作者: Zhijun Wu , Tong Shang , Anxin Guo
DOI: 10.1109/ACCESS.2020.3007182
关键词:
摘要: … ADS-B system in information leakage and tampering. Starting from the vulnerability of the ADS-B … solution does not fully protect the security of the ADS-B system. For example, the PKI (…