Advances of SBAS authentication technologies
Abstract Satellite Based Augmentation System (SBAS) provides the corrections and integrity information to users, but as its signal format is opened to the public and Global Navigation Satellite System (GNSS) spoofing technology becomes more realistic, more feasible and cheaper. It's foreseeable...
Main Authors: | , , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2021-06-01
|
Series: | Satellite Navigation |
Subjects: | |
Online Access: | https://doi.org/10.1186/s43020-021-00043-1 |
_version_ | 1818956806038224896 |
---|---|
author | Ying Chen Weiguang Gao Xiao Chen Ting Liu Cheng Liu Chengeng Su Jun Lu Wei Wang Shenglin Mu |
author_facet | Ying Chen Weiguang Gao Xiao Chen Ting Liu Cheng Liu Chengeng Su Jun Lu Wei Wang Shenglin Mu |
author_sort | Ying Chen |
collection | DOAJ |
description | Abstract Satellite Based Augmentation System (SBAS) provides the corrections and integrity information to users, but as its signal format is opened to the public and Global Navigation Satellite System (GNSS) spoofing technology becomes more realistic, more feasible and cheaper. It's foreseeable that there will be risks of spoofing threats against SBAS in the future. SBAS signal authentication technology provides a system-level solution to spoofing threats by adding special markers to SBAS signals so that receivers can verify whether the SBAS signals are from the on-orbit Geostationary Earth Orbit (GEO) satellites or whether the signal information has been forged and tampered with. First, this article introduces the existing anti-spoofing methods that can be applied to SBAS, especially the Elliptic Curve Digital Signature Algorithm (ECDSA) and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocols. Then it discusses four possible solutions in a combination with the existing SBAS Interface Control Document (ICD). Two main Key Performance Indicators (KPIs), Time Between Authentication (TBA) and Authentication Latency (AL), obtained in the four main scenarios are compared. By analyzing the EGNOS Authentication Security Testbed (EAST) test simulation results of European Geostationary Navigation Overlay Service (EGNOS) in Europe, the impact of SBAS after joining the authentication service is obtained. |
first_indexed | 2024-12-20T10:59:48Z |
format | Article |
id | doaj.art-c76a8138470148d49ce83944c52a489e |
institution | Directory Open Access Journal |
issn | 2662-1363 |
language | English |
last_indexed | 2024-12-20T10:59:48Z |
publishDate | 2021-06-01 |
publisher | SpringerOpen |
record_format | Article |
series | Satellite Navigation |
spelling | doaj.art-c76a8138470148d49ce83944c52a489e2022-12-21T19:43:03ZengSpringerOpenSatellite Navigation2662-13632021-06-01211710.1186/s43020-021-00043-1Advances of SBAS authentication technologiesYing Chen0Weiguang Gao1Xiao Chen2Ting Liu3Cheng Liu4Chengeng Su5Jun Lu6Wei Wang7Shenglin Mu8Beijing Institute of Tracking and Telecommunication TechnologyBeihang UniversityAerospace Information Research Institute, Chinese Academy of SciencesAerospace Information Research Institute, Chinese Academy of SciencesBeijing Institute of Tracking and Telecommunication TechnologyBeijing Institute of Tracking and Telecommunication TechnologyBeijing Institute of Tracking and Telecommunication TechnologyBeijing Institute of Tracking and Telecommunication TechnologyAerospace Information Research Institute, Chinese Academy of SciencesAbstract Satellite Based Augmentation System (SBAS) provides the corrections and integrity information to users, but as its signal format is opened to the public and Global Navigation Satellite System (GNSS) spoofing technology becomes more realistic, more feasible and cheaper. It's foreseeable that there will be risks of spoofing threats against SBAS in the future. SBAS signal authentication technology provides a system-level solution to spoofing threats by adding special markers to SBAS signals so that receivers can verify whether the SBAS signals are from the on-orbit Geostationary Earth Orbit (GEO) satellites or whether the signal information has been forged and tampered with. First, this article introduces the existing anti-spoofing methods that can be applied to SBAS, especially the Elliptic Curve Digital Signature Algorithm (ECDSA) and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocols. Then it discusses four possible solutions in a combination with the existing SBAS Interface Control Document (ICD). Two main Key Performance Indicators (KPIs), Time Between Authentication (TBA) and Authentication Latency (AL), obtained in the four main scenarios are compared. By analyzing the EGNOS Authentication Security Testbed (EAST) test simulation results of European Geostationary Navigation Overlay Service (EGNOS) in Europe, the impact of SBAS after joining the authentication service is obtained.https://doi.org/10.1186/s43020-021-00043-1SBASAuthenticationTESLAECDSA |
spellingShingle | Ying Chen Weiguang Gao Xiao Chen Ting Liu Cheng Liu Chengeng Su Jun Lu Wei Wang Shenglin Mu Advances of SBAS authentication technologies Satellite Navigation SBAS Authentication TESLA ECDSA |
title | Advances of SBAS authentication technologies |
title_full | Advances of SBAS authentication technologies |
title_fullStr | Advances of SBAS authentication technologies |
title_full_unstemmed | Advances of SBAS authentication technologies |
title_short | Advances of SBAS authentication technologies |
title_sort | advances of sbas authentication technologies |
topic | SBAS Authentication TESLA ECDSA |
url | https://doi.org/10.1186/s43020-021-00043-1 |
work_keys_str_mv | AT yingchen advancesofsbasauthenticationtechnologies AT weiguanggao advancesofsbasauthenticationtechnologies AT xiaochen advancesofsbasauthenticationtechnologies AT tingliu advancesofsbasauthenticationtechnologies AT chengliu advancesofsbasauthenticationtechnologies AT chengengsu advancesofsbasauthenticationtechnologies AT junlu advancesofsbasauthenticationtechnologies AT weiwang advancesofsbasauthenticationtechnologies AT shenglinmu advancesofsbasauthenticationtechnologies |