Abstract: | The vulnerability of GNSS signals to malicious spoofing attacks is a topic that has been gathering increased attention in recent years, and a number of different approaches have been proposed to overcome this vulnerability. Some of these approaches are user side, such as Automatic Gain Control (AGC) monitoring, or the use of an Inertial Measurement Unit (IMU), while others require modifications to the system, such as Navigation Message Authentication (NMA) and Spreading Code Encryption (SCE). In this work we introduce Nautilus, a low-cost, lightweight and highly configurable platform for assessing GNSS authentication schemes. Nautilus consists of a commercially available board integrating a u-blox GNSS receiver, a Raspberry Pi Single Board Computer (SBC) and an LMS7002M Software Defined Radio (SDR). A range of custom software has been developed to enable both system side (NMA and SCE) authentication, and user-side defenses, such as clock modelling, secure time transfer and IMU consistency checks. In this paper, we describe the Nautilus hardware and software architecture, demonstrate some calibration results and finally show some results from live sky testing. |
Published in: |
Proceedings of the 34th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2021) September 20 - 24, 2021 Union Station Hotel St. Louis, Missouri |
Pages: | 3698 - 3710 |
Cite this article: | O’Driscoll, Cillian, Caparra, Gianluca, "Nautilus: An Embedded Navigation Authentication Testbed," Proceedings of the 34th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2021), St. Louis, Missouri, September 2021, pp. 3698-3710. https://doi.org/10.33012/2021.17976 |
Full Paper: |
ION Members/Non-Members: 1 Download Credit
Sign In |