You are on page 1of 9

A First-of-a-Kind Spoofing Detection Demonstrator

Exploiting Future Galileo E1 OS Authentication

Davide Margaria, Gianluca Marucco, Mario Nicola


Navigation Technologies Research Area
Istituto Superiore Mario Boella (ISMB)
Torino, Italy
margaria@ismb.it, marucco@ismb.it, nicola@ismb.it

Abstract—This paper presents the results of a demonstration signals) or on the cross-check with non-GNSS measurements
based on the use of the Navigation Message Authentication (e.g. obtained from an inertial measurement unit) [2].
(NMA) technique, which represents an effective countermeasure
against counterfeit Global Navigation Satellite System (GNSS) These solutions are not available for stand-alone GNSS
signals and is one of the possibilities considered for the adoption civil receivers, so special interest is being addressed towards
by Galileo. An intermediate spoofing attack has been simulated possible modifications to the civil GNSS Signal-In-Space (SIS)
in a vehicular case study, considering both a commercial GPS to enable the accommodation of cryptographic measures
receiver and a modified software receiver. The obtained results suitable to authenticate the received signal. Nowadays in-orbit
demonstrate the potential vulnerability of current commercial satellites do not broadcast yet authentication data within their
receivers and the added value of NMA, which has been exploited civil GNSS signals (e.g. GPS L1 C/A or Galileo E1 OS). Some
in the software receiver for implementing a simple but effective interesting options for the inclusion of an authenticated
spoofing detection method. message on top of Galileo E1 OS signals have recently been
proposed [3] [4] [5]. In addition, a specific solution suitable to
Keywords—Spoofing Attack; Detection; Galileo E1 Open be implemented in the frame of the Galileo Commercial
Service; Navigation Message Authentication; Demonstrator. Service (CS) is being finalized and has already been tested with
live satellite signals [6]. These authentication approaches or
I. INTRODUCTION: THE NEED FOR AUTHENTICATION evolutions of them are expected to become part of the Galileo
This work is motivated by the growing spoofing threat in SIS in the short to mid-term.
several fields of application and the related need for The paper focuses on the applicability of the GNSS
authentication of Positioning, Navigation, and Timing (PNT) Navigation Message Authentication for detecting specific
information. The potential risk of spoofing attacks is becoming spoofing attacks, concentrating on a vehicular case study.
a real menace, especially in the road domain [1]. In fact, in the Aiming to an early demonstration of the added value of Galileo
case of Intelligent Transport Systems (ITS), fraudulent users of E1 OS authenticated signals, a proper test bench has been
liability- and payment-critical applications can be motivated to designed. In detail, the work has been organized into two parts:
fool the system by a sufficient economic interest (e.g. in case of firstly an example of spoofing attack has been implemented in
road tolling, pay-as-you-drive insurance, etc.). In addition, order to demonstrate the vulnerability of a commercial
safety-critical applications (e.g. advanced driver assistance automotive-grade GPS receiver. Then, the same attack has
systems, autonomous or semiautonomous ground vehicle been directed against a software receiver, capable to exploit the
systems) could also benefit from solutions capable to decrease authentication feature for the detection of counterfeit signals.
the risk associated to misleading information in case of
spoofing attacks. After this introduction, the paper is organized as follows.
Section II presents the methodology that has been adopted for
These threats push the interest and the demand for anti- setting up an effective demonstration of a spoofing attack with
spoofing countermeasures and for GNSS services proving counterfeit Radio-Frequency (RF) signals. Beside theoretical
higher reliability for the PNT information. It is worth to aspects, the attention is focused on the following aspects: the
highlight that the development of spoofing detection and implementation of a spoofing attack in a vehicular scenario, the
mitigation techniques is an active research topic for the GNSS emulation of Galileo authenticated signals, and the
community [2]. experimental setup, including the modifications implemented
Some solutions able to implement anti-spoofing in a software receiver in order to exploit the NMA. The
countermeasures have already been proposed in past years. obtained results are then summarized in Section III, where the
Most of them are based on the idea of taking advantage in added value of NMA for implementing a simple spoofing
some way of the cryptographic features of restricted-use signals detection approach is highlighted. Final remarks are drawn in
(e.g. by means of codeless or semi-codeless approaches based Section IV.
on military GPS signals or Galileo Public Regulated Service

978-1-5090-2042-3/16/$31.00 © 2016 IEEE 442


II. METHODOLOGY AND EXPERIMENTAL SETUP
This section describes the vehicular case study which has
been investigated and assessed by means of simulations.
Details about the emulation of a spoofing attack, including
counterfeit signals and authenticated signals, are provided,
followed by the description of the experimental setup.

