Global navigation satellite systems (GNSSs) are implementing security mechanisms: examples are Galileo open service navigation message authentication (OS-NMA) and GPS chips-message robust authentication (CHIMERA). Each of these mechanisms operates in a single band. However, nowadays, even commercial GNSS receivers typically compute the position, velocity, and time (PVT) solution using multiple constellations and signals from multiple bands at once, significantly improving both accuracy and availability. Hence, cross-authentication checks have been proposed, based on the PVT obtained from the mixture of authenticated and non-authenticated signals. In this paper, first, we formalize the models for the cross-authentication checks. Next, we describe, for each check, a spoofing attack to generate a fake signal leading the victim to a target PVT without notice. We analytically relate the degrees of the freedom of the attacker in manipulating the victim's solution to both the employed security checks and the number of open signals that can be tampered with by the attacker. We test the performance of the considered attack strategies on an experimental dataset. Lastly, we show the limits of the PVT-based GNSS cross-authentication checks, where both authenticated and non-authenticated signals are used.
翻译:摘要:全球导航卫星系统(GNSS)正在实施安全机制,例如Galileo开放服务导航消息认证(OS-NMA)和GPS芯片消息鲁棒认证(CHIMERA)。这些机制中的每一个都在单个频段内操作。然而,如今,即使是商用GNSS接收器也通常使用多个星座和多个频段的信号一起计算位置、速度和时间(PVT)解,显着提高了准确性和可用性。因此,基于从已认证和未认证信号混合获得的PVT的交叉认证检查已被提出。在本文中,首先,我们将交叉认证检查的模型形式化。接下来,我们描述了每个检查的欺骗攻击,通过生成虚假信号将受害者引向目标PVT而不会被察觉。我们从分析的角度将攻击者处理受害者解的自由度与所采用的安全检查以及攻击者可以调整的开放信号数目联系起来。我们在实验数据集上测试了所考虑的攻击策略的性能。最后,我们展示了采用已认证和未认证信号的PVT基础GNSS交叉认证检查的限制。