Field Testing of GNSS User Protection Techniques

S. Cancela, J. Navarro, D. Calle, T. Reithmaier, A. Dalla Chiara, G. Da Broi, I. Fernández-Hernández, G. Seco-Granados, J. Simón

Abstract: GNSS is a key element for a wide range of applications in our daily lives. Mass-market applications such as sports tracking or user guidance, liability-critical applications such as banking and telecommunication time synchronization, and safety critical services such as aviation and automotive-related solutions, all rely on GNSS. The huge growth experimented during the last decade puts GNSS in the target of attackers. The Galileo program is complementing the Galileo Open Service with Navigation Message Authentication (OSNMA) and providing signal authentication through the Commercial Service signals. These new services will be able to provide added protection to the current GNSS applications. Nevertheless, these features will require the users to implement new algorithms to exploit them. In this context, the European Commission launched the Navigation Authentication through Commercial Service-Enhanced Terminal (NACSET) project aiming at researching and implementing different techniques to detect and mitigate thus improving the resilience at user-level. In the frame of the NACSET project, a user terminal has been developed based on a high-end multi-GNSS receiver that is able to track E1/L1 and E6-B/C signals for data and signal protection. The terminal is equipped with a set of resilience techniques. Among these techniques, this paper focuses on an anti-replay technique protecting against zero-delay Secure Code Estimate-Replay (SCER) attacks based on the analysis of the unpredictable symbols from OSNMA cryptographic data. This paper firstly describes the NACSET project and its aim. Secondly, the theory of Anti-replay protection is explained from the point of view of a receiver, and anti-replay techniques based on OSNMA are introduced. Then, we describe the SCER simulator developed to assess the performances of the technique. To conclude, an attack is defined and performed with the SCER simulator over a real receiver. The results with and without OSNMA replay protection are presented and explained, and some conclusions of the experiment are derived.
Published in: Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019)
September 16 - 20, 2019
Hyatt Regency Miami
Miami, Florida
Pages: 1824 - 1840
Cite this article: Cancela, S., Navarro, J., Calle, D., Reithmaier, T., Chiara, A. Dalla, Broi, G. Da, Fernández-Hernández, I., Seco-Granados, G., Simón, J., "Field Testing of GNSS User Protection Techniques," Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), Miami, Florida, September 2019, pp. 1824-1840.
https://doi.org/10.33012/2019.17087
Full Paper: ION Members/Non-Members: 1 Download Credit
Sign In