Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241200183-7.doi: 10.11896/jsjkx.241200183

• Information Security • Previous Articles     Next Articles

Lightweight Aeronautical Broadband Communications System Security Authentication Protocol

CHEN Hongwei, YUE Meng   

  1. School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    National Natural Science Foundation of China(62172418),Natural Science Foundation of Tianjin China(21JCZDJC00830) and National Key R&D Program of China(2022YFB3904503).

Abstract: Currently,aeronautical communications system is facing the challenge of spectrum saturation and lack relevant security standards and defense measures,which makes aeronautical communications data vulnerable to illegal interception and tampering.To enhance the security of aeronautical communications system and optimize the efficiency of ground-to-air communications,a lightweight aeronautical broadband communications system security authentication protocol based on symmetric encryption has been proposed.This protocol aims to ensure that aircraft and ground gateway can mutually authenticate identities and securely transmit data.By relying on pre-shared root keys and message authentication code verification operations,the protocol has an average message overhead of 59 bytes,effectively circumventing the certificate management issues faced by existing aeronautical communications system with public key authentication schemes while maintaining its lightweight nature,and providing a robust network security barrier for the identity authentication process.Through formal modeling verification with the Scyther tool and system packet analysis testing,the protocol’s high efficiency and reliability in bandwidth-limited aeronautical communications environments have been confirmed.

Key words: Security authentication protocol, Aeronautical broadband communications system, Symmetric encryption, Key agreement, Cybersecurity

CLC Number: 

