Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems

Abstract Automatic dependent surveillance broadcast (ADS-B) system is a multi-parameter surveillance system that can improve important aspects of air traffic. Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injecti...

Full description

Saved in:
Bibliographic Details
Main Author: Qihong Yu
Format: Article
Language:English
Published: Nature Portfolio 2025-07-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-05337-x
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Abstract Automatic dependent surveillance broadcast (ADS-B) system is a multi-parameter surveillance system that can improve important aspects of air traffic. Although ADS-B has adopted many security measures, it also faces some security risks such as eavesdropping, message deletion, message injection, and denial of service. Identity based signature is one of the important technologies in solving this problem. The paper proposes a hierarchical and identity-based signature algorithm which may resist the private key’s continual leakage. This proposed scheme not only has the performance of resisting private key leakage, but also has the performance of hierarchical delegation for the private key. Our scheme is proved to be fully secure under the standard model. The scheme can tolerate a leakage rate of nearly 1/3 for private keys. The proposed construction has three characteristics. Firstly, our scheme achieves full security under standard model, which means that its security is independent of the number of inquiries from the attacker. Secondly, this scheme has a delegation function, which may remarkably reduce the burden on the root private key generation center, making it very suitable for systems with limited computing resources and high real-time requirements. Thirdly, through periodic private key updates, our proposal will resist continual leakage attacks for private key, as long as the leakage between two consecutive key updates does not exceed the given limit.
ISSN:2045-2322