The present invention relates generally to authentication of messages sent via electromagnetic communication and, more particularly, to systems and methods for low latency authentication of navigation messages.
By way of background, with the continuous advancements in radio frequency microelectronics, generating Global Navigation Satellite System (GNSS) signals has become more accessible and cost-effective. However, this accessibility has also led to a growing concern about spoofing attacks, where counterfeit GNSS signals are broadcasted to provide false information to victim receivers.
In response to this emerging hazard, Navigation Message Authentication (NMA) techniques have been developed. The core idea behind NMA is to send the navigation message along with authentication tags, allowing verification of its correctness and making it difficult for attackers to alter them through cryptography. Unfortunately, current NMA techniques suffer from latency issues due to the need for long authentication tags, which are appended to the navigation message. Consequently, the time between authentications (TBA) is negatively affected, leading to poor performance.
The systems and methods described herein address this challenge with one or more embodiments of low-latency authentication methods that can include superimposing an authentication tag onto a navigation message and sending the combined superimposed signal simultaneously within the same frequency band. This approach enables instantaneous authentication since both the navigation message and the authentication tag can be received simultaneously. In contrast, existing systems require additional time to receive and verify the navigation message after receiving the authentication tag. By reducing authentication latency, the proposed methods may enable the receiver to promptly verify the authenticity of the received navigation message.
The present invention overcomes the foregoing problems and other shortcomings, drawbacks, and challenges of covert authentication of navigation messages. While the technology will be described in connection with certain embodiments, it will be understood that the technology is not limited to these embodiments. To the contrary, this technology includes all alternatives, modifications, and equivalents as may be included within the spirit and scope of the present technology.
According to one embodiment of the present technology a system for superimposing a navigation message and an authentication message including a transmitter including a first channel including a first channel encoder for encoding a navigation message; a second channel including a second channel encoder for encoding an authentication message; and a processor; and a memory storing one or more processor-readable instructions. When executed by the processor, the processor-readable instructions cause the transmitter to: superimpose the authentication message onto the navigation message to generate a superposition coding; and transmit the superposition coding such that the navigation message and the authentication message are transmitted simultaneously at the same frequency.
Additional objects, advantages, and novel features of the technology will be set forth in part in the description which follows, and in part will become apparent to those skilled in the art upon examination of the following or may be learned by practice of the technology. The objects and advantages of the technology may be realized and attained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present technology and, together with a general description of the technology given above, and the detailed description of the embodiments given below, serve to explain the principles of the present technology.
It should be understood that the appended drawings are not necessarily to scale, presenting a somewhat simplified representation of various features illustrative of the basic principles of the invention. The specific design features of the sequence of operations as disclosed herein, including, for example, specific dimensions, orientations, locations, and shapes of various illustrated components, will be determined in part by the particular intended application and use environment. Certain features of the illustrated embodiments have been enlarged or distorted relative to others to facilitate visualization and clear understanding. In particular, thin features may be thickened, for example, for clarity or illustration.
Proposed herein are at least three methods for superimposing an authentication tag onto a navigation message in the Global Navigation Satellite System (GNSS). In embodiments of at least one of the methods, where message length may exceed a tag length (which is common in GNSS applications) the authentication tag may be augmented with additional parity bits. This enhancement may significantly bolster a forward error correction capability of the tag. One or more additional embodiments may include stretching out tag symbol durations, resulting in increased processing gain and coherent integration time. By doing so, the anti-jamming and tracking capabilities of a GNSS receiver can be substantially improved. Additionally, a novel approach of splitting a navigation message into multiple segments, allowing for simultaneous transmission alongside the authentication tag, may be explored. Embodiments displaying features of such an approach may effectively reduce the authentication latency, promoting faster and more efficient verification.
Effectiveness of the proposed methods may be assessed through a comprehensive evaluation, focusing on key performance metrics, including the Authentication Error Rate (AER), Time Between Authentications (TBA), and Authenticated Throughput. These metrics enable gauging the reliability, frequency, and efficiency of the authentication process, providing valuable insights into the overall system's performance and security capabilities.
