This work derives the authentication security of pseudorandom function (PRF) GNSS ranging under multiple GNSS spoofing models, including the Security Code Estimation and Replay (SCER) spoofer. When GNSS ranging codes derive from a PRF utilizing a secret known only to the broadcaster, the spoofer cannot predict the ranging code before broadcast. Therefore, PRF ranging can be used to establish trust in the GNSS pseudoranges and the resulting receiver position, navigation, and timing (PNT) solution. I apply the methods herein to Galileo's Signal Authentication Service (SAS) utilizing the encrypted Galileo E6-C signal to compute that, at most, 400 ms of Galileo E6-C data to assert 128-bit authentication security under non-SCER models. For the SCER adversary, I predict the adversary's needed receiving radio equipment to break authentication security. One can use this work to design a PRF GNSS ranging protocol to meet useful authentication security requirements by computing the probability of missed detection.
翻译:本研究推导了伪随机函数(PRF)GNSS测距在多种GNSS欺骗模型下的认证安全性,包括安全码估计与重放(SCER)欺骗器。当GNSS测距码源自仅由广播方知晓密钥的PRF时,欺骗器无法在广播前预测测距码。因此,PRF测距可用于建立对GNSS伪距及其产生的接收机定位、导航与授时(PNT)解的信任。本文将所述方法应用于伽利略信号认证服务(SAS),利用加密的伽利略E6-C信号进行计算,结果表明在非SCER模型下最多仅需400毫秒的伽利略E6-C数据即可实现128位认证安全强度。针对SCER攻击者,本研究预测了攻击者为破坏认证安全性所需的无线电接收设备配置。通过计算漏检概率,本研究成果可用于设计满足实际认证安全需求的PRF GNSS测距协议。