Implementation of authentication scheme for GNSS signal using Raspberry Pi

GNSS spoofing refers to the malicious attempt by adversaries to trick GNSS receivers into generating incorrect position, velocity, and time (PVT) solutions. As a means of detecting spoofing attempts, Yu Han Chu et. al has proposed an authentication scheme that utilizes an unbounded keychain to prote...

Full description

Bibliographic Details
Main Author: Neo, Zhen Ting
Other Authors: Tan Soon Yim
Format: Final Year Project (FYP)
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/157757
_version_ 1826116084384661504
author Neo, Zhen Ting
author2 Tan Soon Yim
author_facet Tan Soon Yim
Neo, Zhen Ting
author_sort Neo, Zhen Ting
collection NTU
description GNSS spoofing refers to the malicious attempt by adversaries to trick GNSS receivers into generating incorrect position, velocity, and time (PVT) solutions. As a means of detecting spoofing attempts, Yu Han Chu et. al has proposed an authentication scheme that utilizes an unbounded keychain to protect GPS navigation messages. The keychain is created using the chameleon hash construct, which allows an authentication server to have the exclusive ability to extend the keychain by creating new keys that are publicly verifiable by any clients wishing to participate in the authentication scheme. These keys are then used to protect each individual subframe in the navigation message to allow clients to determine the authenticity of subframes it receive by comparing their HMACs against the reference HMACs provided by the authentication server. This final year project focuses on implementing an improved version of this authentication scheme on a Raspberry Pi, as a proof of concept to demonstrate the feasibility of such an authentication scheme on devices with limited computing resources and less modern hardware. The developed prototype was then tested to show that it is able to correctly identify actual subframes broadcasted by genuine GPS satellites as authentic while also being able to detect spoofed subframes generated by a Hack-RF One as inauthentic.
first_indexed 2024-10-01T04:05:37Z
format Final Year Project (FYP)
id ntu-10356/157757
institution Nanyang Technological University
language English
last_indexed 2024-10-01T04:05:37Z
publishDate 2022
publisher Nanyang Technological University
record_format dspace
spelling ntu-10356/1577572023-07-07T19:03:23Z Implementation of authentication scheme for GNSS signal using Raspberry Pi Neo, Zhen Ting Tan Soon Yim School of Electrical and Electronic Engineering ESYTAN@ntu.edu.sg Engineering::Electrical and electronic engineering::Satellite telecommunication Engineering::Electrical and electronic engineering::Computer hardware, software and systems GNSS spoofing refers to the malicious attempt by adversaries to trick GNSS receivers into generating incorrect position, velocity, and time (PVT) solutions. As a means of detecting spoofing attempts, Yu Han Chu et. al has proposed an authentication scheme that utilizes an unbounded keychain to protect GPS navigation messages. The keychain is created using the chameleon hash construct, which allows an authentication server to have the exclusive ability to extend the keychain by creating new keys that are publicly verifiable by any clients wishing to participate in the authentication scheme. These keys are then used to protect each individual subframe in the navigation message to allow clients to determine the authenticity of subframes it receive by comparing their HMACs against the reference HMACs provided by the authentication server. This final year project focuses on implementing an improved version of this authentication scheme on a Raspberry Pi, as a proof of concept to demonstrate the feasibility of such an authentication scheme on devices with limited computing resources and less modern hardware. The developed prototype was then tested to show that it is able to correctly identify actual subframes broadcasted by genuine GPS satellites as authentic while also being able to detect spoofed subframes generated by a Hack-RF One as inauthentic. Bachelor of Engineering (Electrical and Electronic Engineering) 2022-05-22T11:50:38Z 2022-05-22T11:50:38Z 2022 Final Year Project (FYP) Neo, Z. T. (2022). Implementation of authentication scheme for GNSS signal using Raspberry Pi. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/157757 https://hdl.handle.net/10356/157757 en application/pdf Nanyang Technological University
spellingShingle Engineering::Electrical and electronic engineering::Satellite telecommunication
Engineering::Electrical and electronic engineering::Computer hardware, software and systems
Neo, Zhen Ting
Implementation of authentication scheme for GNSS signal using Raspberry Pi
title Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_full Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_fullStr Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_full_unstemmed Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_short Implementation of authentication scheme for GNSS signal using Raspberry Pi
title_sort implementation of authentication scheme for gnss signal using raspberry pi
topic Engineering::Electrical and electronic engineering::Satellite telecommunication
Engineering::Electrical and electronic engineering::Computer hardware, software and systems
url https://hdl.handle.net/10356/157757
work_keys_str_mv AT neozhenting implementationofauthenticationschemeforgnsssignalusingraspberrypi