Improved version of authentication scheme for GNSS signal using Raspberry Pi

The Global Navigation Satellite System (GNSS) is a constellation of satellites that provide positioning, navigation, and timing (PNT) services to a wide range of applications, including transportation, communication, and defense. However, the GNSS signals are vulnerable to various attacks, such as s...

Full description

Saved in:
Bibliographic Details
Main Author: Kho, Jane Shwu Tyng
Other Authors: Tan Soon Yim
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/167518
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:The Global Navigation Satellite System (GNSS) is a constellation of satellites that provide positioning, navigation, and timing (PNT) services to a wide range of applications, including transportation, communication, and defense. However, the GNSS signals are vulnerable to various attacks, such as spoofing, man-in-the-middle attack and jamming, which compromise the integrity and authenticity of the signals. This may result in detrimental damages and can be a catastrophe event for nation if a national attack occurs. To enhance the security of GNSS signals, typically Global Positioning System (GPS) signal, various authentication and encryption techniques have been proposed, including Chameleon Hashing. In this final year project, Chameleon Hashing, a certificateless cryptography and authentication scheme had implemented on Raspberry Pi to authenticate and encrypt GNSS signal, which is the GPS signal in this case. The Internet of things (IoT) device was able to identify between spoofed and genuine GPS signals. Typical implementation of Chameleon Hashing technique still exist the risk of man-in-the-middle (MITM) attacks. Therefore, in this final year project, the author addressed this issue by providing a time gap during the transmission of Hash-based Message Authentication Code (HMAC) and hash key. This is achieved by reducing the receiving subframes from actual 5 to 3 subframes, which provides 12 seconds extra for gapping the reference HMAC and hash key transmission.