Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure transmission system for broadcast automatic monitoring information

A broadcast automatic and information security technology, applied in transmission systems, traffic control systems, aircraft traffic control and other directions, can solve the problems of no resistance to active attacks, no fixed objects, mutual authentication, etc., and achieve effective management and effective security authentication. , the effect of ensuring confidentiality

Inactive Publication Date: 2009-12-16
AVIATION DATA COMM +2
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current anonymous service security mechanism only hides part of the identity code in the broadcast information message of the user's aircraft. Not only the user's aircraft and the ground management department have no ability to resist the above-mentioned active attack, but the attacker can also analyze the identity code in the message. Other parts of the information (such as longitude and latitude position, altitude, speed, etc.) to grasp the real-time status of the user, causing huge security risks
In addition, although the communication system of ADS-B belongs to the wireless communication mode in a broad sense, the existing wireless communication network security mechanism is not suitable for ADS-B: ADS-B users here only refer to civil aviation airliners, although there are a large number of Generally, they only fly on fixed routes and stop at airports. The distribution of airports is fixed. Often there is only one airport in a fairly wide area, and the aircraft, personnel, ground facilities, and management systems in the civil aviation field are all self-contained. These are very different from the common wireless communication user and base station distribution and management modes; moreover, ADS-B adopts a special information transmission mode, and the sending and receiving of monitoring information are independent of each other, and real-time monitoring is carried out in a specific airspace , Periodic broadcasting, no fixed object, these are different from the traditional end-to-end communication mode, and it is impossible to establish a connection by mutual authentication in the form of inquiry / response before formal communication. Therefore, countries around the world are currently promoting the application of ADS- Effective information security measures have not been taken in the process of B

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission system for broadcast automatic monitoring information
  • Secure transmission system for broadcast automatic monitoring information
  • Secure transmission system for broadcast automatic monitoring information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] A reports the planned route at the beginning of the safety cycle, assuming it starts from S11, passes through S12, and ends at S21. Therefore, during this security period, A belongs to the user group managed by the starting point S11 and M1. User A's planned route is reported to the air traffic control center in the order of S11→M1→ATMC.

[0050] ATMC assigns a temporary identity A1 to A, and establishes a mapping from A1 to A; ATMC sends this mapping relationship to M1, M2; M1 sends it to S11, S12; M2 sends it to S21.

[0051] S11 generates a random number as the shared key K11, calculates the encryption factor N11=y11(K11), and then sends {A1, K11} and N11 to A through a secret channel before taking off; and passes through S11→M1→S12 and S11 respectively The order of →M1→ATMC→M2→S21 sends {A1, K11} and N11 to the control area S12, S21 server that A's planned route will pass through.

[0052] S11 directly assigns the server identification code S11 and the public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Implementation method of ADS-B information security transmission: (1) Construct a three-level vertical management system according to the air traffic control center, flight information region, and the control area to which the flight information center belongs. The lowest layer is the ADS- User B, ADS-B users and their control area servers communicate with each other using an independent two-way authentication mode; (2) ADS-B users are at the beginning of the planned route safety period, and the air traffic control center assigns a temporary ADS-B user to the ADS-B user Identity, and establish a mapping relationship from temporary identity to real identity, and send the mapping relationship to the management department of the flight information region that the ADS-B user plans to pass through; before the ADS-B user takes off, the management department of the control area will The user's temporary identity in the server, the two-factor symmetric key, and the server identification code of the ground server near the user's planned route and the public key information of the server message authentication code are secretly distributed to the ADS-B user. The invention can effectively resist various active attacks, realize safety authentication, and ensure the safety of ADS-B information transmission.

Description

technical field [0001] The present invention relates to a broadcast automatic dependent surveillance (Automatic Dependent Surveillance-Broadcast, hereinafter referred to as: ADS-B) information security transmission system, in particular to a group management system of user characteristic information and an independent ADS-B broadcast communication system Two-way authentication mode, so as to ensure the safety of important information such as identity characteristics of ADS-B user aircraft during flight, belongs to the field of air traffic control. Background technique [0002] The fundamental purpose of air traffic control is to make the aircraft on the route safe, effective and planned to fly in the airspace, and the controller needs to monitor the flight dynamics of the aircraft in the controlled airspace in real time. [0003] The traditional radar surveillance technology uses an inquiry and response method to detect the target. In the long run, radar surveillance techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G08G5/00H04L29/06
Inventor 朱衍波张军张青竹刘伟林熙
Owner AVIATION DATA COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products