As our societies have come to increasingly rely on global navigation satellite systems (GNSS) for many critical tasks and the control of crucial infrastructures, so have increased the incentives to attack them for financial, or political motives. Two kinds of threats are particularly relevant to the GNSS context: jamming, carried out at the physical layer and aiming at denying the service to receivers in a given area, and spoofing, that aims to induce the receiver into computing a false position, velocity or time, by forging or illegitimately modifying the GNSS signal either at the data/message level or at the code/signal level. In this chapter we review the several countermeasures that have been devised, especially against the spoofing threat, both at the data and signal level, and discuss their effectiveness in relationship to the context and the possible side information available to the attacker and receiver. Eventually, we propose novel models for the analysis and design of partial spreading code encryption and for the integration of side information coming from other sensors into the integrity verification for the computed GNSS trajectory.

Secure positioning and navigation with GNSS

Nicola Laurenti
;
Silvia Ceccato
2019

Abstract

As our societies have come to increasingly rely on global navigation satellite systems (GNSS) for many critical tasks and the control of crucial infrastructures, so have increased the incentives to attack them for financial, or political motives. Two kinds of threats are particularly relevant to the GNSS context: jamming, carried out at the physical layer and aiming at denying the service to receivers in a given area, and spoofing, that aims to induce the receiver into computing a false position, velocity or time, by forging or illegitimately modifying the GNSS signal either at the data/message level or at the code/signal level. In this chapter we review the several countermeasures that have been devised, especially against the spoofing threat, both at the data and signal level, and discuss their effectiveness in relationship to the context and the possible side information available to the attacker and receiver. Eventually, we propose novel models for the analysis and design of partial spreading code encryption and for the integration of side information coming from other sensors into the integrity verification for the computed GNSS trajectory.
2019
Security within CONASENSE Paragon
9788770220927
9788770220910
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11577/3342232
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
  • OpenAlex ND
social impact