WO2015001483A1 - Method and apparatus for authenticating a satellite navigation signal using the signal of the galileo commercial service - Google Patents

Method and apparatus for authenticating a satellite navigation signal using the signal of the galileo commercial service Download PDF

Info

Publication number
WO2015001483A1
WO2015001483A1 PCT/IB2014/062766 IB2014062766W WO2015001483A1 WO 2015001483 A1 WO2015001483 A1 WO 2015001483A1 IB 2014062766 W IB2014062766 W IB 2014062766W WO 2015001483 A1 WO2015001483 A1 WO 2015001483A1
Authority
WO
WIPO (PCT)
Prior art keywords
satellite navigation
navigation signal
signal
unencrypted
encrypted
Prior art date
Application number
PCT/IB2014/062766
Other languages
English (en)
French (fr)
Inventor
Alessandro Pozzobon
Oscar POZZOBON
Carlo SARTO
Original Assignee
Qascom S.R.L.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qascom S.R.L. filed Critical Qascom S.R.L.
Publication of WO2015001483A1 publication Critical patent/WO2015001483A1/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service
    • G01S19/215Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service issues related to spoofing
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/32Multimode operation in a single same satellite system, e.g. GPS L1/L2

Definitions

  • the present invention concerns a system and a method for authenticating satellite navigation signals (GPS and Galileo), and particularly authentication techniques of the signal and relative checking of falsification.
  • GPS and Galileo satellite navigation signals
  • the invention uses the encrypted signal "commercial service" of the Galileo system to detect falsification attacks of the signal carried out on free signals.
  • GNSS Global Navigation Satellite Systems
  • LBAC location based access control
  • Theft and terrorism are typical scenarios for spoofing attacks towards applications like the monitoring of hazardous transportation or precious materials and synchronization of the time through GNSS.
  • the cost for carrying out a spoofing attack is no longer a deterrent since GNSS simulators can be rented at low cost, and they can be developed with low-cost hardware like "software defined radio” platforms.
  • the "receiver-spoofer” concept, a GNSS receiver connected to a GNSS transmitter, has been demonstrated on such platforms.
  • FIG. 1 Such a figure represents how a falsification signal attack, or spoofing attack can occur.
  • the satellites (101) for satellite global navigation (GNSS) generate the signal (102) that is transmitted from space to the receiver.
  • GNSS satellite global navigation
  • Such a signal is received by a receiver (103) and is processed in order to obtain the position, speed and time data (107).
  • a spoofing attack is carried out by another apparatus, called “spoofer" (106), which, through a single antenna (105), emits a signal which is replica and equivalent to all the signals transmitted by the satellites (104).
  • Such a signal if suitably calibrated in terms of power and synchronised with the signals of the satellites, can be used to falsify the position of the receiver as wished.
  • the first category of techniques comprises the use of inertial systems or the use of opportunity signals that, compared with the satellite navigation signal, makes it possible to check whether the two positions are coherent.
  • the Galileo Commercial Service was devised for services that foresee a payment for access to the signal.
  • the design foreseen for the CS foresees the development of counterfeiting-resistant receivers that can store the encryption keys used for accessing the signal.
  • Such a design becomes similar to the approach used in military receivers.
  • such an approach is very expensive, both in terms of hardware and in terms of cost of the service to distribute and load the encryption keys in the receivers.
  • the costs involved in such a process would make it difficult for such technology to enter the markets that require the authentication of the signal but at the same time minimum costs.
  • Such markets comprise, for example, motorway payments based on GNSS and payments by electronic commerce.
  • the system taught in such a document foresees to provide, on the same frequency, an encrypted service, in which the spread spectrum code is secret, and an unencrypted service synchronised with the previous one, through which portions of the secret spread spectrum code are transmitted together with their generation time; such sequences are then correlated with the encrypted signal.
  • the encrypted service is in quadrature phase with respect to the unencrypted signal.
  • SAS signal authentication sequences
  • the main object of the present invention is to improve the state of the art relative to systems and methods for authenticating an unencrypted satellite navigation signal.
