Implementation of authentication scheme for GNSS signal using Raspberry Pi

GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unp...

Full description

Saved in:
Bibliographic Details
Main Author: Shi, Wenpu
Other Authors: Tan Soon Yim
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/160992
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-160992
record_format dspace
spelling sg-ntu-dr.10356-1609922022-08-11T03:09:15Z Implementation of authentication scheme for GNSS signal using Raspberry Pi Shi, Wenpu Tan Soon Yim School of Electrical and Electronic Engineering ESYTAN@ntu.edu.sg Engineering::Electrical and electronic engineering GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unprotected. Ad- ditionally, the receiver needs to receive signals from multiple navigation satel- lites in different directions. The receiving antenna beam is very wide, almost like an omnidirectional antenna, which can receive radio signals from all di- rections around and regarded them all as GNSS signals. Combined with the power of the GNSS signal when it reaches the earth’s surface is extremely low, which makes spoofing the GNSS receiver quite simple. The GNSS spoofing is refers to the attacker send the fake GNSS signals to make the receiver generate wrong position, time, velocity solutions. Some non cryptography methods that detect the energy and Doppler consistency of the received signals to detecting the GNSS spoofing were proposed to protect the GNSS signals, however these methods would be inaccurate due to the environment influences. Yu Han Chu et. al had proposed a navigation message authentication scheme which used the unbounded chameleon hash keychain to provide protection to GNSS signals. In this system only the dedicated authentication server was allowed to created the new keys to extend the keychain which has an unique properties-unbound, and any clients could connected to this system after authenticating. The server will send the digital signature (HMACs) of each subframes of the navigation mes- sages along with the collision pair to clients after receive the client’s request. The clients will first use received the collision pair to authenticate whether the response is from the authentication server and then determine the authenticity of the received subframes by comparing their reference HMACs with the HMACs provided by the authentication server. The reason of the success rate of Yu Han’s authentication system model achieved by using Android phones is very low may be the authentication server is acted by phone which is unusable. Hence, this thesis is based on implementing this authentication system in an improved version by using the Raspberry PI, as a proof of concept to demonstrate the feasibility of this authentication scheme on IOT (internet of things) devices and increase the success rate. We have made sets of experiments on the open area, thus there are enough experiments data to prove that this authentication system could not only be stable connection but also correctly labeled the received signal in about practically 99.5% practised success rate. We also used the HACK-RF to to generate spoofed GPS signals to test the performance of the system, the result was exciting that reached prac- tically 100% detecting rate. Generally, this improved authentication system has been fully proven to have excellent anti-spoofing capabilities and can be widely used in most IOT devices. Additionally, in the future, more experiments will be done in different situations such as in the sheltered places (car park, shopping mall), and some bad weathers, to test the performance of this authentication system. Master of Science (Communications Engineering) 2022-08-11T03:09:10Z 2022-08-11T03:09:10Z 2022 Thesis-Master by Coursework Shi, W. (2022). Implementation of authentication scheme for GNSS signal using Raspberry Pi. Master's thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/160992 https://hdl.handle.net/10356/160992 en application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Electrical and electronic engineering
spellingShingle Engineering::Electrical and electronic engineering
Shi, Wenpu
Implementation of authentication scheme for GNSS signal using Raspberry Pi
description GNSS (Global Navigation Satellite System) could provide time synchronization and measurement of object position services.The GNSS receiver can calculate its current position through the navigation information transmitted by the satel- lite. However, all transmissions of civilian GNSS signals are unprotected. Ad- ditionally, the receiver needs to receive signals from multiple navigation satel- lites in different directions. The receiving antenna beam is very wide, almost like an omnidirectional antenna, which can receive radio signals from all di- rections around and regarded them all as GNSS signals. Combined with the power of the GNSS signal when it reaches the earth’s surface is extremely low, which makes spoofing the GNSS receiver quite simple. The GNSS spoofing is refers to the attacker send the fake GNSS signals to make the receiver generate wrong position, time, velocity solutions. Some non cryptography methods that detect the energy and Doppler consistency of the received signals to detecting the GNSS spoofing were proposed to protect the GNSS signals, however these methods would be inaccurate due to the environment influences. Yu Han Chu et. al had proposed a navigation message authentication scheme which used the unbounded chameleon hash keychain to provide protection to GNSS signals. In this system only the dedicated authentication server was allowed to created the new keys to extend the keychain which has an unique properties-unbound, and any clients could connected to this system after authenticating. The server will send the digital signature (HMACs) of each subframes of the navigation mes- sages along with the collision pair to clients after receive the client’s request. The clients will first use received the collision pair to authenticate whether the response is from the authentication server and then determine the authenticity of the received subframes by comparing their reference HMACs with the HMACs provided by the authentication server. The reason of the success rate of Yu Han’s authentication system model achieved by using Android phones is very low may be the authentication server is acted by phone which is unusable. Hence, this thesis is based on implementing this authentication system in an improved version by using the Raspberry PI, as a proof of concept to demonstrate the feasibility of this authentication scheme on IOT (internet of things) devices and increase the success rate. We have made sets of experiments on the open area, thus there are enough experiments data to prove that this authentication system could not only be stable connection but also correctly labeled the received signal in about practically 99.5% practised success rate. We also used the HACK-RF to to generate spoofed GPS signals to test the performance of the system, the result was exciting that reached prac- tically 100% detecting rate. Generally, this improved authentication system has been fully proven to have excellent anti-spoofing capabilities and can be widely used in most IOT devices. Additionally, in the future, more experiments will be done in different situations such as in the sheltered places (car park, shopping mall), and some bad weathers, to test the performance of this authentication system.
author2 Tan Soon Yim
author_facet Tan Soon Yim
Shi, Wenpu
format Thesis-Master by Coursework
author Shi, Wenpu
author_sort Shi, Wenpu
title Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_short Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_full Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_fullStr Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_full_unstemmed Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_sort implementation of authentication scheme for gnss signal using raspberry pi
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/160992
_version_ 1743119482768850944