|
Journal of Computer Science and Technology ›› 2020, Vol. 35 ›› Issue (4): 825-842.doi: 10.1007/s11390-020-0260-5
Special Issue: Computer Networks and Distributed Computing
• Computer Networks and Distributed Computing • Previous Articles Next Articles
Zachary P. Languell, Qijun Gu*, Member, IEEE
[1] Stark B, Stevenson B, Chen Y. ADS-B for small unmanned aerial systems:Case study and regulatory practices. In Proc. the 2013 International Conference on Unmanned Aircraft Systems, May 2013, pp.152-159. [2] Sesso D B, Vismari L F, Camargo J B. An approach to assess the safety of ADS-B based unmanned aerial systems. In Proc. the 2014 International Conference on Unmanned Aircraft Systems, May 2014, pp.669-676. [3] Lin Y, Saripalli S. Sense and avoid for unmanned aerial vehicles using ADS-B. In Proc. the IEEE International Conference on Robotics and Automation, May 2015, pp.6402-6407. [4] Costin A, Francillon A. Ghost in the Air (Traffic):On insecurity of ADS-B protocol and practical attacks on ADS-B devices. In Proc. the 2012 Black Hat USA, July 2012. [5] Strohmeier M, Lenders V, Martinovic I. On the security of the automatic dependent surveillance-broadcast protocol. IEEE Communications Surveys Tutorials, 2015, 17(2):1066-1087. [6] Manesh M R, Kaabouch N. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the automatic dependent surveillance-broadcast (ADS-B) system. International Journal of Critical Infrastructure Protection, 2017, 19:16-31. [7] Manesh M R, Mullins M, Foerster K, Kaabouch N. A preliminary effort toward investigating the impacts of ADS-B message injection attack. In Proc. the 2018 IEEE Aerospace Conference, March 2018. [8] Yang H M, Zhou Q X. Yao M X, Lu R X, Li H W, Zhang X S. A practical and compatible cryptographic solution to ADS-B security. IEEE Internet of Things Journal, 2019, 6(2):3322-3334. [9] Yum D H, Kim J S, Hong S J, Lee P J. Distance bounding protocol with adjustable false acceptance rate. IEEE Communications Letters, 2011, 15(4):434-436. [10] Languell Z P, Gu Q. Securing ADS-B with multi-point distance-bounding for UAV collision avoidance. In Proc. the 16th IEEE International Conference on Mobile Ad Hoc and Smart Systems, November 2019, pp.145-153. [11] Abu-Mahfouz A, Hancke G P. Distance bounding:A practical security solution for real-time location systems. IEEE Transactions on Industrial Informatics, 2013, 9(1):16-27. [12] Munilla J, Peinado A. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 2008, 8(9):1227-1232. [13] Lee S, Kim J S, Hong S J, Kim J. Distance bounding with delayed responses. IEEE Communications Letters, 2012, 16(9):1478-1481. [14] Entezari R, Bahramgiri H, Tajamolian M. A Mafia and distance fraud high-resistance RFID distance bounding protocol. In Proc. the 11th International Conference on Information Security and Cryptology, September 2014, pp.67-72. [15] Mitrokotsa A, Dimitrakakis C, Peris-Lopez P, HernandezCastro J C. Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 2010, 14(2):121-123. [16] Hancke G P. Distance-bounding for RFID:Effectiveness of ‘terrorist fraud’ in the presence of bit errors. In Proc. the 2012 IEEE International Conference on RFIDTechnologies and Applications, November 2012, pp.91-96. [17] Cremers C, Rasmussen K B, Schmidt B, Capkun S. Distance hijacking attacks on distance bounding protocols. In Proc. the IEEE Symposium on Security and Privacy, May 2012, pp.113-127. [18] Kim Y S, Kim S H. RFID distance bounding protocol using m-ary challenges. In Proc. the 2011 International Conference on ICT Convergence, September 2011, pp.782-783. [19] Schäfer M, Lenders V, Martinovic I. Experimental analysis of attacks on next generation air traffic communication. In Proc. the 11th International Conference Appl. Cryptography Netw. Security, June 2013, pp.253-271. [20] Hancke G P, Kuhn M G. An RFID distance bounding protocol. In Proc. the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.67-73. [21] Bussard L, Bagga W. Distance-bounding proof of knowledge to avoid real-time attacks. In Proc. the 20th International Conference on Information Security, May 2005, pp.223-238. [22] Gu Q, Michanowicz D, Jia C. Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling. Sensors, 2018, 18(12):Article No. 4363. [23] Rasmussen K B, Capkun S. Realization of RF distance bounding. In Proc. the 19th USENIX Conference on Security, August 2010, pp.389-402. |
|
|