Page 201 - 卫星导航2021年第1-2合期
P. 201

Wang et al. Satell Navig             (2021) 2:4                     Satellite Navigation
            https://doi.org/10.1186/s43020-021-00037-z
                                                                              https://satellite-navigation.springeropen.com/



             ORIGINAL ARTICLE                                                                 Open Access

            Binary phase hopping based spreading code


            authentication technique


                                            *
            Shenran Wang, Hao Liu, Zuping Tang    and Bin Ye



              Abstract
              Civil receivers of Global Navigation Satellite System (GNSS) are vulnerable to spoofng and jamming attacks due to
              their signal structures. The Spreading Code Authentication (SCA) technique is one of the GNSS message encryption
              identity authentication techniques. Its robustness and complexity are in between Navigation Message Authentication
              (NMA) and Navigation Message Encryption (NME)/Spreading Code Encryption (SCE). A commonly used spreading
              code authentication technique inserts unpredictable chips into the public spreading code. This method changes the
              signal structure, degrades the correlation of the spreading code, and causes performance loss. This paper proposes
              a binary phase hopping based spreading code authentication technique, which can achieve identity authentication
              without changing the existing signal structure. Analysis shows that this method can reduce the performance loss of
              the original signal and has good compatibility with the existing receiver architecture.
              Keywords:  Global navigation satellite system, Message encryption, Spreading code authentication, Binary phase
              hopping


            Introduction                                      technologies. Te encryption-based technology includes
            Global Navigation Satellite System (GNSS) is an impor-  Navigation Message Authentication (NMA), Spread-
            tant national infrastructure, which plays a key role in   ing Code Authentication (SCA), Navigation Message
            vehicle navigation, civil aviation, fnancial transactions   Encryption (NME) and Spreading Code Encryption
            and many others (Liang et al. 2013). GNSS civil receivers   (SCE) (Dovis 2015; Shen and Guo 2018a). Anti-spoofng
            are vulnerable to spoofng and jamming attacks because   technology can greatly enhance the security of informa-
            the format and modulation of GNSS civil signals are pub-  tion (Wesson et al. 2012).
            lic ("GPS Interface Control Documents IS-GPS-200G"   Te SCA technique is considered to be one of the key
            2012; Humphreys  2013), and there exist obvious secu-  innovations for the next generation of GNSS civil signals
            rity vulnerabilities (Guenther 2014). Deception jamming   (Margaria et al. 2017). Its robustness and complexity are
            is divided into repeater deception jamming and gener-  in between NMA and NME/SCE. For the SCA technique
            ated spoofng jamming (Hu et  al.  2016). It is of great   unpredictable chips are inserted into the unencrypted
            signifcance to study the anti-deception technology and   public spreading code and verifed in receivers to ensure
            improve the robustness of receivers. GNSS anti-spoofng   the credibility of pseudo range measurement (Shen and
            technology is categorized into non-encryption-based   Guo  2018a;  b). At present, the main implementation
            technology and encryption-based technology (Psiaki   methods of the SCA technique include Spread Spec-
            and Humphreys 2016). Te non-encryption-based tech-  trum Security Code (SSSC) (Scott 2003), Hidden Marker
            nology mainly includes signal quality monitoring, dop-  (HM) (Kuhn 2005) and Signal Authentication Sequence
            pler  consistency  monitoring  and  other  anti-spoofng   (SAS) (Pozzobon et al. 2011; Pozzobon 2011). Te ideas
                                                              adopted  at  the  signal level  are  inserting unpredictable
                                                              authentication chips into the public spreading code.
            *Correspondence:  tang_zuping@hust.edu.cn         Te advantage of the SCA technique is that the received
            School of Electronic Information and Communications, Huazhong
            University of Science and Technology, Wuhan 430074, China  power is − 160 dB·W. Unless the encrypted information


                                     © The Author(s) 2021. This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing,
                                     adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and
                                     the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material
                                     in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material
                                     is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the
                                     permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creat iveco
                                     mmons .org/licen ses/by/4.0/.
   196   197   198   199   200   201   202   203   204   205   206