Receiver Protocol and Pitfalls of NMA and SCA Processing Under Spoofing Conditions for Future GNSS Signals Authentication

被引:2
|
作者
Arizabaleta, Markel [1 ]
Pany, Thomas [2 ]
Scuccato, Tommaso [3 ]
Dalla Chiara, Andrea [4 ]
O'Driscoll, Cillian [5 ]
Hanley, Neil [6 ]
机构
[1] Univ Bundeswehr Munchen, Munich, Germany
[2] Univ Bundeswehr Munchen, Space Syst Res Ctr FZ Space, Munich, Germany
[3] Qascom, Bassano Del Grappa, Italy
[4] Qascom, Simulat Tools Div, Bassano Del Grappa, Italy
[5] Cillian ODriscoll Consulting Ltd, Cork, Ireland
[6] Queens Univ Belfast, Ctr Secure Informat Technol CSIT, Belfast, Antrim, North Ireland
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.33012/2020.17716
中图分类号
TP7 [遥感技术];
学科分类号
081102 ; 0816 ; 081602 ; 083002 ; 1404 ;
摘要
The scope of the paper is to provide a generic receiver architecture that can cope with future Navigation Message Authentication (NMA) and Spreading Code Authentication (SCA) for the open service (OS) Global Navigation Satellite System (GNSS) signals. The authentication proposals can be divided in those that suggest the encryption of the navigation data, those that suggest encryption of the spreading code, and those that suggest combining both encryptions. However, on the receiver side, the mere implementation of such algorithms is not enough to identify a spoofing attack, and therefore, further receiver capabilities need to be considered when defining a GNSS signal authentication receiver architecture. The primary goal of the investigation is to define a receiver architecture capable of detecting spoofing attacks and to identify the possible pitfalls that affect the receiver performance. For this purpose, a new signal is defined to provide authentication capabilities to a mass-market receiver. The proposed receiver architecture is then used with the newly defined authentication signal to test the spoofing detection capabilities under different receiver conditions, and attack scenarios. The scope of the verifications is to identify the possible pitfalls that might wrongfully affect to the spoofing detection mechanism.
引用
收藏
页码:3766 / 3780
页数:15
相关论文
empty
未找到相关数据