  • Another object of the present invention is to provide a system for authenticating an unencrypted satellite navigation signal that has an alternative configuration with respect to the configurations of conventional apparatuses.
  • a further object of the present invention is to provide a method for authenticating an unencrypted satellite navigation signal that is an alternative to the conventional methods and easy to be implemented.
  • a method for authenticating an unencrypted satellite navigation signal according to the attached claim 1 is provided.
  • figure 1 illustrates, in general, how a spoofing attack of an unencrypted satellite navigation signal can occur
  • figure 2 shows a schematic representation of a system for authenticating an unencrypted satellite signal according to the present invention
  • figure 3 is a schematic representation of the main components of a first apparatus of the system according to the present invention
  • figure 4 illustrates the progression of the satellite navigation signals according to a first variant of the authentication method according to the present invention
  • figure 5 shows the progression of the satellite navigation signals according to a second variant of the authentication method according to the present invention
  • figure 6 is a block diagram of the method for authenticating a satellite navigation signal according to the present invention
  • figure 7 illustrates a functional block diagram of a second apparatus of the system according to the present invention.
  • the proposed authentication method requires the use of the Galileo Commercial Service (CS) or of other encrypted satellite navigation signals.
  • the Galileo CS is a value added service integrated in the Galileo satellite navigation system.
  • the signal is transmitted over the frequency E6 (1278.750 MHz), and it is a Binary Phase Shift Keying (BPSK) phase change signal in which data are transmitted through a spread spectrum of the signal at a chip frequency of 5Mhz.
  • E6A, E6B and E6C On the frequency E6 the combination of three channels is transmitted with a single signal: E6A, E6B and E6C.
  • Channel E6A is reserved for governmental signals, whereas channels E6B and E6C are dedicated to CS.
  • Channel E6B can transport data (so-called “satellite navigation messages” or “navigation messages”).
  • E1/L1 signals from various systems are transmitted, including GPS, Galileo, Glonass and Beidou, which contain unencrypted channels, like the channel GPS C/A and the channel Galileo E1 B.
  • signals transmitted over an unencrypted channel like GPS C/A or Galileo OS
  • an encrypted channel like Galileo E6B
  • the signal received by the receiver is the juxtaposition of signals transmitted over different channels.
  • each of such signals can sometimes be called “component” (for example, component of the signal received relative to the channel E1 B).
  • the signal foresees the support for the encryption of the spread spectrum code ("spreading" code), thus making the signal not- obtainable by anyone not in possession of the keys.
  • the content of the data transported in the signal of the CS had not been defined yet.
  • an innovative detail of the invention in object is that the authentication system is independent from the data that will be transported in the channel. This is possible since in order to authenticate the signal only the spread spectrum codes, also called Pseudo Random Numbers (PRN), are used, which in the case of the signal CS can be encrypted and thus cannot be determined without knowing the encryption keys.
  • PRN Pseudo Random Numbers
  • figure 2 represents (201) one or more satellite systems (GPS, Galileo, Glonass or Beidou) transmitting unencrypted signals (not encrypted) for civil use and at least 1 or 2 Galileo satellites that transmit the signal CS (channel E6B or E6C, or that signal which will be encrypted).
  • the signals that travel in space (202) have a different frequency, since the unencrypted signals like GPS Coarse Acquisition (C/A) and Galileo Open Service (OS) transmit in the frequency E1/L1 ( 575.42 MHz) whereas the signal of the Galileo CS travels in the frequency E6 (1278.750 MHz).
  • C/A GPS Coarse Acquisition
  • OS Galileo Open Service
  • Such signals are received by a first apparatus, called authentication apparatus (208) that uses two different antennae for receiving the two frequencies E6 and E1/L1 (203,204).
  • Such an apparatus processes the signals and transforms them into digital, thereby allowing the telematic transmission of processed data (205) to a second apparatus, preferably an authentication server (206).
  • the authentication server uses a standard GNSS reference receiver to extract the navigation messages of the signals in E1/L1 useful for determining the transmission time (207) described hereafter.
  • the transmission can take place with any digital data transportation means like wifi networks, internet networks or via cellular network.