  • TP393
[1]新华社.今年我国民航旅客运输量有望创历史新高[EB/OL].(2024-12-04)[2024-12-24].https://www.gov.cn/lianbo/bumen/202408/content_6968117.htm.
[2]Airbus.Global Market Forecast 2024-2043[EB/OL].(2024-12-03)[2024-12-24].https://www.airbus.com/sites/g/files/jlcbta136/files/2024-07/GMF%202024-2043%20Presentation_4DTS.pdf.
[3]ZHU Y B,WANG Z P.LDACS development status and challenges [J].Acta Aeronautica et Astronautica Sinica,2024,45(6):029161.
[4]GRAUPL T,MÄURER N,SCHNELL M.LDACS A/G Specification[R].German Aerospace Center(DLR),SESAR2020 PJ14-W2-60 D3.1.230,2023.[Accessed 01/11/2023].
[5]MÄURER N,BILZHAUSE A.A Cybersecurity Architecturefor the L-band Digital Aeronautical Communications System(LDACS)[C]//2018 IEEE/AIAA 37th Digital Avionics Systems Conference(DASC).London,UK:IEEE,2018:1-10.
[6]MÄURER N,GRÄUPL T,GENTSCH C,et al.Comparing Different Diffie-Hellman Key Exchange Flavors for LDACS[C]//2020 AIAA/IEEE 39th Digital Avionics Systems Conference(DASC).San Antonio,TX,USA:IEEE,2020:1-10.
[7]MÄURER N,GENTSCH C,GRÄUPL T,et al.Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of LDACS[C]//2021the 18th SECRYPT.2021:603-610.
[8]EWERT T,MÄURER N,GRÄUPL T.Improving UsableLDACS Data Rate via Certificate Validity Optimization[C]//2022 Integrated Communication,Navigation and Surveillance Conference(ICNS).Dulles,VA,USA:IEEE,2022:1-9.
[9]MÄURER N,GRÄUPL T,SCHMITT C.Efficient Control-Channel Security for the Aeronautical Communications System LDACS[C]//2023 IEEE 24th International Symposium on a World of Wireless,Mobile and Multimedia Networks(WoWMoM).Boston,MA,USA:IEEE,2023:407-412.
[10]MÄURER N,GRÄUPL T,SCHMITT C,et al.PMAKE:Physical Unclonable Function-based Mutual Authentication Key Exchange Scheme for Digital Aeronautical Communications[C]//2021 IFIP/IEEE International Symposium on Integrated Network Management(IM).Bordeaux,France:IEEE,2021:206-214.
[11]KHAN S,GABA G S,GURTOV A,et al.Enhancing Cybersecurity for LDACS:a Secure and Lightweight Mutual Authentication and Key Agreement Protocol[C]//2023 IEEE/AIAA 42nd Digital Avionics Systems Conference(DASC).Barcelona,Spain:IEEE,2023:1-10.
[12]SANTANA-ANDREO A,SARAZA-CANFLANCA P,CAS-TRO-LOPEZ R,et al.Reliability improvement of SRAM PUFs based on a detailed experimental study into the stochastic effects of aging[J].AEU - International Journal of Electronics and Communications,2024,176:155147.
[13]KIM H.5G core network security issues and attack classification from network protocol perspective[J].Journal of Internet Services and Information Security,2020,10(2):1-15.
[1] LI Jiangxu, CHEN Zemao, ZHANG Liqiang. Lightweight Authentication and Key Agreement Protocol for Cloud-assisted Smart Home Communication [J]. Computer Science, 2025, 52(7): 342-352.
[2] ZHANG Jing, WANG Yuping. Dual-platform Key Agreement Protocol Based on Semidirect Product [J]. Computer Science, 2025, 52(6A): 240600036-6.
[3] WANG Xuxian, HUANG Jinhua, ZHAI You, LI Chu’nan, WANG Yu, ZHANG Yupeng, ZHANG Yipeng, YANG Liqun, LI Zhoujun. Survey of Detection Techniques for Domain Generation Algorithm [J]. Computer Science, 2024, 51(8): 371-378.
[4] TIAN Hao, WANG Chao. Design and Implementation of SNMPv3 Security Mechanism Based on National Security SM3 andSM4 Algorithms [J]. Computer Science, 2024, 51(6A): 230500209-7.
[5] LI Weixian, ZHANG Jianhui, ZENG Junjie, JIA Hongyong, MEN Ruirui. Zero Trust Anonymous Access Scheme Based on Software-defined Perimeters [J]. Computer Science, 2024, 51(12): 293-302.
[6] WANG Jing, ZHANG Miao, LIU Yang, LI Haoling, LI Haotian, WANG Bailing, WEI Yuliang. Study on Dual-security Knowledge Graph for Process Industrial Control [J]. Computer Science, 2023, 50(9): 68-74.
[7] CHEN Yufei, LI Saifei, ZHANG Lijie, ZHAO Yue. Implementation and Verification of Reinforcement Learning Strategy in Automated Red Teaming Testing [J]. Computer Science, 2023, 50(11A): 230200162-6.
[8] WANG Zichen, YUAN Chengsheng, WANG Yili, GUO Ping, FU Zhangjie. Lightweight Group Key Agreement for Industrial Internet of Things [J]. Computer Science, 2023, 50(11A): 230700075-10.
[9] XU Miaomiao, CHEN Zhenping. Incentive Mechanism for Continuous Crowd Sensing Based Symmetric Encryption and Double Truth Discovery [J]. Computer Science, 2023, 50(1): 294-301.
[10] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[11] LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362.
[12] WANG Jue, LU Bin, ZHU Yue-fei. Generation and Application of Adversarial Network Traffic:A Survey [J]. Computer Science, 2022, 49(11A): 211000039-11.
[13] ZHOU Shi-cheng, LIU Jing-ju, ZHONG Xiao-feng, LU Can-ju. Intelligent Penetration Testing Path Discovery Based on Deep Reinforcement Learning [J]. Computer Science, 2021, 48(7): 40-46.
[14] ZHENG Jia-tong, WU Wen-yuan. Practical Bi-deniable Encryption Scheme Based on MLWE [J]. Computer Science, 2021, 48(3): 307-312.
[15] LENG Feng, ZHANG Ming-kai, YAN Zhi-wei, ZHANG Cui-ling, ZENG Yu. Application of Chinese Cryptographic Algorithm in RPKI [J]. Computer Science, 2021, 48(11A): 678-681.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!