- Indoor and Outdoor Localization Technologies
- Cryptographic Implementations and Security
- Advanced Authentication Protocols Security
- GNSS positioning and interference
- Chaos-based Image/Signal Encryption
- Bluetooth and Wireless Communication Technologies
- Wireless Communication Security Techniques
- Wireless Communication Networks Research
- IPv6, Mobility, Handover, Networks, Security
- Advanced Frequency and Time Standards
- Mobile Agent-Based Network Management
- Satellite Communication Systems
- Advanced Wireless Communication Techniques
- Opportunistic and Delay-Tolerant Networks
- Wireless Signal Modulation Classification
- Maritime Navigation and Safety
- Network Time Synchronization Technologies
- IoT and Edge/Fog Computing
- Mobile and Web Applications
- Spacecraft Design and Technology
- Algorithms and Data Compression
- Atomic and Subatomic Physics Research
- Radar Systems and Signal Processing
- Maritime Security and History
- Security in Wireless Sensor Networks
European Space Research and Technology Centre
2021-2024
European Space Agency
2022
University of Padua
2016-2018
In the proposals for Global Navigation Satellite Systems (GNSS) Message Authentication (NMA) that are based on adapting Timed Efficient Stream Loss-Tolerant (TESLA) protocol, length of one-time keys is limited (e.g. to 80 bits) by low transmission rate. As a consequence, hash function used build one-way key chain constructed having longer, secure SHA-256), preceded time-varying yet deterministic padding input and followed truncation output. We evaluate impact this construction collision...
Radio frequency fingerprinting (RFF) methods are becoming more and popular in the context of identifying genuine transmitters distinguishing them from malicious or non-authorized transmitters, such as spoofers jammers. RFF approaches have been studied to a moderate-to-great extent non-GNSS WiFi, IoT, cellular but they not yet addressed much GNSS transmitters. In addition, few RFF-related works based on post-correlation navigation data no author has problem with pre-correlation data....
The threat of Global Navigation Satellite Systems (GNSS) signal spoofing has grown in recent years and motivated the research community to develop anti-spoofing techniques. Different approaches were developed, from those operating at digital processing level based on cryptography. This work focus class mechanisms that aims protecting GNSS by encrypting, completely or partially, ranging code. goal this approach is force attacker estimate secret chips rather than arbitrarily generate a known...
We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with single concentrator node. To this end, they are assisted by anchor that trusted and securely connected the In context, we providing message authentication scheme based on characteristics channel between nodes. According to approach, estimate in an initially externally authenticated fashion, while forthcoming comparing current initial estimate. Moreover, assuming have limited...
This paper focuses on Navigation Message Authentication (NMA) for GNSS, a message-level authentication capability that aims at providing assurance of authenticity and cryptographic integrity the navigation message. In designing NMA scheme, there is an inevitable trade-off among security, resources (e.g. bandwidth computational power), performance time to message error rate). Other requirements may come from channel dissemination (especially in harsh environments) complexity key management....
Today's smartphones widely exploit Global Navigation Satellite System (GNSS) as a positioning source, but the impact of spoofing attacks on these devices has never been extensively investigated. Resource constrained mobile phones are designed to provide position, velocity and time end user even in most challenging environments, where GNSS signal is hardly available first place. This approach pursues usability energy efficiency rather than security, thus leaving exposed potential...
In recent years, there has been an ever growing dependence on GNSS for applications in sectors ranging from telecommunications, energy transmission and distribution, to financial services transportation. As this increased, so too have risks of intentional interference or spoofing signals adversaries with the intent causing damage obtaining illegitimate advantage. The interest brought European Union develop its own system, Galileo, which recently became operational. signal generation is based...
Navigation Message Authentication (NMA) is a necessary security provision in GNSS open service, considering that more and infrastructures rely on civilian signals, several cryptographic mechanisms have been proposed to implement it. Most solutions adapt existing protocols the specific requirement constraints of scenario, which inherently one-way asymmetric, hence make use asymmetric cryptography. However, no similar proposal has yet made for key management services (distribution, upgrade,...
The number of applications relying on accurate positioning has been rapidly increasing over the recent years, demanding usage GNSS in challenging environments, like for example urbanized areas, where performance is typically degraded. Indeed, such receivers are prone to errors mainly due multipath and interference. When a receiver tracks signal affected by multipath, e.g., because it reflected close obstacles, erroneously estimates distance from transmitting satellite. This phenomena present...