  • the authentication apparatus (208) does not contain the decryption keys of the Galileo CS. It is thus impossible for the apparatus to decrypt the signal, carry out measurements or extract data.
  • the authentication apparatus (208) it is possible for the authentication apparatus (208) to decrypt and carry out time and distance measurements from the satellite for the unencrypted signals in the frequency E1/L1 , like for example the GPS C/A or Galileo OS service.
  • the signals of the Galileo CS and Galileo OS are taken as reference, they will be transmitted by the same satellite, but the spread spectrum codes will be synchronised at a single time reference, typically called system time.
  • the concept of synchronisation of the spread spectrum codes of the Galileo CS with the Galileo OS, or of synchronisation of the codes with times of other systems forms the basis of this invention.
  • the signals processed and the measurements made on the unencrypted channels by the authentication apparatus are transmitted to the authentication server that has the keys required for encoding the encrypted signal.
  • the invention is based on the concept that 2 spread— spectrum sequences transmitted over different frequencies by the same satellite must have a time correspondence, since they have been generated simultaneously by the same satellite at the same moment.
  • spread spectrum sequences generated by other satellites at a particular time for which it is possible to calculate the difference of the Galileo time (for example the difference of the GPS time from the Galileo time) must have time correspondence with the Galileo spread spectrum sequences, once the time difference between the different systems and the time difference given by the different positions of the satellites at the moment of transmission have been determined.
  • the concept of time correspondence includes all of the possible measurable delay contributions (like for example the Broadcast Group Delay relative to signals transmitted over different frequencies), not explained hereafter so as to keep the presentation brief.
  • the security of the system is based on the concept that while the unencrypted signals can be generated, and thus spoofed (spoofing), the encrypted signals cannot be regenerated since the keys for generating them are not available.
  • this invention we refer to the need to authenticate unencrypted signals using the encrypted signal of the Galileo CS, but other existing or future encrypted signals can be used, like for example the Galileo Public Regulated Service (PRS), should they be synchronised in a transmission phase and there is access to the decryption keys.
  • PRS Galileo Public Regulated Service
  • FIG 3 represents a block diagram of the high-level authentication apparatus (304).
  • Such an apparatus has the function of acquiring and synchronising the signals received, and transmitting them to the authentication server.
  • the signal of the frequency E1/L1 is received by a dedicated antenna (303) and is converted to a baseband frequency (305).
  • Such a signal is then digitized by an analogue digital converter (306) and is used by the digital processing block (307) to extract information necessary for the synchronisation and extraction of information on the reference time. Since it is a signal that contains unencrypted channels, the digital processing block is able to acquire the signal, to determine the start of the spread spectrum code for the unencrypted channels sought (for example E1 B), and to extract the data contained therein.
  • the processing block can also extract the system transmission time (TOW) and calculate the transmission time to the receiver (TO: moment of generation and transmission, by the satellite, of the spread spectrum code, referring to the time of the receiver) of such a specific satellite navigation message and use a synchronisation mechanism (308) to align the spread spectrum codes both of the digitized signal E6 (309) and of the digitized signal (for example E1B) in E1/L1 (306).
  • the digital data obtained by the processing block of the signal over the unencrypted channels are combined, compressed and made available for the transmission through a communication interface (310) like for example a USB, Ethernet or serial port.
  • FIG 4 represents the case of checking a Galileo Open Service signal transmitted in the frequency E1/L1 with a Galileo CS signal transmitted in the frequency E6.
  • TO and ⁇ are used to generate the reference code of the Galileo CS (channel B or C) at the precise moment (401).
  • the algorithm also needs the encryption keys of the signal.
  • the code of the Galileo CS generated (401) at time TO can thus be correlated with the signal E6 received at time Trx carrying out a cross-correlation, and a value above a certain threshold will determine that the code E6 is coherent with the code E1/L1 , checking the authenticity of the signal E1/L1. In the case of an inauthentic signal, in the time position Trx a code corresponding to the signal E6 received will not be generated.
