SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Zachary P. Languell, Qijun Gu. A Multi-Point Distance-Bounding Protocol for Securing Automatic Dependent Surveillance-Broadcast in Unmanned Aerial Vehicle Applications[J]. Journal of Computer Science and Technology, 2020, 35(4): 825-842. DOI: 10.1007/s11390-020-0260-5 |
[1] |
Stark B, Stevenson B, Chen Y. ADS-B for small unmanned aerial systems:Case study and regulatory practices. In Proc. the 2013 International Conference on Unmanned Aircraft Systems, May 2013, pp.152-159.
|
[2] |
Sesso D B, Vismari L F, Camargo J B. An approach to assess the safety of ADS-B based unmanned aerial systems. In Proc. the 2014 International Conference on Unmanned Aircraft Systems, May 2014, pp.669-676.
|
[3] |
Lin Y, Saripalli S. Sense and avoid for unmanned aerial vehicles using ADS-B. In Proc. the IEEE International Conference on Robotics and Automation, May 2015, pp.6402-6407.
|
[4] |
Costin A, Francillon A. Ghost in the Air (Traffic):On insecurity of ADS-B protocol and practical attacks on ADS-B devices. In Proc. the 2012 Black Hat USA, July 2012.
|
[5] |
Strohmeier M, Lenders V, Martinovic I. On the security of the automatic dependent surveillance-broadcast protocol. IEEE Communications Surveys Tutorials, 2015, 17(2):1066-1087.
|
[6] |
Manesh M R, Kaabouch N. Analysis of vulnerabilities, attacks, countermeasures and overall risk of the automatic dependent surveillance-broadcast (ADS-B) system. International Journal of Critical Infrastructure Protection, 2017, 19:16-31.
|
[7] |
Manesh M R, Mullins M, Foerster K, Kaabouch N. A preliminary effort toward investigating the impacts of ADS-B message injection attack. In Proc. the 2018 IEEE Aerospace Conference, March 2018.
|
[8] |
Yang H M, Zhou Q X. Yao M X, Lu R X, Li H W, Zhang X S. A practical and compatible cryptographic solution to ADS-B security. IEEE Internet of Things Journal, 2019, 6(2):3322-3334.
|
[9] |
Yum D H, Kim J S, Hong S J, Lee P J. Distance bounding protocol with adjustable false acceptance rate. IEEE Communications Letters, 2011, 15(4):434-436.
|
[10] |
Languell Z P, Gu Q. Securing ADS-B with multi-point distance-bounding for UAV collision avoidance. In Proc. the 16th IEEE International Conference on Mobile Ad Hoc and Smart Systems, November 2019, pp.145-153.
|
[11] |
Abu-Mahfouz A, Hancke G P. Distance bounding:A practical security solution for real-time location systems. IEEE Transactions on Industrial Informatics, 2013, 9(1):16-27.
|
[12] |
Munilla J, Peinado A. Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels. Wirel. Commun. Mob. Comput., 2008, 8(9):1227-1232.
|
[13] |
Lee S, Kim J S, Hong S J, Kim J. Distance bounding with delayed responses. IEEE Communications Letters, 2012, 16(9):1478-1481.
|
[14] |
Entezari R, Bahramgiri H, Tajamolian M. A Mafia and distance fraud high-resistance RFID distance bounding protocol. In Proc. the 11th International Conference on Information Security and Cryptology, September 2014, pp.67-72.
|
[15] |
Mitrokotsa A, Dimitrakakis C, Peris-Lopez P, HernandezCastro J C. Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels. IEEE Communications Letters, 2010, 14(2):121-123.
|
[16] |
Hancke G P. Distance-bounding for RFID:Effectiveness of ‘terrorist fraud’ in the presence of bit errors. In Proc. the 2012 IEEE International Conference on RFIDTechnologies and Applications, November 2012, pp.91-96.
|
[17] |
Cremers C, Rasmussen K B, Schmidt B, Capkun S. Distance hijacking attacks on distance bounding protocols. In Proc. the IEEE Symposium on Security and Privacy, May 2012, pp.113-127.
|
[18] |
Kim Y S, Kim S H. RFID distance bounding protocol using m-ary challenges. In Proc. the 2011 International Conference on ICT Convergence, September 2011, pp.782-783.
