Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems

欺骗攻击 计算机安全 计算机科学 认证(法律) 干扰 接收机自主完整性监测 全球定位系统 全球导航卫星系统应用 电信 物理 热力学
作者
Logan Scott
出处
期刊:Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS/GNSS 2003) 卷期号:: 1543-1552 被引量:172
链接
摘要

While jamming has been covered extensively in the technical literature, spoofing, a potentially much more damaging type of interference has received scant coverage. The much greater complexity associated with constructing such an attack has led many analysts to believe such an attack is unlikely. This situation is rapidly evolving as advances in computing power are altering the threat landscape to the point where soon, such an attack may be carried out by script kiddies' using software downloaded from the Internet. Such software, when combined with a relatively simple front-end design, can be used to launch highly effective attacks against civil components of satellite based navigation systems such as GPS & Galileo. Early on, military planners recognized the spoofing threat and sought to obtain protection against such attacks through the use of encrypted spreading codes. The technique is effective but current (L1 C/A) and planned (L2C & L5) GPS civil signal architectures offer no such protections. There are no explicit authentication mechanisms contained within the signal structure and instead, the civil community is left to rely on various consistency checks; for example Receiver Autonomous Integrity Monitoring (RAIM). While quite good at detecting a failed satellite, these techniques may fall short in detecting a spoofer. In this paper, we first examine the nature of spoofing vs. jamming and discuss how a spoofer might be constructed, at a very abstracted level. We also discuss who might carry out such an attack and conclude that terrorists are not the only ones; criminal enterprises stand to gain as well. Then, we discuss some of the antispoofing mechanisms available to the civil user segment within the context of current civil signal architectures. Both signals based and navigation based spoofing detection approaches are described. Although quite powerful, these techniques can fall short for a variety of reasons; either they are not implemented at all, the associated hardware requirements are too costly, or else a clever spoofer can get by them. We then go on to describe modified GPS signal structures incorporating explicit authentication features that maintain backwards compatibility with current signals. At its most basic level, these modifications force the spoofer to rely on live, over the air satellite signals to generate spoofing signals that will pass authentication tests. The attendant self-jamming issues make spoofing more difficult as it requires transmitting and receiving simultaneously on the victim signal's frequency. Introducing Public Key Infrastructure (PKI) authentication elements into the low rate (25 bps or 50 bps) data streams, we describe a mechanism whereby users can verify whether the data actually originated from a satellite. Extending the concept, we show how spread spectrum authentication components can be introduced into the WAAS L1 C/A, L5I & L2CM signals while maintaining backwards compatibility. These authenticating components, buried below thermal noise, are highly resistant to playback attacks and force the adversary to employ multiple, high gain receive antennas with upwards of 20-dBiC gain if he is to be successful. This is not easy. Finally, we describe how, with an extension to these signal modifications, an independent, civil version of SAASM might be supported to provide spoofing detection capabilities on order with those obtained by military users.

科研通智能强力驱动
Strongly Powered by AbleSci AI
更新
PDF的下载单位、IP信息已删除 (2025-6-4)

科研通是完全免费的文献互助平台,具备全网最快的应助速度,最高的求助完成率。 对每一个文献求助,科研通都将尽心尽力,给求助人一个满意的交代。
实时播报
1秒前
lxb完成签到,获得积分10
2秒前
悠悠发布了新的文献求助10
2秒前
5秒前
gao完成签到 ,获得积分10
5秒前
guoshuqi发布了新的文献求助10
5秒前
烟花应助Asheno采纳,获得10
7秒前
蘑菇发布了新的文献求助10
7秒前
Lisa完成签到,获得积分10
7秒前
布鲁斯李完成签到,获得积分20
8秒前
8秒前
浮游应助神勇的煎蛋采纳,获得10
8秒前
烟花应助欣喜的忆秋采纳,获得10
9秒前
10秒前
10秒前
可爱的函函应助Pendulium采纳,获得10
10秒前
夜安完成签到 ,获得积分10
10秒前
洁净的易巧完成签到,获得积分10
12秒前
省级中药饮片完成签到 ,获得积分10
13秒前
共享精神应助Arina采纳,获得10
14秒前
靓丽银耳汤关注了科研通微信公众号
14秒前
14秒前
小雒雒完成签到,获得积分20
15秒前
桐桐应助房天川采纳,获得10
15秒前
17秒前
量子星尘发布了新的文献求助10
17秒前
羊羊呀应助积极的蘑菇采纳,获得80
17秒前
无花果应助布鲁斯李采纳,获得10
18秒前
小二郎应助answer采纳,获得10
18秒前
赵永鹏完成签到,获得积分10
19秒前
qqwwe完成签到,获得积分10
20秒前
panbl451245发布了新的文献求助10
20秒前
领导范儿应助蘑菇采纳,获得10
21秒前
23秒前
子焱完成签到 ,获得积分10
23秒前
24秒前
24秒前
28秒前
32秒前
Ccccsa发布了新的文献求助10
32秒前
高分求助中
(应助此贴封号)【重要!!请各用户(尤其是新用户)详细阅读】【科研通的精品贴汇总】 10000
Iron toxicity and hematopoietic cell transplantation: do we understand why iron affects transplant outcome? 2000
Teacher Wellbeing: Noticing, Nurturing, Sustaining, and Flourishing in Schools 1200
List of 1,091 Public Pension Profiles by Region 1041
A Technologist’s Guide to Performing Sleep Studies 500
EEG in Childhood Epilepsy: Initial Presentation & Long-Term Follow-Up 500
Latent Class and Latent Transition Analysis: With Applications in the Social, Behavioral, and Health Sciences 500
热门求助领域 (近24小时)
化学 材料科学 医学 生物 工程类 有机化学 生物化学 物理 纳米技术 计算机科学 内科学 化学工程 复合材料 物理化学 基因 遗传学 催化作用 冶金 量子力学 光电子学
热门帖子
关注 科研通微信公众号,转发送积分 5490133
求助须知:如何正确求助?哪些是违规求助? 4588844
关于积分的说明 14421594
捐赠科研通 4520646
什么是DOI,文献DOI怎么找? 2476796
邀请新用户注册赠送积分活动 1462282
关于科研通互助平台的介绍 1435188