Journal of Computer Science and Technology ›› 2020, Vol. 35 ›› Issue (4): 825-842.doi: 10.1007/s11390-020-0260-5
Special Issue: Computer Networks and Distributed Computing
• Computer Networks and Distributed Computing • Previous Articles Next Articles
Zachary P. Languell, Qijun Gu*, Member, IEEE
|  Stark B, Stevenson B, Chen Y. ADS-B for small unmanned aerial systems:Case study and regulatory practices. In Proc. the 2013 International Conference on Unmanned Aircraft Systems, May 2013, pp.152-159.
 Sesso D B, Vismari L F, Camargo J B. An approach to assess the safety of ADS-B based unmanned aerial systems. In Proc. the 2014 International Conference on Unmanned Aircraft Systems, May 2014, pp.669-676.
 Lin Y, Saripalli S. Sense and avoid for unmanned aerial vehicles using ADS-B. In Proc. the IEEE International Conference on Robotics and Automation, May 2015, pp.6402-6407.
 Costin A, Francillon A. Ghost in the Air (Traffic):On insecurity of ADS-B protocol and practical attacks on ADS-B devices. In Proc. the 2012 Black Hat USA, July 2012.
 Strohmeier M, Lenders V, Martinovic I. On the security of the automatic dependent surveillance-broadcast protocol. IEEE Communications Surveys Tutorials, 2015, 17(2):1066-1087.
 Manesh M R, Kaabouch N. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the automatic dependent surveillance-broadcast (ADS-B) system. International Journal of Critical Infrastructure Protection, 2017, 19:16-31.
 Manesh M R, Mullins M, Foerster K, Kaabouch N. A preliminary effort toward investigating the impacts of ADS-B message injection attack. In Proc. the 2018 IEEE Aerospace Conference, March 2018.
 Yang H M, Zhou Q X. Yao M X, Lu R X, Li H W, Zhang X S. A practical and compatible cryptographic solution to ADS-B security. IEEE Internet of Things Journal, 2019, 6(2):3322-3334.
 Yum D H, Kim J S, Hong S J, Lee P J. Distance bounding protocol with adjustable false acceptance rate. IEEE Communications Letters, 2011, 15(4):434-436.
 Languell Z P, Gu Q. Securing ADS-B with multi-point distance-bounding for UAV collision avoidance. In Proc. the 16th IEEE International Conference on Mobile Ad Hoc and Smart Systems, November 2019, pp.145-153.
 Abu-Mahfouz A, Hancke G P. Distance bounding:A practical security solution for real-time location systems. IEEE Transactions on Industrial Informatics, 2013, 9(1):16-27.
 Munilla J, Peinado A. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 2008, 8(9):1227-1232.
 Lee S, Kim J S, Hong S J, Kim J. Distance bounding with delayed responses. IEEE Communications Letters, 2012, 16(9):1478-1481.
 Entezari R, Bahramgiri H, Tajamolian M. A Mafia and distance fraud high-resistance RFID distance bounding protocol. In Proc. the 11th International Conference on Information Security and Cryptology, September 2014, pp.67-72.
 Mitrokotsa A, Dimitrakakis C, Peris-Lopez P, HernandezCastro J C. Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 2010, 14(2):121-123.
 Hancke G P. Distance-bounding for RFID:Effectiveness of ‘terrorist fraud’ in the presence of bit errors. In Proc. the 2012 IEEE International Conference on RFIDTechnologies and Applications, November 2012, pp.91-96.
 Cremers C, Rasmussen K B, Schmidt B, Capkun S. Distance hijacking attacks on distance bounding protocols. In Proc. the IEEE Symposium on Security and Privacy, May 2012, pp.113-127.
 Kim Y S, Kim S H. RFID distance bounding protocol using m-ary challenges. In Proc. the 2011 International Conference on ICT Convergence, September 2011, pp.782-783.
 Schäfer M, Lenders V, Martinovic I. Experimental analysis of attacks on next generation air traffic communication. In Proc. the 11th International Conference Appl. Cryptography Netw. Security, June 2013, pp.253-271.
 Hancke G P, Kuhn M G. An RFID distance bounding protocol. In Proc. the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.67-73.
 Bussard L, Bagga W. Distance-bounding proof of knowledge to avoid real-time attacks. In Proc. the 20th International Conference on Information Security, May 2005, pp.223-238.
 Gu Q, Michanowicz D, Jia C. Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling. Sensors, 2018, 18(12):Article No. 4363.
 Rasmussen K B, Capkun S. Realization of RF distance bounding. In Proc. the 19th USENIX Conference on Security, August 2010, pp.389-402.
|||Nour El Houda Bahloul, Saadi Boudjit, Marwen Abdennebi, Djallel Eddine Boubiche. A Flocking-Based on Demand Routing Protocol for Unmanned Aerial Vehicles [J]. , 2018, 33(2): 263-276.|
|||Peng Du, Jie-Yi Zhao, Wan-Bin Pan, Yi-Gang Wang. GPU Accelerated Real-time Collision Handling in Virtual Disassembly [J]. , 2015, 30(3): 511-518.|
|||Gao-Li Wang. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD [J]. , 2013, 28(1): 129-143.|
|||Jie Liang and Xue-Jia Lai. Improved Collision Attack on Hash Function MD5 [J]. , 2007, 22(1): 79-87 .|
|||Yang Liu and Fa-Lai Chen. Algebraic Conditions for Classifying the Positional Relationships Between Two Conics and Their Applications [J]. , 2004, 19(5): 0-0.|
|||HE Taosong;. Volumetric Virtual Environments [J]. , 2000, 15(1): 37-46.|
|||Li Wei; Zhang Bo; Hilmar Jaschek;. Real-Time Collision-Free Path Planning for Robots in Configuration Space [J]. , 1994, 9(1): 37-52.|
|||Yan Yong;. An Optimal Algorithm for Solving Collision Distance Between Convex Polygons in Plane [J]. , 1993, 8(4): 81-87.|