A. Vehicular Case Study: Real and Spoofing Scenarios


The selected scenario focused on a GNSS-based vehicular
application. The idea was to force an automotive-grade GNSS
receiver to compute a series of false positions, following a
different path with respect to the “true” one covered by the
receiver, as depicted in Fig. 1.
Fig. 1. Selected real and counterfeit paths for the spoofing case study.
For example, this can be the case of a fraudulent driver that
wants to spoof his own on-board tracking system to avoid the As far as the spoofing scenario is concerned, an attack
toll of the road along he drives: the positions log shows the car belonging to the category of intermediate spoofing [7] [8] has
on a free road while it is on a toll one. been considered. In detail, as illustrated in Fig. 2, the spoofer
Two trajectories have been considered for demonstration simultaneously attacks each tracking channel of the target
purposes. Starting from the same point (the parking on the receiver by first performing code-phase alignment and then
lower-right side of Fig. 1), the two trajectories share the same signal lift-off [2]. The Early, Prompt, and Late correlators of
path for a while and then split apart along two different roads, the tracking channel are denoted in Fig. 2 as red, green, and
after a roundabout (see the red and green paths in Fig. 1). blue points, respectively.

(a) (b)

(c) (d)
Fig. 2. Illustration of the subsequent phases of the intermediate spoofing attack on a single channel of a GNSS receiver, in terms of cross-correlation functions: at
the beginning only the authentic signal is present (a), then the counterfeit signal is aligned to the authentic signal and its power is increased (b) until the spoofer
gains control on the tracking loop (c) and arbitrarily modifies the delay of the correlation peak (d).

