2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014 2014
DOI: 10.1109/plans.2014.6851385
|View full text |Cite
|
Sign up to set email alerts
|

A blueprint for civil GPS navigation message authentication

Abstract: Abstract-A proposal for civil GPS navigation message authentication (NMA) is presented with sufficient specificity to enable near-term implementation. Although previous work established the practicality and efficacy of NMA for civil GPS signal authentication, there remains a need for a detailed proposal that addresses several outstanding considerations regarding implementation. In particular, this paper (1) provides a definitive evaluation of the tradeoffs involved in the choice of cryptographic protocol, and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
48
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 86 publications
(58 citation statements)
references
References 12 publications
1
48
0
Order By: Relevance
“…More details about TESLA protocol implementations for GNSS can be found in . Now that the TESLA protocol and its use for GNSS have been generally described, the next sections will deal with the specificities of the proposed scheme.…”
Section: Proposed Authentication Conceptmentioning
confidence: 99%
See 2 more Smart Citations
“…More details about TESLA protocol implementations for GNSS can be found in . Now that the TESLA protocol and its use for GNSS have been generally described, the next sections will deal with the specificities of the proposed scheme.…”
Section: Proposed Authentication Conceptmentioning
confidence: 99%
“…Assuming the MAC algorithm behaves as a lookup table with a message and a key as entries, and an n ‐bit random sequence as output, an attacker could only try to guess the MAC, which is very unlikely even for extremely truncated MACs to only a very few bits . For example, a MAC as short as 10 bits would be guessed with an average probability of 0.097% (one time out of 1024), rendering the ‘MAC guessing’ \ compared to a pure service denial by, e.g., jamming the signal.…”
Section: Implementation Trade‐offs and Analysesmentioning
confidence: 99%
See 1 more Smart Citation
“…Navigation Message Authentication (NMA) is moving forward on GPS for the second frequency civilian code called L2C. NMA attaches a digital signature to the GPS navigation messages [36].…”
Section: Jamming and Spoofingmentioning
confidence: 99%
“…scanning, geofencing, digitiz-ing, etc.). [4] Among them, field data collection is one of the first steps for spatial information users, especially for geographers, geologists, biologists, crop scientists, ecologists, etc. Field data collection is required for several reasons, such as col-lecting Ground Control Points (GCPs), ground [7] truth data collection for result validation, collecting soil contaminated sites, plant or animal species, and gathering public opinions for retail market analysis in order to analyze the spatial distribution patterns of objects and information on their associated attributes.…”
Section: Literature Surveymentioning
confidence: 99%