Radio Frequency fingerprinting (RFF) methods are gaining popularity as physical-layer identification or authentication in various navigation and communication applications. Traditionally, RFF has been used terrestrial communications to identify the genuine transmitters from spoofers jammers. In recent literature, gained attention also context of satellite Low Earth Orbit (LEO) communications, though this research area is still an incipient phase. studies (or transceivers) typically hindered...
The GNSS community is dedicating significant effort to protect applications from harmful interference, including spoofing. As part of this effort, Europe will authenticate the Galileo Open Service message and currently evaluating authentication schemes for EGNOS. This article presents main results recent EU activities on EGNOS authentication. After presenting some examples that illustrate importance authenticating SBAS, describes drivers SBAS design, namely, use I and/or Q channels, L1 L5...
The main focus of Satellite-Based Augmentation Systems has been the provision integrity to GNSS signals. However, sensibility towards interference is growing within community, as it becomes day by more realistic, feasible and cheaper. purpose this paper present a framework for designing SBAS authentication innovative solutions. will initially outline threats be mitigated, with emphasis on those specific SBAS. work then signals signal components that could support authentication, its adequacy...
While a growing number of Internet Things (IoT) applications require reliable mechanisms to determine the precise location remote devices, aspects regarding security positioning algorithms should not be neglected. In this context, paper proposes physical-layer verification method for IoT networks in which concentrator node is assisted by several anchor nodes that are spread area interest. We design an optimization problem choose appropriately triggered process order minimize activation rate...
Satellite Based Augmentation Systems enhance GNSS by increasing accuracy and providing integrity [1]. In the next future, SBAS will evolve to accommodate new dual frequency multi constellation (DFMC) standard messages in two frequencies L1 L5 [2]. The falsification of information can be a concern for many users [3]: outages degrade service continuity general, spoofing lead receiver compute coherently false position time solution. This create risk users, including civil aviation other safety...
Global navigation satellite systems (GNSS) are widely used in many civil applications to get information on position, velocity and timing (PVT). However, current (such as global positioning system (GPS) Galileo) do not include any feature authenticate the received signal, therefore leaving open possibility from an attacker spoof GNSS signal induce a wrong PVT computation at receiver. In this paper we propose solution based superposition of authentication message (signature) artificial noise...
The GNSS signal received power lies below the thermal noise and a correlation with known spreading sequence is needed in order to recover it. use of for tracking vehicles or goods has incentivized malicious personal privacy devices (PPD) jammers disrupt service. Usually achieve denial service (DoS) by transmission high interfering signals, making it difficult victim receiver correctly track genuine signal. approach traditional jamming attack can be seen as brute-force: disrupts over certain...
The Chimera scheme was proposed in [1] for protecting the GPS L1C signal by inserting random markers at chip level spreading code. Rather than being uniformly distributed, markers' positions are set picking one pattern out of m=256 a predetermined, publicly known lookup table, possibly efficiency reasons. This work analyzes scheme, focusing on table to evaluate whether this structure affects security system. In particular, we compare it with an ideal uniform distribution terms their...
Recent proposals for open service GNSS signal authentication, including the GPS Chimera [1] protocol, rely on delayed release symmetric key cryptography. This allows receiver to determine that a signal, or navigation message, was authentic, provided has reliable, secure, but loose, time synchronization prior receiving signal. The requirement is must be certain not already been released at authentication information received. work [2] shown secure requires two-way transfer mechanism. In this...
The vulnerability of GNSS signals to malicious spoofing attacks is a topic that has been gathering increased attention in recent years, and number different approaches have proposed overcome this vulnerability. Some these are user side, such as Automatic Gain Control (AGC) monitoring, or the use an Inertial Measurement Unit (IMU), while others require modifications system, Navigation Message Authentication (NMA) Spreading Code Encryption (SCE). In work we introduce Nautilus, low-cost,...
A novel data authentication scheme for the satellite-based augmentation system (SBAS) called DS-Q is proposed and evaluated. The based on transmission of cryptographically secure digital signatures SBAS L1 L5 Q-channels, allowing user to verify authenticity messages I-channel without any latency impacting message timeouts, scheduling, or service performance. derived using a three-step top-down process that avoids taking available bandwidth signals as main driver scheme. As first step, twelve...
This paper presents for the first time full specification of Galileo Signal Authentication Service (SAS), formerly known as Assisted Commercial (ACAS). It includes a general description concept and detailed service, with focus on ground interfaces cryptographic operations, aim helping developers to test SAS receiving prototypes in view forthcoming early testing phase. The also summarizes some field lab results obtained so far outlines recommendations future receivers.