443
During the attack, they continue to follow the highest While the first aspect can be achieved with some relatively
correlation peak without being able to distinguish between simple modifications, mostly at system level only (i.e. inserting
authentic and spoofed signals. some cryptographic features in the GNSS signal), the second
one is harder to implement. In fact, the authentication of the
In this work the aim was to simulate an intermediate attack
pseudorange measurements and then of the PNT information
on multiple GNSS signals. For this reason, the spoofer has
are required, implying complex modifications at receiver level.
been assumed capable to generate tightly synchronized
counterfeit signals for all the in-view GPS, EGNOS and In this work, a scheme based on Navigation Message
Galileo satellites, even in dynamic conditions (i.e. with a car Authentication has been chosen for implementation. In detail,
velocity up to 50 km/h). The attack has been based on a signal the NMA is an authentication technique widely referenced in
lift-off in the first part of the path in Fig. 1, generating stronger GNSS literature (e.g. see [2] and references therein). It is based
counterfeit signals aligned with the authentic signals. After on the authentication of satellite navigation messages by means
that, the code delays have been arbitrarily modified for all the of digitally signing the navigation data and thus keeping the
received channels, inducing the victim receiver to compute a navigation message clear (i.e. unencrypted).
spoofed position estimate.
The NMA approach is known to be a simple solution for
This kind of attack has been emulated for demonstration providing an authentication of the GNSS signal origin (i.e.
purposes by means of an offline simulation, as discussed in source authentication only). It is important to note that, since
following paragraphs. For the sake of simplicity, the idea was the NMA acts at the navigation message level, it does not
to emulate the attack by separately generating the received ensure the correct time of arrival of the signal: it may fail
GNSS signals in two different scenarios and then to properly against meaconing or sophisticated spoofing attacks able to
combine the signals. In detail, a real scenario with authentic decode live signals and replay counterfeit signals in near real-
signals only (corresponding to the green path in Fig. 1) and a time.
spoofing scenario with counterfeit signals only (related to the
red path in Fig. 1) have been separately considered. However, the NMA represents a first countermeasure
against simplistic and intermediate spoofing attacks. The NMA
It must be pointed out that the spoofer is assumed to be is suitable to be complemented with one or more non-
unable to produce valid authentication data in real-time. This cryptographic spoofing defenses at receiver level in order to
choice is motivated by the fact that more sophisticated attacks strengthen its robustness, providing both origin and timing
are considered less likely and not commensurate to the authentication. In addition, NMA-based approaches are capable
economic interest of the fraudulent user in the selected case to potentially decrease the need for costly additional sensors or
study. In fact, also due to the dynamic conditions of the victim other countermeasures to spoofing attacks. For these reasons,
receiver on the car, a successful attack with valid NMA data the NMA represents an important added value with respect to
would imply a remarkable increase on the complexity and cost current unauthenticated civil GNSS signals.
of the spoofer. As an example, the implementation of a
Security Code Estimation and Replay attack would be required An NMA-based solution tailored to Galileo E1 OS signals
(as described in [9]). has been proposed in some recent papers [3] [4] [5]. This
approach has been selected for implementation in this study.
The idea is to exploit the 40 bits marked as “Reserved 1”
B. Emulation of Galileo Authenticated Signals within the I/NAV message transmitted through the Galileo E1b
As far as the scenario with real signals only is concerned, data channel [10]. These bits can be used for inserting NMA
the attention has been focused on the proper emulation of data, as in Fig. 3.
Galileo E1 OS authenticated signals, with a reasonable
complexity. It must be noticed that the navigation data are arranged in
“pages”, lasting 2 seconds each. A nominal page is composed
The core objective of a GNSS signal authentication by two page parts (even and odd) transmitted sequentially. The
mechanism is to introduce features that increase the difficulty 40 bits of the “Reserved 1” field within the I/NAV exist only in
for an attacker to generate counterfeit signals, but make it easy the odd page parts, then the corresponding data rate available
for a receiver to determine if a received signal is authentic (i.e. for authentication purposes is equivalent to 20 bits per second.
it originates from a GNSS satellite and not from a spoofer) [2]. In [3], [4], and [5], these “Reserved 1” fields have been
The concept of signal authentication requires the presence proposed to be used for transmitting a sort of digital signature,
of a cryptographically secure portion in the received signal, based on the Timed Efficient Stream Loss-tolerant
which is sometimes referred as security code, or digital Authentication (TESLA) broadcast authentication protocol.
signature. It usually involves two sub-types of authentications Since the focus of our demonstration was not the
[9]: cryptographic security itself (already well assessed in other
papers), a simplified digital signature has been adopted here for
• Origin authentication, i.e. a certification that the
emulating the selected NMA scheme.
security code originates from the GNSS Control
Segment (i.e. source authentication); In detail, a simple function of the satellite identifier (namely
the Pseudo Random Noise – PRN code number) has been used
• Timing authentication, i.e. a certification that the as a basic signature for the navigation data of each Galileo
security code arrives promptly and intact (i.e. with the satellite in view.
correct time of arrival and with data integrity).

444
6. Perform the convolutional encoding and interleaving
of the edited page part;
7. Store the resulting I/NAV symbols is a new file, usable
for offline simulation purposes.
In this case, the custom digital signature will be received
every two seconds from each Galileo satellite, leading to a
Time Between Authentications (TBA) metric equal to two
seconds. This TBA value is relatively low due to the simplicity
of the authentication signature. More complex and thus robust
implementations proposed in recent literature as in [3] and [4]
show values of 10 and 30 seconds, respectively.
However, following analyses will not focus on a specific
NMA scheme and on its intrinsic performance (e.g. in terms of
TBA), but on the general impact of the authentication
mechanism at the receiver level. The selected implementation
is intended for demonstration purposes and will also be used to
draw general conclusions, applicable to different NMA-based
schemes and related to the impact in terms of receiver
complexity and architectural changes.

