Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Safeguarding NMA enhanced Galileo os signals from distance-decreasing attacks
KTH Royal Institute of Technology, Sweden.
RISE - Research Institutes of Sweden, ICT, SICS. KTH Royal Institute of Technology, Sweden.
2019 (English)In: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019, Institute of Navigation , 2019, p. 4041-4052Conference paper, Published paper (Refereed)
Abstract [en]

Increased use of global satellite navigation systems (GNSS), for applications such as autonomous vehicles, intelligent transportation systems and drones, heightens security concerns. Civil GNSS signals are vulnerable to notably spoofing and replay attacks. To counter such attacks, cryptographic methods are developed: Navigation Message Authentication (NMA) is one such scheme, about to be deployed for Galileo E1 Open Service (OS); it allows receivers to verify the signal origin and protects navigation message integrity. However, NMA signals cannot fully thwart replay attacks, which do not require forging navigation messages. Classic replay attacks, e.g, meaconing, retransmit previously recorded signals without any modification, thus highly limiting the capacity of the adversary. Distance-decreasing (DD) attacks are a strong type of replay attack, allowing fine-grained individual pseudorange manipulation in real time. Moreover, DD attacks counterbalance processing and transmission delays induced by adversary, by virtue of shifting earlier in time the perceived (relayed) signal arrival; thus shortening the pseudorange measurements. In this paper, we first analyze how DD attacks can harm the Galileo E1 OSNMA service assuming the adversary has no prior information on the navigation message. Moreover,we propose a DD attack detection method based on a Goodness of Fit test on the prompt correlator outputs of the victim. The results show that the method can detect the DD attacks even when the receiver has locked to the DD signals.

Place, publisher, year, edition, pages
Institute of Navigation , 2019. p. 4041-4052
Keywords [en]
Intelligent systems, Satellites, Signal receivers, Cryptographic methods, Global satellite navigation systems, Goodness-of-fit test, Intelligent transportation systems, Navigation messages, Prior information, Pseudorange measurements, Transmission delays, Global positioning system
National Category
Natural Sciences
Identifiers
URN: urn:nbn:se:ri:diva-42094DOI: 10.33012/2019.17114Scopus ID: 2-s2.0-85075269802ISBN: 0936406232 (print)ISBN: 9780936406237 (print)OAI: oai:DiVA.org:ri-42094DiVA, id: diva2:1379208
Conference
32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019, 16 September 2019 through 20 September 2019
Note

Funding details: Stiftelsen för Strategisk Forskning, SSF; Funding text 1: This work has been partially supported by the Swedish Foundation for Strategic Research (SSF) SURPRISE project.

Available from: 2019-12-16 Created: 2019-12-16 Last updated: 2019-12-16Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus
By organisation
SICS
Natural Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 17 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf