Sökning: (WFRF:(Dai James Y.))
> (2020-2024) >
Safeguarding NMA en...
Safeguarding NMA enhanced Galileo os signals from distance-decreasing attacks
-
- Zhang, Kewei (författare)
- KTH,Nätverk och systemteknik,KTH Royal Institute of Technology, Sweden
-
- Papadimitratos, Panos (författare)
- RISE,SICS,KTH Royal Institute of Technology, Sweden
-
- Papadimitratos, Panagiotis (författare)
- KTH,Nätverk och systemteknik,RISE SICS
-
(creator_code:org_t)
- 2019-10-11
- 2019
- Engelska.
-
Ingår i: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. - Miami, Florida : Institute of Navigation. - 0936406232 - 9780936406237 ; , s. 4041-4052
- Relaterad länk:
-
http://kth.diva-port...
-
visa fler...
-
https://kth.diva-por... (primary) (Raw object)
-
https://urn.kb.se/re...
-
https://doi.org/10.3...
-
https://urn.kb.se/re...
-
visa färre...
Abstract
Ämnesord
Stäng
- Increased use of global satellite navigation systems (GNSS), for applications such as autonomous vehicles, intelligent transportation systems and drones, heightens security concerns. Civil GNSS signals are vulnerable to notably spoofing and replay attacks. To counter such attacks, cryptographic methods are developed: Navigation Message Authentication (NMA) is one such scheme, about to be deployed for Galileo E1 Open Service (OS); it allows receivers to verify the signal origin and protects navigation message integrity. However, NMA signals cannot fully thwart replay attacks, which do not require forging navigation messages. Classic replay attacks, e.g, meaconing, retransmit previously recorded signals without any modification, thus highly limiting the capacity of the adversary. Distance-decreasing (DD) attacks are a strong type of replay attack, allowing fine-grained individual pseudorange manipulation in real time. Moreover, DD attacks counterbalance processing and transmission delays induced by adversary, by virtue of shifting earlier in time the perceived (relayed) signal arrival; thus shortening the pseudorange measurements. In this paper, we first analyze how DD attacks can harm the Galileo E1 OSNMA service assuming the adversary has no prior information on the navigation message. Moreover,we propose a DD attack detection method based on a Goodness of Fit test on the prompt correlator outputs of the victim. The results show that the method can detect the DD attacks even when the receiver has locked to the DD signals.
Ämnesord
- TEKNIK OCH TEKNOLOGIER -- Elektroteknik och elektronik (hsv//swe)
- ENGINEERING AND TECHNOLOGY -- Electrical Engineering, Electronic Engineering, Information Engineering (hsv//eng)
Nyckelord
- Intelligent systems
- Satellites
- Signal receivers
- Cryptographic methods
- Global satellite navigation systems
- Goodness-of-fit test
- Intelligent transportation systems
- Navigation messages
- Prior information
- Pseudorange measurements
- Transmission delays
- Global positioning system
Publikations- och innehållstyp
- ref (ämneskategori)
- kon (ämneskategori)
Hitta via bibliotek
Till lärosätets databas