C. Experimental Setup and Receivers Under Test


The objective was to clearly demonstrate the vulnerability
of a commercial GNSS receiver to a spoofing attack and the
added value of Galileo E1 OS authenticated signals for
detecting such an attack. Starting from this general idea, a
proper testbench has been set up for offline simulation and
demonstration purposes, as shown in Fig. 4.
Fig. 3. Galileo E1B I/NAV message structure [3].

It must be pointed out that the insertion of such a custom


authentication data required to properly take into account the
convolutional encoding, the checksum (CRC) and the
interleaving scheme of the I/NAV as in [10]. In detail, the
I/NAV messages are transmitted by each Galileo satellite with
a data rate of 250 symbols per second. These symbols are
obtained from the convolutional encoding of a data stream at
125 bits per second (following a Forward Error Correction
scheme with 1/2 rate). After convolutional encoding, the
symbols are then interleaved as described in [10].
For these reasons, the following preparative steps have been
carried out before the simulation of authenticated signals: (a)

1. Open a log file containing valid I/NAV data symbols;


2. Recover the data bits from the symbols, separately
performing the deinterleaving, the Viterbi decoding,
and the CRC check for each Galileo satellite signal;
3. Look for odd page parts and identify the 40 bits related
to the “Reserved 1” field (i.e. the bits with indexes
from 19 to 58 in an odd page part);
4. Replace these bits with a custom digital signature: in
this case, an arbitrary pattern of 20 bits with ‘1’ logical
value, followed by the PRN code number expressed
over the remaining 20 bits, has been inserted;
(b)
5. Re-compute the CRC checksum on the modified data
and put the updated result in the CRC field; Fig. 4. Experimental setup adopted for GNSS simulation and RF signal
recording (a) and for data replay (spoofing attack) on receivers under test (b).

