期刊文献+

Anti-Spoofing:Integrated Information Authentication of BeiDou-ⅡCivil Navigation Message

下载PDF
导出
摘要 The BeiDou-Ⅱcivil navigation message(BDⅡ-CNAV)is transmitted in an open environment and no information integrity protection measures are provided.Hence,the BDⅡ-CNAV faces the threat of spoofing attacks,which can lead to wrong location reports and time indication.In order to deal with this threat,we proposed a scheme of anti-spoofing for BDⅡ-CNAV based on integrated information authentication.This scheme generates two type authentication information,one is authentication code information(ACI),which is applied to confirm the authenticity and reliability of satellite time information,and the other is signature information,which is used to authenticate the integrity of satellite location information and other information.Both authentication information is designed to embed into the reserved bits in BDⅡ-CNAV without changing the frame structure.In order to avoid authentication failure caused by public key error or key error,the key or public key prompt information(KPKPI)are designed to remind the receiver to update both keys in time.Experimental results indicate that the scheme can successfully detect spoofing attacks,and the authentication delay is less than 1%of the transmission delay,which meets the requirements of BDⅡ-CNAV information authentication.
出处 《China Communications》 SCIE CSCD 2024年第9期242-261,共20页 中国通信(英文版)
基金 supported in part by the National Key R&D Program of China(No.2022YFB3904503) National Natural Science Foundation of China(No.62172418)。
  • 相关文献

参考文献4

二级参考文献17

  • 1M Kuhn. An asymmetric security mechanism for navigation signals [ C ]. in Proc. of the 6th Int. Information Hiding Workshop. Springer, May 2004:239-252.
  • 2J Cathalo, B Libert, J J Quisquater. Cryptanalysis of a verifiably committed signature scheme based on GPS and RSA [ C ]. in: Proc. of Information Security Conference ( ISC' 04) , LNCS3225, pp. 52-60, Springer-Verlag, 2004.
  • 3Sherman C Lo, Per K Enge. Authenticating aviation augmentation system broadcasts [ J ]. Position Location and Navigation IEEE Symposium-PLANS, 2010:708 -717.
  • 4K Wesson, M Rothlisberger and T E Humphreys. Practical crypto- graphic civil GPS signal authentication[ J]. Navigation, Journal of the Institute of Navigation, 2012,59 ( 3 ) : 177-193.
  • 5Ali Jafarnia-Jahromi, Ali Broumandan, John Nielsen and G6rard Lachapelle, GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques [ J ]. International Journal of Navigation and Observation, May 2012.
  • 6D Shepard and T Hnmphrys. Characterization of Receiver Response to a Spoofing Attack [ C ]. ION GNSS' 11, p. 2608, Portland, Ore, USA, September 2011.
  • 7J AVolpe. Vulnerability Assessment of the Transportation Infra- structure Relying on the Global Positioning System[ R]. National Transportation Research Center, 2001.
  • 8E L Key. Techniques to Counter GPS Spoofing[ R]. Internal mem- orandum, MITRE Corporation, Feb. 1995.
  • 9L Scott. Anti-Spoofing and Authenticated Signal Architectures for Civil Navigation Systems [ C ]. ION GPS/GNSS' 03, Portland, Ore, USA, September 2003.
  • 10DurrelHankerson,AlfredMenezes,ScottVanstone,著,张焕国,译.椭圆曲线密码学导论(GuidetoEllipticCurveCryptogra-phy)[M].北京:电子工业出版社,2005:12-13.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部