209"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2010.5446905"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179377"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2365951"},{"key":"ref22","author":"p\u00f6pper","year":"2011","journal-title":"Investigation of Signal and Message Manipulations on the Wireless Channel"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2011.06.001"},{"key":"ref24","article-title":"Challenges in aviation CPS asset collection and distribution","author":"sampingthaya","year":"2008","journal-title":"Position Paper National Workshop for Research on Transportation CPS Automotive Aviation and Rail"},{"key":"ref41","first-page":"223","article-title":"Efficient selective-ID secure identity based encryption without random oracles","volume":"3027","author":"boyen","year":"2004","journal-title":"Eurocrypt"},{"key":"ref23","first-page":"29","article-title":"Practical message manipulation attacks in ieee 802.15. 4 wireless networks","author":"wilhias","year":"0","journal-title":"Proc MMB DFT Workshop"},{"key":"ref26","first-page":"4_1533","article-title":"Security considerations for the e-enabled aircraft","author":"wargo","year":"0","journal-title":"Proc IEEE Conf Aerosp"},{"key":"ref25","first-page":"1","article-title":"Identification of ADS-B system vulnerabilities and threats","author":"purton","year":"0","journal-title":"Proc Australasian Transport Research Forum"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/7865878\/07534750.pdf?arnumber=7534750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:20:08Z","timestamp":1642004408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7534750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":41,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tits.2016.2586301","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3]]}}}