TY - JOUR
T1 - Detection of replay attacks to GNSS based on partial correlations and authentication data unpredictability
AU - Seco-Granados, Gonzalo
AU - Gómez-Casco, David
AU - López-Salcedo, José A.
AU - Fernández-Hernández, Ignacio
N1 - Publisher Copyright:
© 2021, Springer-Verlag GmbH Germany, part of Springer Nature.
PY - 2021/4
Y1 - 2021/4
N2 - Intentional interference, and in particular GNSS spoofing, is currently one of the most significant concerns of the positioning, navigation and timing community. With the adoption of Open Service Navigation Message Authentication (OSNMA) in Galileo, the E1B signal component will continuously broadcast unpredictable cryptographic data. This allows GNSS receivers not only to ensure the authenticity of data origin but also to detect replay spoofing attacks for receivers already tracking real signals with relatively good visibility conditions. Since the spoofer needs to estimate the unpredictable bits introduced by OSNMA with almost zero delay in order to pserform a Security Code Estimation and Replay (SCER) attack, the spoofer unavoidably introduces a slight distortion into the signal, which can be the basis of a spoofing detector. In this work, we propose five detectors based on partial correlations of GNSS signals obtained over predictable and unpredictable parts of the signals. We evaluate them in a wide set of test cases, including different types of receiver and spoofing conditions. The results show that one of the detectors is consistently superior to the others, and it is able to detect SCER attacks with a high probability even in favorable conditions for the spoofer. Finally, we discuss some practical considerations for implementing the proposed detector in receivers, in particular when the Galileo OSNMA message structure is used.
AB - Intentional interference, and in particular GNSS spoofing, is currently one of the most significant concerns of the positioning, navigation and timing community. With the adoption of Open Service Navigation Message Authentication (OSNMA) in Galileo, the E1B signal component will continuously broadcast unpredictable cryptographic data. This allows GNSS receivers not only to ensure the authenticity of data origin but also to detect replay spoofing attacks for receivers already tracking real signals with relatively good visibility conditions. Since the spoofer needs to estimate the unpredictable bits introduced by OSNMA with almost zero delay in order to pserform a Security Code Estimation and Replay (SCER) attack, the spoofer unavoidably introduces a slight distortion into the signal, which can be the basis of a spoofing detector. In this work, we propose five detectors based on partial correlations of GNSS signals obtained over predictable and unpredictable parts of the signals. We evaluate them in a wide set of test cases, including different types of receiver and spoofing conditions. The results show that one of the detectors is consistently superior to the others, and it is able to detect SCER attacks with a high probability even in favorable conditions for the spoofer. Finally, we discuss some practical considerations for implementing the proposed detector in receivers, in particular when the Galileo OSNMA message structure is used.
KW - Galileo
KW - GNSS
KW - Navigation message authentication
KW - Range protection
KW - Spoofing
KW - Symbol unpredictability
UR - http://www.scopus.com/inward/record.url?scp=85100146866&partnerID=8YFLogxK
U2 - 10.1007/s10291-020-01049-z
DO - 10.1007/s10291-020-01049-z
M3 - Article
AN - SCOPUS:85100146866
SN - 1080-5370
VL - 25
JO - GPS Solutions
JF - GPS Solutions
IS - 2
M1 - 33
ER -