| 1] |
COSTIN A, FRANCILLON A. Ghost in the Air(Traffic): On Insecurity of ADS-B Protocol and Practical Attacks on ADS-B Devices[C]//Blackhat 2012, Las Vegas, N V, July 21-26, 2012: 1-10.
|
| [2] |
SCHAFER M, LENDERS V, MARTINOVIC I. Experimental Analysis of Attacks on Next Generation Air Traffic Communication[C]//Applied Cryptography and Network Security 2013. Nov 28 -Dec 1, 2013,LNCS7954: 253-271.
|
| [3] |
WESSON K D, HUMPHREYS T E, EVANS B L. Can Cryptography Secure Next Generation Air Traffic Surveillance?[EB/OL]. [2018-01-16].http://radionavlab.ae.utexas.edu/images/stories/files/papers/adsb_for_submission.pdf.
|
| [4] |
LEE S H, HAN J W, LEE D G. The ADS-B protection method for nextgeneration air traffic management system[J]. Lecture Notes in Electrical Engineering, 2015, 331: 105-113.
|
| [5] |
BAEK J, BYON Y, HABLEEL E, et al. Making air traffic surveillance more reliable: A new authentication framework for automatic dependent surveillance-broadcast (ADS-B) based on online/offline identity-based signature[J]. Security and Communication Networks, 2015, 8(5): 740-750.
|
| [6] |
LEE S H, LEE D G, CHOI B C, et al. Automatic Dependent Surveillance Data Protection Method for Air Traffic Management, and System for the Same: US, US20150212206[P]. 2015.
|
| [7] |
LI W, PAN K. Integrated Aviation Security for Defense-in-Depth of Next Generation Air Transportation System[C]//IEEE International Conference on Technologies for Homeland Security. IEEE, November 15-17, 2011: 136-142.
|
| [8] |
NUSEIBEH B, HALEY C B, FOSTER C. Securing the skies: In requirements we trust[J]. IEEE Computer Society, 2009, 42(9): 64-72.
|
| [9] |
BURBANK J, NICHOLS R, MUNJAL S, et al. Advanced Communications Networking Concepts for the National Airspace System[C]//IEEE Aerospace Conference. IEEE, March 5-12, 2005: 1905-1923.
|
| [10] |
KOVELL B, MELLISH B, NEWMAN T, et al. Comparative Analysis of ADS-B Verification Techniques[D]. Boulder: The University of Colorado,2012.
|
| [11] |
STROHMEIER M, LENDERS V, MARTINOVIC I. Intrusion Detection for Airborne Communication Using PHY-Layer Information [C]//12th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Milan, July 9-10, 2015: 67-77.
|
| [12] |
SCHAFER M, LENDERS V, SCHMITT J. Secure Track Verification[C]//2015 IEEE Sympsium on Security and Privacy(SP), San Jose, CA, USA,May 17-21, 2015: 199-213.
|
| [13] |
GHOSE N, LAZOS L. Verifying ADS-B Navigation Information Through Doppler Shift Measurements[C]//Digital Avionics Systems Conference.IEEE, September 13-17, 2015: 1-27.
|
| [14] |
SCHAFER M, LEU P, LENDERS V, et al. Secure Motion Verification Using the Doppler Effect[C]//9th ACM Conference on Security & Privacy in Wireless and Mobile Networks. ACM, July 18-20, 2016: 135-145.
|
| [15] |
BAUD O, HONORE N, TAUPIN O. Radar/ADS-B Data Fusion Architecture for Experimentation Purpose[C]//International Conference on Information Fusion. IEEE, July 10-13, 2006: 1-6.
|
| [16] |
龙易. ADS-B 导航抗欺骗性干扰技术研究[D]. 成都: 电子科技大学, 2015.
|
| [17] |
侯明正, 冯子亮, 潘卫军, 等. 一种检测ADS-B 虚假目标的方法: 中国, CN102323567A[P]. 2012.
|
| [18] |
张媛媛. ADS-B 地面站抗欺骗系统研究[J]. 科技创新与应用, 2016(18): 10-11.
|
| [19] |
王文益, 陈庚, 吴仁彪, 等. 基于十字阵列的ADS-B 欺骗式干扰抑制方法: 中国, CN104360323A[P]. 2015.
|
| [20] |
WANG WENYI, CHEN GENG, WU RENBIAO, et al. A Low-Complexity Spoofing Detection and Suppression Approach for ADS-B[C]//Integrated Communication, Navigation, and Surveillance Conference.IEEE, April 21-23, 2015: K2-1-K2-8.
|
| [21] |
RTCA. DO-260B, Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance-Broadcast(ADS-B) and Traffic Information Services-Broadcast (TIS-B)[S].Washington, DC: 2009.
|