{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T14:52:15Z","timestamp":1768315935839,"version":"3.49.0"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2014,12,1]],"date-time":"2014-12-01T00:00:00Z","timestamp":1417392000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Communications, Navigation, Surveillance\/Air Traffic Management (CNS\/ATM) systems utilize digital technologies, satellite systems, and various levels of automation to facilitate seamless global air traffic management. Automatic Dependent Surveillance-Broadcast (ADS-B), the core component of CNS\/ATM, broadcasts important monitoring information, such as the location, altitude, and direction of aircraft, to the ground. However, ADS-B data are transmitted in an unencrypted (or unprotected) communication channel between ADS-B sensors and Air Traffic Control (ATC). Consequently, these data are vulnerable to security threats, such as spoofing, eavesdropping, and data modification. In  this paper, we propose a method that protects the ADS-B data transmitted between ADS-B sensors and ATC using Simple Public Key Infrastructure (SPKI) certificates and symmetric cryptography. The SPKI certificates are used to grant transmission authorization to the ADS-B sensors, while symmetric cryptography is used to encrypt\/decrypt the ADS-B data transmitted between the ADS-B sensors and ATC. The proposed security framework comprises an ADS-B sensor authentication module, an encrypted data processing module, and an ADS-B sensor information management module. We believe that application of the proposed security framework to CNS\/ATM will enable it to effectively obviate security threats, such as ground station flood denial, ground station target ghost injection, and ADS-B data modification.<\/jats:p>","DOI":"10.3390\/info5040622","type":"journal-article","created":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T02:07:08Z","timestamp":1417486028000},"page":"622-633","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Protection Method for Data Communication between ADS-B Sensor and Next-Generation Air Traffic Control Systems"],"prefix":"10.3390","volume":"5","author":[{"given":"Seoung-Hyeon","family":"Lee","sequence":"first","affiliation":[{"name":"ICS Security Research Section, Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-Ro, Yuseong-Gu, Daejeon 305-700, Korea"}]},{"given":"Yong-Kyun","family":"Kim","sequence":"additional","affiliation":[{"name":"ICT Convergence Security Research Section, Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-Ro, Yuseong-Gu, Daejeon 305-700, Korea"}]},{"given":"Jong-Wook","family":"Han","sequence":"additional","affiliation":[{"name":"ICS Security Research Section, Electronics and Telecommunications Research Institute (ETRI), 218 Gajeong-Ro, Yuseong-Gu, Daejeon 305-700, Korea"}]},{"given":"Deok-Gyu","family":"Lee","sequence":"additional","affiliation":[{"name":"School of Information Technology, Seowon University, 377-3 Musimseo-ro, Heungdeok-gu, Cheongju-si, Choong-Chung Buk-do 361-742, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2014,12,1]]},"reference":[{"key":"ref_1","unstructured":"(2002). Global Air Navigation Plan for CNS\/ATM Systems (Doc 9550 AA\/963), ICAO. [2nd ed.]."},{"key":"ref_2","unstructured":"Wikipedia: Automatic Dependent surveillance-broadcast. Available online: http:\/\/en.wikipedia.org\/wiki\/Automatic_dependent_surveillance-broadcast."},{"key":"ref_3","first-page":"8","article-title":"Automatic Dependent Surveillance Broadcast (ADS-B): Communication development for Air Traffic Management","volume":"47","author":"Vigier","year":"2011","journal-title":"AIRBUS FAST"},{"key":"ref_4","unstructured":"(2012). Australian Government Civil Aviation Safety Authority, ADS-B."},{"key":"ref_5","first-page":"28","article-title":"Conformance monitoring method based 4D trajectory modeling using aircraft performance data","volume":"5","author":"Lee","year":"2014","journal-title":"J. Converg."},{"key":"ref_6","first-page":"1","article-title":"Ground speed calculation using wind component information for trajectory prediction","volume":"4","author":"Kim","year":"2013","journal-title":"J. Converg."