445
The testbench has been realized by means of the following In detail, the two files have been post-processed with the
hardware and software components (available at ISMB): NGene2 software receiver in order to decode the Time of Week
(ToW) from the simulated GPS signal samples. Such timing
• a NavX-NCS professional signal and constellation information, extracted from the two files, has been used in
generator by IfEN, capable to simulate GPS, EGNOS order to align their contents with a resolution of one sample
and Galileo RF signals in the L1/E1 band in different (i.e. ±200 ns with the selected sampling frequency of 5 MHz).
user-defined scenarios [11];
After this initial alignment, the two files have been
• an Universal Software Radio Peripheral (USRP) model combined for simulating the spoofing attack, aiming to mimic
N210 by Ettus Research, suitable for RF signal the superimposition of counterfeit and real signals as
recording and playback. A sampling frequency equal to previously shown in Fig. 2. This result has been obtained by
5 MHz has been selected for performing a baseband dynamically adjusting the relative amplitude and the relative
equivalent representation of the RF signal with 16 bit delay of the samples of the second file (related to the spoofing
I/Q samples [12]; scenario) with respect to the first file. In detail, both the two
• a PRS10 Rubidium Oscillator by Stanford Research files had a total duration of 180 seconds. They have been
Systems, that has been used to generate a common 10 combined in order to generate an output file to be used to feed
MHz reference input for synchronizing both the NavX- the receivers under test. In the following the files combination
NCS generator and the USRP front-end [13]; steps and their expected effects on a conventional receiver (i.e.
a device not implementing any detection strategy) are reported:
• a u-blox 6T receiver, which has been selected as a
representative device from the class of consumer-grade 1. From 0 to 120 s: this phase includes an initial
GNSS receivers for automotive applications [14]; stationary condition lasting 120 seconds (useful for the
correct initialization of the receivers under test). A
• NGene2, a fully-software GNSS receiver developed by static position in the parking on the lower-right side of
the Navigation Signal Analysis and Simulation Fig. 1 is simulated. Only the samples of the first file
(NavSAS) group, a joint research team of ISMB and (related to the real signal) are copied in the output file;
Politecnico di Torino. NGene2 is able to exploit several
radio frequency front-ends and to track live GPS, 2. From 120 to 130 s: signals are simulated as received by
EGNOS, and Galileo signals. It can be executed on a a moving device starting its motion and following the
general purpose PC or on an ARM-based embedded simulated path as in Fig. 1. Only the first file content is
platform [15] [16]. copied in the output file. The receiver is expected to be
still locked to the real signal, as subsequently verified
According to the case study previously described in Section and depicted in Fig. 2(a);
II.A, two different scenarios have been simulated with the
NavX-NCS generator: a “real” scenario, in which the GNSS 3. From 130 to 140 s: the spoofer is powered on, varying
signals corresponding to the true path are emulated, and a the relative amplitude ratio of the counterfeit signal
“spoofing” scenario, where “counterfeit” signals leading to the with respect to the real signal from 0 to 3 dB, as in Fig.
fake trajectory in Fig. 1 are generated. 2(b). This effect is obtained by summing the samples
of the two files with an increasing amplification factor
As previous highlighted, the two scenarios differ by the for the second file;
presence or not of authentication data, which have been
inserted in the real scenario only. For this reason, a modified 4. From 140 to 150 s: the spoofed signal is anticipated
I/NAV message, including authentication data, has been with respect to the authentic signal, as in Fig. 2(c).
inserted in the NavX-NCS generator in order to produce the This effect is obtained by skipping one sample per
signals for the real scenario. Such a modified I/NAV message second in the spoofing file, before to combine it with
has been generated starting from a log file with standard the authentic signal samples. After 10 seconds, a delay
navigation data from Galileo satellites, and then inserting a of 10 samples is obtained (corresponding to about 600
simplified digital signature in the “Reserved 1” fields, as meters, at the selected sampling frequency);
previously discussed in Section II.B. 5. From 150 to 180 s: the two files continue to be
After the proper setup of the NavX-NCS generator, it has summed, without further modifications on the relative
been connected to the USRP in order to collect the raw RF delay and amplitude. During this phase the spoofer is
signal samples in both the real and spoofing scenarios. It must expected to take full control on the tracking loops of
be noticed that an accurate synchronization of both NavX-NCS the receiver and to arbitrarily manipulate the estimated
and USRP has been achieved by means of an external reference position, as then verified in Fig. 2(d).
clock (PRS10 Rubidium Oscillator), as shown in Fig. 4(a). The resulting combined samples were used in order to test
Such synchronization was necessary in order to ensure a the effectiveness of the simulated spoofing attack on the
sufficient stability and repeatability of the generated signals, receivers. Special attention has been devoted to bypass the
leading to negligible differences in terms of Doppler shift and problem of the RF irradiation of counterfeit GNSS signals, thus
sampling frequencies during subsequent RF simulations. avoiding legal issues. In detail, a RF replay of the combined
In this way the two data sets related to both the real and samples has been carried out by connecting the USRP to both
spoofing scenarios have been properly collected and combined. the receivers under test with a signal splitter, as in Fig. 4(b).

446
It must be pointed out that the GPS receiver on the right This point confirms the feasibility and the limited
side of Fig. 4(b) (i.e. u-blox 6T) represents a consumer-grade implementation complexity of this method or similar NMA-
device representative of the state-of-the-art for vehicular based approaches in future mass-market receivers.
applications, but not yet ready to exploit the Galileo
authenticated signals. In addition, this solution represents a simple way for
detecting simplistic or intermediate spoofing attacks with a
On the other hand, the GNSS software receiver NGene2, reasonable implementation complexity, as discussed in
shown in the left side of Fig. 4(b), has been adapted in order to following section.
decode in real-time the Galileo authenticated signals and to
detect an attack in case of failure of the authentication III. OBTAINED RESULTS
procedure. Just a few modifications on the NGene2 algorithms
have been required in order to exploit the Galileo authenticated The setup presented in previous section has been used in
navigation message. In detail, the data demodulation order to carry out an offline simulation of a spoofing attack.
functionalities have been adapted for correctly decoding the The obtained results from the two receivers under test (see Fig.
custom digital signature and to check its validity. Another 5 and Fig. 6) are reported in following paragraphs.
minor modification involved the management logic for the
tracking channels: only Galileo signals with valid A. Spoofing Attack to a Commercial Receiver
authentication data have been used for the position The objective of this preliminary test was to investigate the
computation, whereas unauthenticated signals have been vulnerability of the commercial receiver (i.e. u-blox 6T) to the
properly flagged and excluded from the solution; if the number counterfeit signals. For this reason, the receiver has been feed
of satellites with authenticated signal is not enough to grant the with the combined signal replayed by the USRP, as previously
availability of the position computation, then also not shown in Fig. 4(b). In this way, an intermediate spoofing attack
authenticated signals are used and the PNT information is has been simulated in a controlled environment, without
flagged as not authenticated. irradiating any RF signal. As an example of the behavior of the
It is worth to remark that the impact of these modifications receiver under test, its Graphical User Interface (GUI) is
on the receiver architecture is moderate. displayed in Fig. 5.

