Secure transmission system for broadcast automatic monitoring information

A broadcast-type automatic and information security technology, applied in transmission systems, traffic control systems, aircraft traffic control, etc., can solve the problems of no resistance to active attacks, no fixed objects, mutual authentication, etc., and achieve effective management and effective security authentication , the effect of ensuring confidentiality

Inactive Publication Date: 2008-09-10
AVIATION DATA COMM +2
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current anonymous service security mechanism only hides part of the identity code in the broadcast information message of the user's aircraft. Not only the user's aircraft and the ground management department have no ability to resist the above-mentioned active attack, but the attacker can also analyze the identity code in the message. Other parts of the information (such as longitude and latitude position, altitude, speed, etc.) to grasp the real-time status of the user, causing huge security risks
In addition, although the communication system of ADS-B belongs to the wireless communication mode in a broad sense, the existing wireless communication network security mechanism is not suitable for ADS-B: ADS-B users here only refer to civil aviation airliners, although there are a large number of Generally, they only fly on fixed routes and stop at airports. The distribution of airports is fixe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission system for broadcast automatic monitoring information
  • Secure transmission system for broadcast automatic monitoring information
  • Secure transmission system for broadcast automatic monitoring information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] A reports the planned route at the beginning of the safety cycle, assuming it starts from S11, passes through S12, and ends at S21. Therefore, during this security period, A belongs to the user group managed by the starting point S11 and M1. User A's planned route is reported to the air traffic control center in the order of S11→M1→ATMC.

[0050] ATMC assigns a temporary identity A1 to A, and establishes a mapping from A1 to A; ATMC sends this mapping relationship to M1, M2; M1 sends it to S11, S12; M2 sends it to S21.

[0051] S11 generates a random number as the shared key K11, calculates the encryption factor N11=Y11(K11), and then sends {A1, K11} and N11 to A through a secret channel before taking off; and passes through S11→M1→S12 and S11 respectively The order of →M1→ATMC→M2→S21 sends {A1, K11} and N11 to the control area S12, S21 server that A's planned route will pass through.

[0052] S11 directly assigns the server identification code S11 and the public key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method for realizing secure transmission of an Automatic Dependent Surveillance Broadcast Information includes: (1) a three-level vertical management system is constructed according to the Aviation Management & Controlling Center, the flight information region and the control area subordinated to the flight information center; the lowest level is ADS-B user belonging to each control area, and the ADS-B user communicates with the control area server that ADS-B user belongs to by means of independent mutual certification mode; (2) at the beginning stage of the planning air line safety period, the Aviation Management & Controlling Center allots a temporary identity for the ADS-B user, establishes a mapping relationship from the temporary identity to a true identity and send the mapping relationship to the administration of the flight information region which the ADS-B user planning air line passes through; before the ADS-B user takes off, the administration of the control area that the ADS-B user belongs to secretly provides the ADS-B user with the temporary user identity and double factor symmetric-key in the server, and public key information of the server identification and the server message authentication code of the ground server near the planning air line. The invention can effectively resist a plurality of active attacks, realize security certification and ensure the safety of ADS-B information transmission.

Description

technical field [0001] The present invention relates to a broadcast automatic dependent surveillance (Automatic Dependent Surveillance-Broadcast, hereinafter referred to as: ADS-B) information security transmission system, in particular to a group management system of user characteristic information and an independent ADS-B broadcast communication system Two-way authentication mode, so as to ensure the safety of important information such as identity characteristics of ADS-B user aircraft during flight, belongs to the field of air traffic control. Background technique [0002] The fundamental purpose of air traffic control is to make the aircraft on the route safe, effective and planned to fly in the airspace, and the controller needs to monitor the flight dynamics of the aircraft in the controlled airspace in real time. [0003] The traditional radar surveillance technology uses an inquiry and response method to detect the target. In the long run, radar surveillance techno...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G08G5/00H04L29/06
Inventor 朱衍波张军张青竹刘伟林熙
Owner AVIATION DATA COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products