Implementation of authentication scheme for GNSS signal using Raspberry Pi

GNSS spoofing refers to the malicious attempt by adversaries to trick GNSS receivers into generating incorrect position, velocity, and time (PVT) solutions. As a means of detecting spoofing attempts, Yu Han Chu et. al has proposed an authentication scheme that utilizes an unbounded keychain to prote...

全面介紹

Saved in:
書目詳細資料
主要作者: Neo, Zhen Ting
其他作者: Tan Soon Yim
格式: Final Year Project
語言:English
出版: Nanyang Technological University 2022
主題:
在線閱讀:https://hdl.handle.net/10356/157757
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
語言: English
實物特徵
總結:GNSS spoofing refers to the malicious attempt by adversaries to trick GNSS receivers into generating incorrect position, velocity, and time (PVT) solutions. As a means of detecting spoofing attempts, Yu Han Chu et. al has proposed an authentication scheme that utilizes an unbounded keychain to protect GPS navigation messages. The keychain is created using the chameleon hash construct, which allows an authentication server to have the exclusive ability to extend the keychain by creating new keys that are publicly verifiable by any clients wishing to participate in the authentication scheme. These keys are then used to protect each individual subframe in the navigation message to allow clients to determine the authenticity of subframes it receive by comparing their HMACs against the reference HMACs provided by the authentication server. This final year project focuses on implementing an improved version of this authentication scheme on a Raspberry Pi, as a proof of concept to demonstrate the feasibility of such an authentication scheme on devices with limited computing resources and less modern hardware. The developed prototype was then tested to show that it is able to correctly identify actual subframes broadcasted by genuine GPS satellites as authentic while also being able to detect spoofed subframes generated by a Hack-RF One as inauthentic.