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Singh, R., Singh, P., and Duhan, M. (2014). An effective implementation of security based algorithmic approach in mobile adhoc networks. Hum.-centric Comput. Inf. Sci., 4.","DOI":"10.1186\/s13673-014-0007-9"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.3745\/JIPS.03.0003","article-title":"Optical image encryption and decryption considering wireless communication channels","volume":"10","author":"Cho","year":"2014","journal-title":"J. Inf. Process. Syst."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"247","DOI":"10.3745\/JIPS.2013.9.2.247","article-title":"A secure network for mobile wireless service","volume":"9","author":"Peng","year":"2013","journal-title":"J. Inf. Process. Syst."},{"key":"ref_10","unstructured":"Strohmeier, M., Lenders, V., and Martinovic, I. (2013). Security of ADS-B: State of the art and beyond, arXiv:1307.3664v1."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.ijcip.2011.06.001","article-title":"Security analysis of the ADS-B implementation in the next generation air transportation system","volume":"4","author":"McCallie","year":"2011","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Wilhelm, M., and Martinovic, I. (2011, January 14\u201317). Short paper: Reactive jamming in wireless networks: How realistic is the threat?. Proceedings of the Fourth ACM Conference on Wireless Network Security, Hamburg, Germany.","DOI":"10.1145\/1998412.1998422"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Jacobson, M., Locasto, M., Mohassel, P., and Safavi-Naini, R. (2013). Applied Cryptography and Network Security, Proceedings of 11th International Conference, ACNS 2013, Springer. Lecture Notes in Computer Science, Volume 7954.","DOI":"10.1007\/978-3-642-38980-1"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Atluri, V., and Diaz, C. (2011). Computer Security-ESORICS 2011, Proceedings of 16th European Symposium on Research in Computer Security, Springer. Lecture Notes in Computer Science, Volume 6879.","DOI":"10.1007\/978-3-642-23822-2"},{"key":"ref_15","unstructured":"Wilhelm, M., Schmitt, J.B., and Lenders, V. (2012, January 19\u201321). Practical message manipulation attacks in IEEE 802.15.4 wireless networks. Proceedings of MMB & DFT 2012, Kaiserslautern, Germany."},{"key":"ref_16","unstructured":"Costin, A., and Francillon, A. (2012, January 21\u201326). Ghost in the Air (Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Proceedings of Black Hat USA 2012, Las Vegas, NV, USA."},{"key":"ref_17","unstructured":"Renderlab (2012, January 26\u201329). Hackers + Airplanes = No Good Can Come Of This. Proceedings of Defcon 20, Las Vegas, NV, USA."},{"key":"ref_18","unstructured":"Orlando, V.A. Automatic Dependent Surveillance Broadcast (ADS-B), Available online: http:\/\/adsb.tc.faa.gov\/WG3_Meetings\/Meeting8\/Squitter-Lon.pdf."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/2192-1962-3-16","article-title":"Smart card based time efficient authentication scheme for global grid computing","volume":"3","author":"Gnanaraj","year":"2013","journal-title":"Hum-centric Comput. Inf. Sci."},{"key":"ref_20","first-page":"23","article-title":"Lightweight anonymous authentication scheme with unlink ability in global mobility networks","volume":"4","author":"Chung","year":"2013","journal-title":"J. Converg."},{"key":"ref_21","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. SPKI Certificate Theory (RFC 2693). Available online: http:\/\/www.ietf.org\/rfc\/rfc2693.txt."},{"key":"ref_22","first-page":"29","article-title":"SPKI\/SDSI HTTP secure server to support role-based access control & confidential communication","volume":"12","author":"Lee","year":"2002","journal-title":"J. Korea Inst. Inf. Secur. Cryptol."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/5\/4\/622\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:10:16Z","timestamp":1760217016000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/5\/4\/622"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,1]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,12]]}},"alternative-id":["info5040622"],"URL":"https:\/\/doi.org\/10.3390\/info5040622","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,1]]}}}