SwePub
Sök i LIBRIS databas

  Utökad sökning

(WFRF:(Dai James Y.))
 

Sökning: (WFRF:(Dai James Y.)) > (2020-2024) > Safeguarding NMA en...

Safeguarding NMA enhanced Galileo os signals from distance-decreasing attacks

Zhang, Kewei (författare)
KTH,Nätverk och systemteknik,KTH Royal Institute of Technology, Sweden
Papadimitratos, Panos (författare)
RISE,SICS,KTH Royal Institute of Technology, Sweden
Papadimitratos, Panagiotis (författare)
KTH,Nätverk och systemteknik,RISE SICS
 (creator_code:org_t)
2019-10-11
2019
Engelska.
Ingår i: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. - Miami, Florida : Institute of Navigation. - 0936406232 - 9780936406237 ; , s. 4041-4052
  • Konferensbidrag (refereegranskat)
Abstract Ämnesord
Stäng  
  • Increased use of global satellite navigation systems (GNSS), for applications such as autonomous vehicles, intelligent transportation systems and drones, heightens security concerns. Civil GNSS signals are vulnerable to notably spoofing and replay attacks. To counter such attacks, cryptographic methods are developed: Navigation Message Authentication (NMA) is one such scheme, about to be deployed for Galileo E1 Open Service (OS); it allows receivers to verify the signal origin and protects navigation message integrity. However, NMA signals cannot fully thwart replay attacks, which do not require forging navigation messages. Classic replay attacks, e.g, meaconing, retransmit previously recorded signals without any modification, thus highly limiting the capacity of the adversary. Distance-decreasing (DD) attacks are a strong type of replay attack, allowing fine-grained individual pseudorange manipulation in real time. Moreover, DD attacks counterbalance processing and transmission delays induced by adversary, by virtue of shifting earlier in time the perceived (relayed) signal arrival; thus shortening the pseudorange measurements. In this paper, we first analyze how DD attacks can harm the Galileo E1 OSNMA service assuming the adversary has no prior information on the navigation message. Moreover,we propose a DD attack detection method based on a Goodness of Fit test on the prompt correlator outputs of the victim. The results show that the method can detect the DD attacks even when the receiver has locked to the DD signals.

Ämnesord

TEKNIK OCH TEKNOLOGIER  -- Elektroteknik och elektronik (hsv//swe)
ENGINEERING AND TECHNOLOGY  -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)

Nyckelord

Intelligent systems
Satellites
Signal receivers
Cryptographic methods
Global satellite navigation systems
Goodness-of-fit test
Intelligent transportation systems
Navigation messages
Prior information
Pseudorange measurements
Transmission delays
Global positioning system

Publikations- och innehållstyp

ref (ämneskategori)
kon (ämneskategori)

Hitta via bibliotek

Till lärosätets databas

Hitta mer i SwePub

Av författaren/redakt...
Zhang, Kewei
Papadimitratos, ...
Papadimitratos, ...
Om ämnet
TEKNIK OCH TEKNOLOGIER
TEKNIK OCH TEKNO ...
och Elektroteknik oc ...
Artiklar i publikationen
Proceedings of t ...
Av lärosätet
RISE
Kungliga Tekniska Högskolan

Sök utanför SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy