Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality. This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, and abstracting from the particular cryptographic mechanisms that are required to generate the sequences. We derive a way to optimize the trade-offs between the security level and the availability of the signal for receivers that do not know the modified code, and between the security level and the required cryptographic resources We also propose a simpler mechanism that closely approaches the optimal tradeoff, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.

Optimal Compromise among Security, Availability and Resources in the Design of Sequences for GNSS Spreading Code Authentication

Laurenti, Nicola
;
Poltronieri, Anna
2020

Abstract

Spreading code authentication has been proposed as a promising countermeasure against signal layer spoofing attacks to GNSS. It consists in replacing part of the spreading code with a secret, cryptographically generated sequence, that is also provided to legitimate receivers, allowing them to verify the signal authenticity and integrity. Different techniques and formats have been proposed, yet their formulation is typically given as a particular solution, lacking proper generality. This paper aims at providing a unified general model for the design, description, evaluation and comparison of such techniques, introducing simple performance and security metrics, and abstracting from the particular cryptographic mechanisms that are required to generate the sequences. We derive a way to optimize the trade-offs between the security level and the availability of the signal for receivers that do not know the modified code, and between the security level and the required cryptographic resources We also propose a simpler mechanism that closely approaches the optimal tradeoff, and show that it significantly outperforms existing and proposed techniques, especially in the typically considered performance range. Finally, we evaluate the robustness of the proposed schemes to a partial observation of the transmitted modified code by the attacker.
2020
2020 International Conference on Localization and GNSS (ICL-GNSS)
978-1-7281-6455-7
File in questo prodotto:
File Dimensione Formato  
articlePP.pdf

accesso aperto

Descrizione: Articolo in post-print
Tipologia: Preprint (submitted version)
Licenza: Accesso libero
Dimensione 310.91 kB
Formato Adobe PDF
310.91 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3342439
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 4
social impact