Fig. 5. Screenshot showing the outputs of the commercial receiver under test (u-blox 6T) during the simulated spoofing attack.

447
(a)

(b)
Fig. 6. Screenshots of the NGene2 software receiver, reporting valid position fixes based on authenticated Galileo signals only in the first part of the test (a) and
unauthenticated positions during the spoofing attack, as soon as the counterfeit signals take control of the tracking loops (b).

448
It can be noticed that, despite that the true signals were still generalized to other alternative NMA solutions based on
present during the simulated attack, the receiver tracked the different authentication periodicities (as previously discussed in
counterfeit signals and reported the false path. The behavior of Section II.B).
the receiver has been assessed by the real-time inspection of the
data displayed on the GUI and the post-processing analysis of At this point it is possible to conclude that, thanks to the
the NMEA data logs. navigation message authentication, a basic detection of an
intermediate spoofing attack can be implemented with a limited
The obtained results did not highlight any inconsistency or complexity on a mass-market receiver. In fact, as previously
anomaly on the receiver outputs: the receiver reported valid discussed, this approach requires just few modifications on the
position fixes and reasonable Carrier-to-Noise (C/N0) density receiver algorithms (i.e. for the demodulation of the navigation
ratios for all the satellites, even during the signal lift-off. This data and the management of authenticated/unauthenticated
test showed the potential vulnerability of the commercial channels). No major changes on the conventional receiver
receiver, which has been fooled without any clue of the attack. architecture are required, thus increasing the usefulness and the
attractiveness of this kind of solution.
B. Spoofing Detection Exploiting Galileo Authentication As an additional remark, it must be noticed that an NMA-
The spoofing test has also been simultaneously done on the based detection represents a first step for implementing more
NGene2 receiver. Fig. 6 shows a couple of screenshots of its sophisticated countermeasures against spoofing attacks. For
GUI, reporting the receiver outputs during two different phases. instance, among several advanced features, the NGene2
In this case, the analysis was intended to verify the spoofing software receiver has the possibility of running the tracking
detection capability of the NGene2 receiver, exploiting the loops with a user-defined number of correlators. This multi-
Galileo authenticated navigation message (as previously correlator approach, originally intended for signal quality
discussed in Section II.C). monitoring, can also be leveraged as an advanced spoofing
countermeasure.
Fig. 6(a) refers to the initial phase of the attack, when the
tracking loops of the receiver were still tracking the authentic As an example, Fig. 6(b) shows several correlation
signals from all the satellites in view (GPS, EGNOS and functions of received signals computed with thirty-two
Galileo). The receiver channels report the respective Galileo correlators each one. During the attack, the presence of two
signals status as authenticated: this means that the receiver correlation peaks can be clearly noticed: one due to the real
successfully verified the digital signatures to authenticate the signal and the other related to the spoofed signal. This feature
navigation message of these signals. Here only Galileo can be exploited not just to detect an on-going spoofing attack,
authenticated signals have been used to compute the navigation checking for the presence of multiple correlation peaks, but
solution, whereas other unauthenticated signals (from GPS and also to mitigate it, identifying the authentic peak and excluding
EGNOS satellites) have been discarded from the solution. any counterfeit replica.