  • figure 5 represents the same example of figure 4 but applied to the case of checking a non-Galileo signal (example GPS or Glonass) received in the frequency E1/L1 and of the signal of the Galileo CS received in the frequency E6.
  • a non-Galileo signal example GPS or Glonass
  • E1/L1 example GPS or Glonass
  • Trx time Trx
  • ⁇ and ⁇ are used to generate the reference code of the Galileo CS (channel B or C) at the precise moment (501).
  • the algorithm also needs of the encryption keys of the signal.
  • the code of the generated Galileo CS (501) can thus be correlated with the signal E6 received by carrying out a cross-correlation, and a value above a certain threshold will determine that the code E6 is coherent with the code E1/L1 , checking the authenticity of the signal E1/L1.
  • the authentication apparatus In the case of calculation of the transmission time to the receiver TO in the remote authentication server (right branch of the diagram of Figure 6), the authentication apparatus records the signals E6 and E1/L1 in a synchronised manner (612), using an internal clock. With this option the authentication apparatus must be able to obtain an approximate reception time of the signals ⁇ Trx.
  • a time ⁇ Trx can be inputted by the user, or derived from at least one external source (for example from an internal support clock, from GSM apparatuses, from Internet connection, etc).
  • Such a time and the signals are transmitted to the remote authentication server (613).
  • the authentication server continuously receives the bits that travel in space from at least one reference receiver (615), and extracts the bits (or navigation message) at the reference time ⁇ Trx (614).
  • Such bits contain the system time (Time of Week, TOW) and are aligned with the bits of the signal E1/L1 , in order to find the transmission time to the receiver TO (616).
  • the length of the signal E1/L1 (and therefore the number of bits present in it) must be evaluated accurately in order to reduce the collisions between bits in the case of signals that are too short.
  • figure 7 represents a functional block diagram of the authentication server (206).
  • the objective of the authentication server is to check the signals to determine the authenticity of the signal E1/L1.
  • Such a block receives the signals recorded and data from the authentication apparatus (701 and 714), and carries out the checking operations to search for the presence of a signal of the commercial service.
  • the system seeks the TO from the signal samples received by the remote authentication server or uses the TO calculated by the authentication apparatus.
  • a baseband reference signal (711) and the local replica of the PRN code of the signal E1/L1 to be searched for (710) are generated.
  • the search function of the transmission time of the code (709) carries out the acquisition and tracing operations of a determined PRN code on E1/L1 , extraction of the bits, and aligns the extracted bits with the bits received by the external GNSS reference receiver (715).
  • the bits of the external reference receiver also contain the system time (TOW) that is used as time reference.
  • the system can determine the transmission time TO of the signal E1/L1 , which is passed to the generation block of the local replica for the signal E6 (705).
  • the time ⁇ obtained by calculating the position of the satellites from the ephemeris of the system in question and the clock offset with respect to Galileo is also calculated.
  • the transmission time is provided by the authentication apparatus, it is directly supplied to the generation block of the encrypted code E6 (705).
  • the authentication motor receives the signals E6, and generates the replica of the baseband carrier of the signal (703).
  • the signal Since the signal is encrypted, it is necessary to generate the encrypted code at the correct moment as a local replica (705) to carry out the correlation with the signal received. This will be used to check whether the signal received is authentic.
  • the generation of the encrypted code takes place by accessing a security module (708) that contains the encryption keys necessary to regenerate the signal at a given time.
  • a checking block of the authentication (707) will carry out the correlation between the signals to check for the presence of peaks, and thus determine whether the signal E1/L1 , potentially falsifiable, was transmitted coherently with the signal E6, which is not falsifiable (707).
  • Thresholds that can be set via software both on the value of the peak and on the search window can determine the value for the decision whether the signal is authentic or not.
  • the checking block of the signal (707) has a true/false value as output.

