GPS Signal Authentication Using a Chameleon Hash Keychain
نویسندگان
چکیده
Global navigational satellite systems provide accurate time synchronization and location services. Satellites transmit navigation messages that can be used by a receiver to compute its location. However, most are not protected easily spoofed. Several attacks have been reported spoofed or replayed GPS signals divert hijack autonomous vehicles, ships drones. Unfortunately, non-cryptographic protection methods use antenna arrays, pseudorange differences multi-receivers detect spoofing tend inaccurate due environmental conditions. This chapter proposes an efficient signal authentication protocol engages dedicated server continuously hash-based message codes of received from satellites using the chameleon hash keychain. The keychain is practically unbounded, which enables receivers authenticate verify concurrently checking codes. A proof-of-concept prototype has developed demonstrate feasibility scheme. Experimental results key in updated every 30 seconds, enabling five subframes secured with different key. makes it difficult for attackers compromise
منابع مشابه
Cooperative GPS Signal Authentication from Unreliable Peers
Secure, reliable position and time information is indispensable for many civil GPS applications such as guiding aircraft, tracking freight, synchronizing power grids and cellular networks, and time-stamping financial transactions. This paper introduces a signal authentication architecture based on a network of cooperative receivers. A receiver in the network correlates its received military P(Y...
متن کاملGPS Signal and Position Authentication Final
The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. The authors acknowledge the United States Department of Homeland Security for supporting the work reported here through the National Center for Border Security and Immigration under grant number 2008-ST-061-BS0002. However, any opinions, findings,...
متن کاملSecure Location Verification - A Security Analysis of GPS Signal Authentication
The use of location based services has increased significantly over the last few years. However, location information is only sparsely used as a security mechanism. One of the reasons for this is the lack of location verification techniques with global coverage. Recently, a new method for authenticating signals from Global Navigation Satellite Systems(GNSS) such as GPS or Galileo has been propo...
متن کاملOne-Time Signatures and Chameleon Hash Functions
In this work we show a general construction for transforming any chameleon hash function to a strongly unforgeable one-time signature scheme. Combined with the result of [Bellare and Ristov, PKC 2007], this also implies a general construction of strongly unforgeable one-time signatures from Σ-protocols in the standard model. Our results explain and unify several works in the literature which ei...
متن کاملIdentity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chameleon signatures is that their are non-transferable, with only the designated recipient capable of asserting its validity. In this paper, we introduce the first identity-based chameleon hash function. The general advanta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IFIP advances in information and communication technology
سال: 2022
ISSN: ['1868-422X', '1868-4238']
DOI: https://doi.org/10.1007/978-3-030-93511-5_10