On the other hand, Fig. 6(b) shows a screenshot taken in a However, the implementation of a spoofing mitigation
later phase of the attack, when the spoofer has already gained strategy is by far more complex than just a detection approach,
the full control of all the receiver channels in order to because it involves deep modifications in the receiver
arbitrarily manipulate the estimated position. In this case, the architecture and the use of specific processing algorithms, as
number of satellites with authenticated signals does not grant multiple tracking loops for each satellite signal. For example,
the possibility to compute a PNT solution, so also the spoofing attack can be detected when the spoofed signal
unauthenticated signals are used. Consequently, the receiver power overcomes the real one and the decoded message
reports the PNT solution as not authenticated and then provides becomes unauthenticated. After this detection, the receiver
a correct detection of the on-going attack. would need to start a mitigation procedure in order to recover
the authentic signal: this can be done for example by means of
It must be noticed that a counterfeit signal can be detected multiple correlators or by repeating the acquisition and tracking
as soon as it takes control of a tracking loop of the receiver and procedures. This mitigation approach would increase the
causes a failure in the verification of the authentication data effective number of tracking channels of the receiver, in order
field. In this case, the counterfeit signal does not contain valid to separately check the validity of the authentication data for all
authentication data on the Galileo navigation message and then the detected signals replicas (potentially doubling the total
the receiver can easily detect the attack. If less than four number of required channels).
authenticated signals are available, the receiver can declare the
positioning solution as no more authenticated. This kind of modifications can be introduced in modular
and flexible architectures, as in the case of the NGene2
The obtained results validate the effectiveness of the NMA- receiver, where most of the receiver functionalities can be
based approach as a simple spoofing countermeasure. In this modified by means of simple software upgrades. However,
selected scenario the spoofing detection can be accomplished consumer-grade receivers are usually based on proprietary
within two seconds from the instant when the spoofer gains architectures and tight constraints in terms of hardware and/or
control of the tracking channels of the victim receiver (i.e. from software resources.
the replacement of the real signals with stronger counterfeit
signals). This result depends on the periodicity of the custom For these reasons, a remarkable effort and major changes
digital signature adopted for demonstration purposes (with a on the functional blocks of the receiver can be necessary in
TBA equal to two seconds, in this case) and can be easily order to accommodate a complete spoofing mitigation solution.

