Abstract: | This paper introduces authentication states for SBAS receivers describing all processes ranging from preauthentication verification to nominal authenticated operations. Most importantly, the secure transitions between these states and receiver operations are proposed to better define what the receiver’s role is in delivering a secure service. Different authentication techniques also require tailored modifications for the receiver concept of operations (CONOPS). This paper focuses on the use of two different authentication schemes: an I-channel implementation of TESLA and a Q-channel implementation of ECDSA. The receiver state machine outlines how a receiver should securely acquire public keys over the air and how a receiver transitions into a fully authenticated state from start-up. This paper presents a general message processing procedure that protects the SBAS receiver from using potentially spoofed data while preserving the integrity delivered by the service. |
Published in: |
Proceedings of the 2020 International Technical Meeting of The Institute of Navigation January 21 - 24, 2020 Hyatt Regency Mission Bay San Diego, California |
Pages: | 1059 - 1069 |
Cite this article: | Neish, Andrew, Walter, Todd, Fernandez-Hernandez, Ignacio, "Receiver States for SBAS Data Authentication," Proceedings of the 2020 International Technical Meeting of The Institute of Navigation, San Diego, California, January 2020, pp. 1059-1069. https://doi.org/10.33012/2020.17197 |
Full Paper: |
ION Members/Non-Members: 1 Download Credit
Sign In |