2017
DOI: 10.1109/msp.2017.2715898
|View full text |Cite
|
Sign up to set email alerts
|

Signal Structure-Based Authentication for Civil GNSSs: Recent Solutions and Perspectives

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 73 publications
(57 citation statements)
references
References 16 publications
0
49
0
1
Order By: Relevance
“…However, this scheme requires the receiver to have loose time synchronization. Davide Margaria and Beatrice Motella [27] analyzed the feasibility of existing civil GNSS signal authentication schemes. By combining multiple spoofing methods, they proposed a more comprehensive encryption and authentication scheme for the next generation of civilian GNSS signals.…”
Section: Combined Authentication Methodsmentioning
confidence: 99%
“…However, this scheme requires the receiver to have loose time synchronization. Davide Margaria and Beatrice Motella [27] analyzed the feasibility of existing civil GNSS signal authentication schemes. By combining multiple spoofing methods, they proposed a more comprehensive encryption and authentication scheme for the next generation of civilian GNSS signals.…”
Section: Combined Authentication Methodsmentioning
confidence: 99%
“…Many kinds of spoofing attack exist: they differ in the level of complexity/cost of realization at the attacker side, and pose different levels of threat to the target receiver [ 30 ]. Amongst them, the most realistic spoofing attacks are those based on a single transmitting antenna, whereas the use of multiple transmitting antennas, typical of the so-called advanced or sophisticated spoofing, is regarded as a high cost, high complexity, and less common type of attack [ 30 ].…”
Section: Methods For Spoofing Detection and Direction Findingmentioning
confidence: 99%
“…Many kinds of spoofing attack exist: they differ in the level of complexity/cost of realization at the attacker side, and pose different levels of threat to the target receiver [ 30 ]. Amongst them, the most realistic spoofing attacks are those based on a single transmitting antenna, whereas the use of multiple transmitting antennas, typical of the so-called advanced or sophisticated spoofing, is regarded as a high cost, high complexity, and less common type of attack [ 30 ]. The realistic assumption of a single transmitting antenna at the attacker side and the availability of multiple antennas at the receiver side make possible a spoofing detection based on the estimation of the DoA of the received signal [ 25 , 31 , 32 ]: if the DoA is not compatible with the expected satellite positions, then the existence of a counterfeit transmission is detected.…”
Section: Methods For Spoofing Detection and Direction Findingmentioning
confidence: 99%
“…The two schemes retained are based on EC‐Schnorr digital signatures and TESLA . Both authentication schemes have been widely studied and proposed for GNSS as well as other radionavigation services . Other schemes based on different implementations and cryptographic protocols may be possible, but these schemes are representative enough for the feasibility and performance assessment.…”
Section: Sbas Message Authentication Schemes and Design Driversmentioning
confidence: 99%