Implementation of authentication scheme for GNSS signal using Raspberry Pi
GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unp...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/160992 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-160992 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1609922022-08-11T03:09:15Z Implementation of authentication scheme for GNSS signal using Raspberry Pi Shi, Wenpu Tan Soon Yim School of Electrical and Electronic Engineering ESYTAN@ntu.edu.sg Engineering::Electrical and electronic engineering GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unprotected. Ad- ditionally, the receiver needs to receive signals from multiple navigation satel- lites in different directions. The receiving antenna beam is very wide, almost like an omnidirectional antenna, which can receive radio signals from all di- rections around and regarded them all as GNSS signals. Combined with the power of the GNSS signal when it reaches the earth’s surface is extremely low, which makes spoofing the GNSS receiver quite simple. The GNSS spoofing is refers to the attacker send the fake GNSS signals to make the receiver generate wrong position, time, velocity solutions. Some non cryptography methods that detect the energy and Doppler consistency of the received signals to detecting the GNSS spoofing were proposed to protect the GNSS signals, however these methods would be inaccurate due to the environment influences. Yu Han Chu et. al had proposed a navigation message authentication scheme which used the unbounded chameleon hash keychain to provide protection to GNSS signals. In this system only the dedicated authentication server was allowed to created the new keys to extend the keychain which has an unique properties-unbound, and any clients could connected to this system after authenticating. The server will send the digital signature (HMACs) of each subframes of the navigation mes- sages along with the collision pair to clients after receive the client’s request. The clients will first use received the collision pair to authenticate whether the response is from the authentication server and then determine the authenticity of the received subframes by comparing their reference HMACs with the HMACs provided by the authentication server. The reason of the success rate of Yu Han’s authentication system model achieved by using Android phones is very low may be the authentication server is acted by phone which is unusable. Hence, this thesis is based on implementing this authentication system in an improved version by using the Raspberry PI, as a proof of concept to demonstrate the feasibility of this authentication scheme on IOT (internet of things) devices and increase the success rate. We have made sets of experiments on the open area, thus there are enough experiments data to prove that this authentication system could not only be stable connection but also correctly labeled the received signal in about practically 99.5% practised success rate. We also used the HACK-RF to to generate spoofed GPS signals to test the performance of the system, the result was exciting that reached prac- tically 100% detecting rate. Generally, this improved authentication system has been fully proven to have excellent anti-spoofing capabilities and can be widely used in most IOT devices. Additionally, in the future, more experiments will be done in different situations such as in the sheltered places (car park, shopping mall), and some bad weathers, to test the performance of this authentication system. Master of Science (Communications Engineering) 2022-08-11T03:09:10Z 2022-08-11T03:09:10Z 2022 Thesis-Master by Coursework Shi, W. (2022). Implementation of authentication scheme for GNSS signal using Raspberry Pi. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/160992 https://hdl.handle.net/10356/160992 en application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering |
spellingShingle |
Engineering::Electrical and electronic engineering Shi, Wenpu Implementation of authentication scheme for GNSS signal using Raspberry Pi |
description |
GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unprotected. Ad- ditionally, the receiver needs to receive signals from multiple navigation satel- lites in different directions. The receiving antenna beam is very wide, almost like an omnidirectional antenna, which can receive radio signals from all di- rections around and regarded them all as GNSS signals. Combined with the power of the GNSS signal when it reaches the earth’s surface is extremely low, which makes spoofing the GNSS receiver quite simple. The GNSS spoofing is refers to the attacker send the fake GNSS signals to make the receiver generate wrong position, time, velocity solutions. Some non cryptography methods that detect the energy and Doppler consistency of the received signals to detecting the GNSS spoofing were proposed to protect the GNSS signals, however these methods would be inaccurate due to the environment influences. Yu Han Chu et. al had proposed a navigation message authentication scheme which used the unbounded chameleon hash keychain to provide protection to GNSS signals. In this system only the dedicated authentication server was allowed to created the new keys to extend the keychain which has an unique properties-unbound, and any clients could connected to this system after authenticating. The server will send the digital signature (HMACs) of each subframes of the navigation mes- sages along with the collision pair to clients after receive the client’s request. The clients will first use received the collision pair to authenticate whether the response is from the authentication server and then determine the authenticity of the received subframes by comparing their reference HMACs with the HMACs provided by the authentication server.
The reason of the success rate of Yu Han’s authentication system model achieved by using Android phones is very low may be the authentication server is acted by phone which is unusable. Hence, this thesis is based on implementing this authentication system in an improved version by using the Raspberry PI, as a proof of concept to demonstrate the feasibility of this authentication scheme on IOT (internet of things) devices and increase the success rate. We have made sets of experiments on the open area, thus there are enough experiments data to prove that this authentication system could not only be stable connection but also correctly labeled the received signal in about practically 99.5% practised success rate. We also used the HACK-RF to to generate spoofed GPS signals to test the performance of the system, the result was exciting that reached prac- tically 100% detecting rate. Generally, this improved authentication system has been fully proven to have excellent anti-spoofing capabilities and can be widely used in most IOT devices. Additionally, in the future, more experiments will be done in different situations such as in the sheltered places (car park, shopping mall), and some bad weathers, to test the performance of this authentication system. |
author2 |
Tan Soon Yim |
author_facet |
Tan Soon Yim Shi, Wenpu |
format |
Thesis-Master by Coursework |
author |
Shi, Wenpu |
author_sort |
Shi, Wenpu |
title |
Implementation of authentication scheme for GNSS signal using Raspberry Pi |
title_short |
Implementation of authentication scheme for GNSS signal using Raspberry Pi |
title_full |
Implementation of authentication scheme for GNSS signal using Raspberry Pi |
title_fullStr |
Implementation of authentication scheme for GNSS signal using Raspberry Pi |
title_full_unstemmed |
Implementation of authentication scheme for GNSS signal using Raspberry Pi |
title_sort |
implementation of authentication scheme for gnss signal using raspberry pi |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/160992 |
_version_ |
1743119482768850944 |