Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication

N. Laurenti, A. Poltronieri
{"title":"Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication","authors":"N. Laurenti, A. Poltronieri","doi":"10.1109/ICL-GNSS49876.2020.9115423","DOIUrl":null,"url":null,"abstract":"Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality.This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, abstracting from the particular cryptographic mechanisms required to generate the sequences. We derive a way to optimize the trade-offs between security level and signal availability to receivers that do not know the modified code, and between security level and required cryptographic resources.We also propose a simpler mechanism that closely approaches the optimal trade-off, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.","PeriodicalId":123786,"journal":{"name":"2020 International Conference on Localization and GNSS (ICL-GNSS)","volume":"41 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Localization and GNSS (ICL-GNSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICL-GNSS49876.2020.9115423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality.This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, abstracting from the particular cryptographic mechanisms required to generate the sequences. We derive a way to optimize the trade-offs between security level and signal availability to receivers that do not know the modified code, and between security level and required cryptographic resources.We also propose a simpler mechanism that closely approaches the optimal trade-off, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.
GNSS扩频码认证序列设计中安全性、可用性和资源的最优折衷
扩频码认证是一种很有前途的对抗GNSS信号层欺骗攻击的方法。它包括用一个秘密的、加密生成的序列替换部分传播代码,该序列也提供给合法的接收者,允许他们验证信号的真实性和完整性。已经提出了不同的技术和格式,但它们的表述通常是作为一个特定的解决方案给出的,缺乏适当的普遍性。本文旨在为这些技术的设计、描述、评估和比较提供一个统一的通用模型,引入简单的性能和安全指标,从生成序列所需的特定加密机制中抽象出来。我们推导了一种方法来优化安全级别和不知道修改代码的接收器的信号可用性之间的权衡,以及安全级别和所需加密资源之间的权衡。我们还提出了一种更简单的机制,它接近最优权衡,并表明它明显优于现有和提出的技术,特别是在通常考虑的性能范围内。最后,我们评估了所提出方案对攻击者对传输的修改码的部分观察的鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信