The implications of the proposed methods may be significant for latency-critical applications, such as autonomous space vehicles, where immediate verification and actions are crucial upon receiving a navigation/sensor message. Additionally, the shorter TBA provided by this method creates smaller windows for potential adversaries to inject false data, making spoofing attacks less successful. As a result, this approach may be important to GNSS, where timely verification of the authenticity of received navigation messages is important.
One benefit of superposition coding is an increased capacity (data rate) over orthogonal transmissions, such as time-division multiplexing or frequency-division multiplexing. Superposition coding can be applied in numerous problems, including multiple access communications, interference channels, relay communications, and confidential communications. Superposition coding can be applied to send a navigation message and an authentication tag simultaneously, thereby reducing authentication latency. It can also make the authentication tag undetectable, thereby proactively protecting against spoofing attacks by avoiding the radar of spoofers in the first place.
Mitigation against spoofing attacks in GNSS is important. Anti-spoofing techniques can be categorized as either message- or signal-based. The message-based schemes, known as Navigation Message Authentication (NMA), can involve cryptographic operations to the navigation message. A core idea is to add signal features useful to verify the correctness of the received signals and to make it difficult for an attacker to alter them. Authentication and integrity of the transmitted message can be provided through asymmetric or symmetric cryptographic means, such as, for example, a digital signature or a message authentication code (hereafter referred to as authentication tag), respectively.
Referring to
The transmitter hides the transmission of u by superimposing u onto v. The superposition coding along with the successive interference cancellation can also provide the maximum possible transmission rate as it achieves the capacity region. The transmitted signal is given by
x=√{square root over (1−α)}vpv+√{square root over (α)}upu,
where α∈(0, 1) is the fraction of power allocated to the signature, and pv and pu are the spreading code for v and u, respectively. The amplitude of pv and pu is either +1 or −1 with equal probability. It can be shown that the transmission power of x is equal to S for all α, i.e. whether u is sent or not.
The receiver knowing the spreading code pv may despread the received signal to get
where N is the processing gain (number of chips per symbol) for v and n is the background noise. (pu·pv) denotes the inner (dot) product of pu and pv which is a sum of N independent and identically distributed Bernoulli random variables. Therefore, it can be modeled as a Gaussian random variable by the central limit theorem. The mean and the variance of the second term in (2) are equal to 0 and αS/N, respectively, assuming that pv and pu are random sequence. The elements n are complex Gaussian distributed with mean zero and variance σn2. Once v is known from zv, it can be cancelled from the received signal to get
Then, zu is despread by pu to get u.
A signal-level spoofing attack is to send a set of false signals 106 from a spoofer 108. The false signals 106 may be similar to the true signals but have different spreading code phases and carrier phases such that a false position/timing fix is induced at the victim receiver 104. The presence or absence of such signal-level spoofing attack can be detected by taking a cross-correlation between the signal received at one location with a nearly synchronous signal received at a remote (preferably trusted) station. An increased probability of detection may be demonstrated by utilizing distributed, low-cost receivers as opposed to one reference station. However, the increased probability of detection may require that signal samples are transmitted from one receiver to the other receiver in a secure manner.
The following examples illustrate particular properties and advantages of some of the embodiments of the present technology. Furthermore, these are examples of reduction to practice of the present technology and confirmation that the principles described in the present technology are therefore valid but should not be construed as in any way limiting the scope of the technology.
In some embodiments, a GNSS may include a transmitter (satellite) that may broadcast a navigation message v=(v1, . . . , vn) of length n bits, each of duration Ts, and its authentication tag u=(ui, . . . , um) of length m bits, each of duration Ts, to receivers. It can be assumed that u and v are codewords of length m and n bits, respectively. If the information bit rate is Rb (bits per second) and the code rate is r, then Ts=r/Rb. It may be assumed that E[uj]=E[vi]=0 and E[ujvi]=E[uj]E[vi] for all i, j. Further, it may be assumed that E[|uj|2]=E[|vi|]2=C. It may further be assumed that that the channel gain is 1. Hence, C represents the received signal power. Each navigation message bit and each authentication tag bit may spread by the spreading sequence pv and pu, respectively.
