{"title":"Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication","authors":"N. Laurenti, A. Poltronieri","doi":"10.1109/ICL-GNSS49876.2020.9115423","DOIUrl":null,"url":null,"abstract":"Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality.This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, abstracting from the particular cryptographic mechanisms required to generate the sequences. We derive a way to optimize the trade-offs between security level and signal availability to receivers that do not know the modified code, and between security level and required cryptographic resources.We also propose a simpler mechanism that closely approaches the optimal trade-off, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.","PeriodicalId":123786,"journal":{"name":"2020 International Conference on Localization and GNSS (ICL-GNSS)","volume":"41 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Localization and GNSS (ICL-GNSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICL-GNSS49876.2020.9115423","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality.This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, abstracting from the particular cryptographic mechanisms required to generate the sequences. We derive a way to optimize the trade-offs between security level and signal availability to receivers that do not know the modified code, and between security level and required cryptographic resources.We also propose a simpler mechanism that closely approaches the optimal trade-off, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.