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)
PCT/IB2014/062766 2013-07-01 2014-07-01 Method and apparatus for authenticating a satellite navigation signal using the signal of the galileo commercial service WO2015001483A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
ITVI2013A000169 2013-07-01
IT000169A ITVI20130169A1 (it) 2013-07-01 2013-07-01 Metodo ed apparato per l¿autenticazione di un segnale di navigazione satellitare usando il segnale del galileo commercial service

Publications (1)

Publication Number Publication Date
WO2015001483A1 true WO2015001483A1 (en) 2015-01-08

Family

ID=49035905

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2014/062766 WO2015001483A1 (en) 2013-07-01 2014-07-01 Method and apparatus for authenticating a satellite navigation signal using the signal of the galileo commercial service

Country Status (2)

Country Link
IT (1) ITVI20130169A1 (it)
WO (1) WO2015001483A1 (it)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106249257A (zh) * 2016-08-29 2016-12-21 北京华力创通科技股份有限公司 卫星定位信号的基带仿真系统及基带仿真信号生成方法
IT201700043174A1 (it) * 2017-04-20 2018-10-20 Etuitus S R L Metodo e sistema di certificazione di georeferenziazione per dispositivi mobili.
CN109581436A (zh) * 2017-09-28 2019-04-05 清华大学 相邻频点导航信号联合接收机和接收方法
CN110278715A (zh) * 2017-01-11 2019-09-24 欧盟委员会 用于无线电导航认证的方法和系统
CN111669219A (zh) * 2020-07-06 2020-09-15 成都卫士通信息产业股份有限公司 北斗短报文数据传输方法、装置、电子设备及计算机介质
EP4001968A1 (en) * 2020-11-20 2022-05-25 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for generating a verifiable data signal comprising a timestamp

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090195354A1 (en) 2008-02-02 2009-08-06 Peter Levin Authenticating a signal based on an unknown component thereof
EP2162865A2 (en) 2007-06-26 2010-03-17 Nxp B.V. Processing of satellite navigation system signals
EP2397868A1 (en) 2010-06-15 2011-12-21 The European Union, represented by the European Commission Method of providing an authenticable time-and-location indication
US20120121087A1 (en) 2009-03-13 2012-05-17 Cornell University Spoofing detection for civilian gnss signals
EP2680037A1 (en) * 2012-06-27 2014-01-01 Astrium Limited Authentication of satellite navigation signals

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2162865A2 (en) 2007-06-26 2010-03-17 Nxp B.V. Processing of satellite navigation system signals
US20090195354A1 (en) 2008-02-02 2009-08-06 Peter Levin Authenticating a signal based on an unknown component thereof
US20120121087A1 (en) 2009-03-13 2012-05-17 Cornell University Spoofing detection for civilian gnss signals
EP2397868A1 (en) 2010-06-15 2011-12-21 The European Union, represented by the European Commission Method of providing an authenticable time-and-location indication
EP2680037A1 (en) * 2012-06-27 2014-01-01 Astrium Limited Authentication of satellite navigation signals