In the current state-of-the-art, u and v are sent in time division (TD) multiplexing mode as illustrated in part (a) of
The transmitter 300 sends the navigation message v and the authentication message u simultaneously over the same frequency band. This provides instantaneous authentication, as u is also received as soon as v is received. Authentication latency may be reduced by a factor of Tm/(Tm+Ta), where Tm is the time to receive the navigation message and Ta is that to receive the authentication message. Additionally, covertness is enhanced by making the presence of u undetectable at low signal-to-noise ratio (SNR) when v or pv is unknown.
To implement the technology, the transmitter generates two pseudo-random noise (PRN) sequences, pv and pu, and uses them to modulate (spread) the signals. The transmitted signal x can be expressed as:
where α is the fractional power allocated to u. The transmitter can adjust α to balance the power between v and u. Block diagrams of the transmitter are shown in
The receiver receives the signal y=Ax+n, where A represents the amplitude of the received signal and n is the noise. The receiver decodes v by correlating the received signal with pv and then cancels v from y. After that, the receiver decodes u by correlating the remaining signal with pu. It involves multiplying y by pv, integrating the product over one code symbol interval, and decoding v based on the integrator output. Then, v is canceled from y to get A√{square root over (α)}u·pu+n from which u is decoded.
Alternatively, implementation could involve generating the PRN pu independently from the PRN pv, without affecting the overall functionality of the transmitter. This modification may provide greater flexibility in the design of the system and could potentially allow for easier integration with existing technologies.
The transmitted signal in the proposed scheme can be expressed by
where g(t), t∈[0, Tc], is the impulse response of the pulse shaping filter, Tc is the chip duration, and N=Ts/Tc is the spreading gain (number of chips per code symbol) of the message and tag. Without loss of generality, we assume: ∫0T
The received signal is given by
respectively, where (K−1)C′ is the interference power from K−1 other satellites before despreading and N=Ts/Tc is the processing gain.
For the TD approach (conventional scheme), the SINR of v and u is given by
In GNSS, the interference power (K−1)C/N can be much smaller than the noise power N0/Ts. This may be due to the weak signal power (small C) and large processing gain (large N). In such a noise-limited system, transmitting additional messages along with the existing navigation message would not significantly affect the SINR of the navigation message. That is, there is room for sending additional messages without affecting the SINR of the navigation message. This is unlike the terrestrial cellular systems where interference is much stronger than the background noise (interference-limited) so that the transmission of additional messages degrades the SINR of other messages.
Since the multipath/delay spread on the spreading codes pv and pu are exactly the same, one searcher circuit for acquisition will suffice. When a marker is embedded into the spreading code for the spreading code authentication, the marker can be embedded onto pv only. Hence, the code tracking based on pu is not affected by the marker insertion on pv.
In this section, the decoding error probability for the navigation message v and the tag u is derived.
Lemma 1: For a given transmission rate R, received SINR Γ, and block length N, the decoding error probability has been approximated:
where p is the bit error rate (BER) before channel decoding and
is the capacity of binary symmetric channel with crossover probability p. The decoding error probability can be tight even for relatively small N, e.g., N=200.
Lemma 2: For the BPSK signal, the BER is given by
in AWGN channel without jamming. With pulsed jamming, the jammer is either on with probability p and off with probability 1−ρ. That is, ρ is the duty cycle of the jammer transmission. The resulting maximum average BER with the optimum duty cycle can be determined.
For the TD scheme, the decoding error probability of the navigation message of length n and the tag of length m are given by
with Γ in (10) and (11) replaced by γ.
