PPP/PPP-RTK Message Authentication
نویسندگان
چکیده
Abstract This paper analyzes candidate schemes for PPP/PPP-RTK (precise point positioning/real-time kinematic) data authentication. Asymmetric are proposed based on existing standards and compatible with GNSS messages. Post-quantum cryptographic signatures also reviewed discussed. Two selected analysis: digital signature (DS) ECDSA, delayed disclosure (DD) a hybrid scheme using the TESLA protocol. Each of them is described in detail both Galileo high-accuracy service QZSS centimeter-level accuracy service. The performance terms time to receive corrections message increase age (ΔAOD) analyzed. analysis complemented by review CPU consumption at receiver level.
منابع مشابه
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on multiple (possibly different) messages, can be aggregated into a shorter tag that can still be verified by a recipient who shares a distinct key with each sender. We suggest aggregate MACs as an appropriate tool for au...
متن کاملApproximate Message Authentication and Biometric Entity Authentication
Approximate Message Authentication Code (AMAC) is a recently introduced cryptographic primitive with several applications in the areas of cryptography and coding theory. Briefly speaking, AMACs represent a way to provide data authentication that is tolerant to acceptable modifications of the original message. Although constructs had been proposed for this primitive, no security analysis or even...
متن کاملGroup Message Authentication
Group signatures is a powerful primitive with many practical applications, allowing a group of parties to share a signature functionality, while protecting the anonymity of the signer. However, despite intensive research in the past years, there is still no fully satisfactory implementation of group signatures in the plain model. The schemes proposed so far are either too inefficient to be used...
متن کاملMessage Authentication, Revisited
Traditionally, symmetric-key message authentication codes (MACs) are easily built from pseudorandom functions (PRFs). In this work we propose a wide variety of other approaches to building efficient MACs, without going through a PRF first. In particular, unlike deterministic PRF-based MACs, where each message has a unique valid tag, we give a number of probabilistic MAC constructions from vario...
متن کاملPractical Message Authentication Schemes
Use of encryption algorithms in message authentication is replaced by secure hash functions which are often faster than encryption algorithms. Tsudik 14] has proposed three methods on message authentication which are only based on one-way hash functions and use some keys to make them secure. In this paper, we give a set of practical methods, each of which uses a fast collision free hash functio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Navigation: journal of the Institute of Navigation
سال: 2023
ISSN: ['0028-1522', '2161-4296']
DOI: https://doi.org/10.33012/navi.579