GPS Signal Authentication Using a Chameleon Hash Keychain

نویسندگان

چکیده

Global navigational satellite systems provide accurate time synchronization and location services. Satellites transmit navigation messages that can be used by a receiver to compute its location. However, most are not protected easily spoofed. Several attacks have been reported spoofed or replayed GPS signals divert hijack autonomous vehicles, ships drones. Unfortunately, non-cryptographic protection methods use antenna arrays, pseudorange differences multi-receivers detect spoofing tend inaccurate due environmental conditions. This chapter proposes an efficient signal authentication protocol engages dedicated server continuously hash-based message codes of received from satellites using the chameleon hash keychain. The keychain is practically unbounded, which enables receivers authenticate verify concurrently checking codes. A proof-of-concept prototype has developed demonstrate feasibility scheme. Experimental results key in updated every 30 seconds, enabling five subframes secured with different key. makes it difficult for attackers compromise

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cooperative GPS Signal Authentication from Unreliable Peers

Secure, reliable position and time information is indispensable for many civil GPS applications such as guiding aircraft, tracking freight, synchronizing power grids and cellular networks, and time-stamping financial transactions. This paper introduces a signal authentication architecture based on a network of cooperative receivers. A receiver in the network correlates its received military P(Y...

متن کامل

GPS Signal and Position Authentication Final

The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. The authors acknowledge the United States Department of Homeland Security for supporting the work reported here through the National Center for Border Security and Immigration under grant number 2008-ST-061-BS0002. However, any opinions, findings,...

متن کامل

Secure Location Verification - A Security Analysis of GPS Signal Authentication

The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this is the lack of location verification techniques with global coverage. Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been propo...

متن کامل

One-Time Signatures and Chameleon Hash Functions

In this work we show a general construction for transforming any chameleon hash function to a strongly unforgeable one-time signature scheme. Combined with the result of [Bellare and Ristov, PKC 2007], this also implies a general construction of strongly unforgeable one-time signatures from Σ-protocols in the standard model. Our results explain and unify several works in the literature which ei...

متن کامل

Identity-Based Chameleon Hash and Applications

Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IFIP advances in information and communication technology

سال: 2022

ISSN: ['1868-422X', '1868-4238']

DOI: https://doi.org/10.1007/978-3-030-93511-5_10