449
On the other hand, depending also on the application REFERENCES
requirements, a simple detection approach can be an appealing [1] D. Margaria, E. Falletti, and T. Acarman, “The need for GNSS position
solution in order to readily exploit the added value of NMA, integrity and authentication in ITS: conceptual and practical limitations
with a minor complexity increase. in urban contexts,” Proc. of 2014 IEEE Intelligent Vehicles Symposium
(IV’14), Dearborn, Michigan, June 2014, pp. 1384-1389.
[2] F. Dovis, GNSS Interference Threats and Countermeasures, 1st ed.
IV. CONCLUSIONS Norwood, MA: Arthec House, 2015.
This work provides an early demonstration of the suitability [3] I. Fernández-Hernández I. et al., “Design drivers, solutions and
of future Galileo E1 OS authenticated signals for the robustness assessment of navigation message authentication for the
Galileo open service,” Proc. of the 27th International Technical Meeting
implementation of countermeasures against spoofing attacks. A of The Satellite Division of the Institute of Navigation (ION GNSS+
test bench capable to simulate an intermediate spoofing attack 2014), Tampa, Florida, September 2014, pp. 2810-2827.
in a vehicular scenario has been designed and configured. It is [4] J.T. Curran, M. Paonni, and J. Bishop, “Securing the open-service: a
capable to generate both authenticated and counterfeit signals candidate navigation message authentication scheme for Galileo E1
in dynamic conditions and to fool a commercial receiver, OS,” Proc. of European Navigation Conference - Global Navigation
without any clue of the attack. Satellite Systems (ENC-GNSS 2014), Rotterdam, the Netherlands, April
2014.
Another key contribution of the paper is the implementation [5] P. Walker et al., “Galileo open service authentication: a complete service
of a spoofing detection approach in a software receiver, based design and provision analysis," Proc. of the 28th International Technical
on the exclusion of satellite signals without valid NMA data. Meeting of The Satellite Division of the Institute of Navigation (ION
GNSS+ 2015), Tampa, Florida, September 2015, pp. 3383-3396.
A practical demonstration of these aspects, especially the [6] I. Fernández-Hernández et al., “Galileo’s commercial service. Testing
spoofing detection capability, has been successfully carried out GNSS high accuracy and authentication,” Inside GNSS,
in the frame of the 22nd ITS World Congress (Bordeaux, January/February 2015, pp. 38-48.
France, 5-9 October 2015) [17] [18]. [7] T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O’Hanlon, and P.
M. Kintner, “Assessing the spoofing threat: development of a portable
This activity proved that the impact of this NMA-based GPS civilian spoofer,” Proc. of the 21st International Technical Meeting
method on the receiver architecture is moderate, requiring just of the Satellite Division of The Institute of Navigation (ION GNSS
2008), Savannah, GA, September 2008, pp. 2314-2325.
few modifications for the data demodulation functionalities and
[8] B. M. Ledvina, W. J. Bencze, B. Galusha, and I. Miller, “An in-line anti-
the exclusion of unauthenticated signals. For this reason, the spoofing device for legacy civil GPS receivers,” Proc. of the 2010
feasibility and the low implementation complexity of this kind International Technical Meeting of The Institute of Navigation, San
of approaches in consumer-grade receivers has been confirmed. Diego, CA, January 2010, pp. 698-712.
[9] K. Wesson, M. Rothlisberger, and T. Humphreys, “Practical
The obtained results highlight the added value of future cryptographic civil GPS signal authentication,” Navigation, Journal of
Galileo signals and, more in general, of NMA applied to civil The Institute of Navigation, Vol. 59, No. 3, Fall 2012, pp. 177-193.
GNSS signals in order to raise the bar against potential [10] European Union, European GNSS (Galileo) Open Service Signal In
spoofing attacks. Furthermore, NMA enables the detection of Space Interface Control Document, OS SIS ICD, Issue 1, Revision 2,
simplistic or intermediate spoofing attacks with a limited November 2015.
implementation complexity, requiring just a few modifications [11] IFEN website, NavX-NCS Professional GNSS Simulator,
on the receiver algorithms. www.ifen.com/products/navx-gnss-test-solutions
[12] Ettus Research website, USRP N210 Software Defined Radio (SDR),
As soon as live authenticated signals will be available, they http://www.ettus.com/product/details/UN210-KIT
will be easily exploited by future receivers, also paving the way [13] Stanford Research Systems website, PRS10 Rubidium Frequency
to more sophisticated anti-spoofing approaches (e.g. based on Standard, http://www.thinksrs.com/products/PRS10.htm
Galileo Commercial Service signals). [14] u-blox website, EVK-6T evaluation kit, https://www.u-
blox.com/en/product/evk-6
In addition to further testing with live Galileo signals, [15] M. Fantino, A. Molino, and M. Nicola, “N–Gene GNSS receiver:
future activities will also include more detailed performance benefits of software radio in navigation,” Proc. of the European
assessments, in order to evaluate the probabilities of missed Navigation Conference - Global Navigation Satellite Systems (ENC-
detection and false alarm of the spoofing detection approach. GNSS 2009), Naples, Italy, May 2009.
[16] M. Troglia Gamba, M. Nicola, and E. Falletti, “Performance assessment
of an ARM-based dual-constellation GNSS software receiver,” Proc. of
the International Conference on Localization and GNSS (ICL-GNSS
2015), Gothenburg, Sweden, June 2015.
[17] 22nd ITS World Congress Bordeaux 2015 website, demonstration
showcase, http://itsworldcongress.com/demonstration-showcase/
[18] NavSAS lab, “NavSAS-ISMB Demo at ITS World Congress 2015 in
Bordeaux,” YouTube video, published on October 6, 2015. Available at:
https://youtu.be/rIZERfCCjKs?t=7s

450

You might also like