|
[19] |
Schäfer M, Lenders V, Martinovic I. Experimental analysis of attacks on next generation air traffic communication. In Proc. the 11th International Conference Appl. Cryptography Netw. Security, June 2013, pp.253-271.
|
[20] |
Hancke G P, Kuhn M G. An RFID distance bounding protocol. In Proc. the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks, September 2005, pp.67-73.
|
[21] |
Bussard L, Bagga W. Distance-bounding proof of knowledge to avoid real-time attacks. In Proc. the 20th International Conference on Information Security, May 2005, pp.223-238.
|
[22] |
Gu Q, Michanowicz D, Jia C. Developing a modular unmanned aerial vehicle (UAV) platform for air pollution profiling. Sensors, 2018, 18(12):Article No. 4363.
|
[23] |
Rasmussen K B, Capkun S. Realization of RF distance bounding. In Proc. the 19th USENIX Conference on Security, August 2010, pp.389-402.
|
[1] | Einollah Pira. Using Markov Chain Based Estimation of Distribution Algorithm for Model-Based Safety Analysis of Graph Transformation[J]. Journal of Computer Science and Technology, 2021, 36(4): 839-855. DOI: 10.1007/s11390-020-1003-3 |
[2] | Qiaohong Li, Yu-Ming Fang, Jing-Tao Xu. A Novel Spatial Pooling Strategy for Image Quality Assessment[J]. Journal of Computer Science and Technology, 2016, 31(2): 225-234. DOI: 10.1007/s11390-016-1623-9 |
[3] | Peng Du, Jie-Yi Zhao, Wan-Bin Pan, Yi-Gang Wang. GPU Accelerated Real-time Collision Handling in Virtual Disassembly[J]. Journal of Computer Science and Technology, 2015, 30(3): 511-518. DOI: 10.1007/s11390-015-1541-2 |
[4] | Cinzia Bernardeschi, Luca Cassano, Andrea Domenici. SRAM-Based FPGA Systems for Safety-Critical Applications: A Survey on Design Standards and Proposed Methodologies[J]. Journal of Computer Science and Technology, 2015, 30(2): 373-390. DOI: 10.1007/s11390-015-1530-5 |
[5] | Gao-Li Wang. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD[J]. Journal of Computer Science and Technology, 2013, 28(1): 129-143. DOI: 10.1007/s11390-013-1317-5 |
[6] | Jie Liang, Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. Journal of Computer Science and Technology, 2007, 22(1): 79-87. |
[7] | Zheng Fang, Wu Wenhu, Fang Ditang. Center-Distance Continuous Probability Models and the Distance Measure[J]. Journal of Computer Science and Technology, 1998, 13(5): 426-437. |
[8] | Li Wei, Zhang Bo, Hilmar Jaschek. Real-Time Collision-Free Path Planning for Robots in Configuration Space[J]. Journal of Computer Science and Technology, 1994, 9(1): 37-52. |
[9] | Yan Yong. An Optimal Algorithm for Solving Collision Distance Between Convex Polygons in Plane[J]. Journal of Computer Science and Technology, 1993, 8(4): 81-87. |
[10] | Cai Zixing. Robotic Path Finding with Collision Avoidance Using Expert System[J]. Journal of Computer Science and Technology, 1989, 4(3): 229-235. |
1. | Qianyun Zhang, Zhendong Wang, Biyi Wu, et al. A Robust and Practical Solution to ADS-B Security Against Denial-of-Service Attacks. IEEE Internet of Things Journal, 2024, 11(8): 13647. DOI:10.1109/JIOT.2023.3337543 |
2. | Fan Li, Juan Luo, Ying Qiao, et al. Joint UAV Deployment and Task Offloading Scheme for Multi-UAV-Assisted Edge Computing. Drones, 2023, 7(5): 284. DOI:10.3390/drones7050284 |
3. | Neno Ruseno, Chung-Yan Lin, Shih-Cheng Chang. UAS Traffic Management Communications: The Legacy of ADS-B, New Establishment of Remote ID, or Leverage of ADS-B-Like Systems?. Drones, 2022, 6(3): 57. DOI:10.3390/drones6030057 |
4. | Kartikey Jaiswal, Anshu Vashisth. A Comprehensive Analysis of UAV Collision Avoidance Techniques for Enhanced Aerial Safety. 2023 4th International Conference on Computation, Automation and Knowledge Management (ICCAKM), DOI:10.1109/ICCAKM58659.2023.10449529 |