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MARK L PSIAKI ET AL: "Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals", GNSS 2011 - PROCEEDINGS OF THE 24TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS 2011), THE INSTITUTE OF NAVIGATION, 8551 RIXLEW LANE SUITE 360 MANASSAS, VA 20109, USA, 23 September 2011 (2011-09-23), pages 2619, XP056000626 *
OSCAR POZZOBON ET AL: "Anti-spoofing and open GNSS signal authentication with signal authentication sequences", SATELLITE NAVIGATION TECHNOLOGIES AND EUROPEAN WORKSHOP ON GNSS SIGNALS AND SIGNAL PROCESSING (NAVITEC), 2010 5TH ESA WORKSHOP ON, IEEE, 8 December 2010 (2010-12-08), pages 1 - 6, XP031898934, ISBN: 978-1-4244-8740-0, DOI: 10.1109/NAVITEC.2010.5708065 *
OSCAR POZZOBON: "Anti-spoofing and open GNSS signal authentication with signal authentication sequences", SATELLITE NAVIGATION TECHNOLOGIES AND EUROPEAN WORKSHOP ON GNSS SIGNALS AND SIGNAL PROCESSING (NAVITEC), 2010 5TH ESA WORKSHOP ON, IEEE, 8 December 2010 (2010-12-08)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106249257A (zh) * 2016-08-29 2016-12-21 北京华力创通科技股份有限公司 卫星定位信号的基带仿真系统及基带仿真信号生成方法
CN106249257B (zh) * 2016-08-29 2019-03-19 北京华力创通科技股份有限公司 卫星定位信号的基带仿真系统及基带仿真信号生成方法
CN110278715A (zh) * 2017-01-11 2019-09-24 欧盟委员会 用于无线电导航认证的方法和系统
CN110278715B (zh) * 2017-01-11 2023-03-28 欧盟委员会 用于无线电导航认证的方法和系统
IT201700043174A1 (it) * 2017-04-20 2018-10-20 Etuitus S R L Metodo e sistema di certificazione di georeferenziazione per dispositivi mobili.
WO2018193487A1 (en) * 2017-04-20 2018-10-25 eTuitus S.r.l. Georeferencing certification method and system for mobile devices
US11320541B1 (en) 2017-04-20 2022-05-03 Etuitus Srl Georeferencing certification method and system for mobile devices
CN109581436A (zh) * 2017-09-28 2019-04-05 清华大学 相邻频点导航信号联合接收机和接收方法
CN111669219A (zh) * 2020-07-06 2020-09-15 成都卫士通信息产业股份有限公司 北斗短报文数据传输方法、装置、电子设备及计算机介质
CN111669219B (zh) * 2020-07-06 2022-04-12 成都卫士通信息产业股份有限公司 北斗短报文数据传输方法、装置、电子设备及计算机介质
EP4001968A1 (en) * 2020-11-20 2022-05-25 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for generating a verifiable data signal comprising a timestamp

Also Published As

Publication number Publication date
ITVI20130169A1 (it) 2015-01-02

Similar Documents

Publication Publication Date Title
KR102307770B1 (ko) 무선항법 인증을 위한 방법 및 시스템
WO2015001483A1 (en) Method and apparatus for authenticating a satellite navigation signal using the signal of the galileo commercial service
O'Hanlon et al. Real‐time GPS spoofing detection via correlation of encrypted signals
CN105227261B (zh) 向接收单元安全地提供复制伪随机噪声码
US10180500B2 (en) Signal processing
EP2867699B1 (en) Authentication of satellite navigation signals
US10908294B2 (en) Detection and elimination of GNSS spoofing signals with PVT solution estimation
CN105492926A (zh) 数字签名的卫星无线电导航信号
EP2770340A1 (en) Positioning by using encrypted GNSS navigation signals
Motallebighomi et al. Cryptography is not enough: Relay attacks on authenticated GNSS signals
US11585943B2 (en) Detection and elimination of GNSS spoofing signals with PVT solution estimation
Terris-Gallego et al. Operating modes and performance evaluation of Galileo assisted commercial authentication service
Motallebighomi et al. Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication
Pozzobon et al. Open GNSS signal authentication based on the Galileo Commercial Service (CS)
RU2663817C1 (ru) Способ активирования функций в радиоприемнике
EP3923032B1 (en) Method for detecting potential tampering with satellite navigation signals and/or for determining a position
Ahmad A Low Cost Mass-Market Deployable Security Approach Against GPS Spoofing Attacks
Motallebighomi et al. Location-independent GNSS Relay A acks: A Lazy A acker’s Guide to Bypassing Navigation Message Authentication
Kuismanen Vulnerability of Mobile Phones to Navigation Signal Spoofing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14752402

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14752402

Country of ref document: EP

Kind code of ref document: A1