For the SC scheme, the decoding error probability of the navigation message and the tag are given by
where pv and pu are given by (10) and (11) with F replaced by γv and γu, respectively, and
For n>m, one may stretch out the tag symbol durations such that the tag and the message are of the same length, as illustrated in
Stretching the tag length provides additional benefit of increasing the coherent integration time by a factor of n m compared to TD without affecting the effective data rate (bits per second). The GNSS signals are very weak, hence are vulnerable to jamming attack. The key to jamming suppression in the code tracking stage is to integrate longer and longer to average out the effects of the jammer noise. The required carrier-to-noise density (C/N0) for the code tracking, called the code loop tracking threshold, decreases as the coherent integration time increases. This threshold determines whether a GNSS receiver can lock on to the GNSS signal. Therefore, the code tracking can be accomplished at a lower carrier-to-noise-density by stretching the tag length, improving the tracking capability of a GNSS receiver. This can help improve the tracking of the navigation message.
The signal-to-interference-plus-noise power ratio (SINR) of the navigation message, v, and the tag, u, are given by
respectively.
The BER, pv and pu, of the message and the tag can be computed using Lemma 2 with Γ replaced by γv and γu, respectively. The decoding error probability of the message and the tag are given by
where Cv and Cu are given by (16) and (17), respectively.
Referring to
where ┌x┐ is the ceiling of x. Therefore, the SC/RS scheme can reduce the authentication latency by a factor of 1/(L(1+m/n)) compared to the conventional TD scheme. Part (c) of
The spreading codes, pv,1, . . . , pv,L and pu,1, . . . , pu,L, can be made orthogonal by multiplying the Walsh-Hadamard codes to the spreading code assigned to each satellite, such as the C/A code and P code. In this case, there will be no intra-interference, namely no interference between 2L segments within a satellite. However, the spreading codes across different satellites are not orthogonal.
On the receiver side, the synchronization/acquisition subsystem can be demanding, especially when the carrier-to-noise density is low. However, the receiver does not require an L-fold complexity increase in synchronization/acquisition. Since the multipath/delay spread on the parallel spreading codes are exactly the same, one searcher circuit for acquisition will suffice for all the parallel codes.
For the case of n/L>m, one may add n/L−m parity symbols to the authentication message u, resulting in a code rate of Lrm/n for the tag. The code rate for vl, l=1, . . . , L remains r because (v1, . . . , vL)=v. To maintain the same total transmission energy as in the TD scheme, the transmission power for SC/RS can be increased to
This yields the SINR of v and u as
respectively, where (K−1)C″ is the interference from other satellites and (L−1)(1−α)C″/L in (24) is the interference caused by other sub-codewords of the navigation message from the same satellite. Then, the decoding error probability of the navigation message of length n bits and the authentication tag of length n/L bits are given by:
respectively, where
are the bit error rate (BER) of the navigation message bits and the authentication tag bits, respectively.
The authentication error rate (AER) determines the expected rate at which the receiver cannot verify the authenticity of the navigation message. An authentication error occurs if the navigation message and/or the authentication tag are received in error. Hence, the AER is given by.
It depends on the number of navigation message bits, n, the number of authentication tag bits, m, and the power allocation a between them. In the presence of jamming, the processing gain plays a major role in suppressing the jamming power and reducing the AER.
If the time to send the navigation message and the authentication tag is T and the AER is Pa, then the average time between authentications (TBA) is given by:
where (32) follows from Σn=1∞nPan-1=1/(1−Pa)2 and (33) holds true for Pa<<1.
For the TD scheme in part (a) of
The authenticated throughput represents the amount of information that can be reliably delivered and verified by a receiver per channel use. In order for a message to be successfully delivered and verified, both the message and the tag need to be successfully decoded. Therefore, the authenticated throughput (bits per second) for SC is given by:
where the approximate authenticated throughput is maximized when Po,u=Po,v. It follows from the inequality X+Y≥2√(XY) for any X, Y≥0 and the minimum is achieved when X=Y. The authenticated throughput (bits per second) for TD is given by:
where the factor 1+m/n account for the additional transmission time for TD compared to SC.
Three innovative methods for reducing authentication latency in GNSS by superimposing the authentication tag onto the navigation message are proposed herein. A comprehensive evaluation was conducted, focusing on key performance metrics such as the Authentication Error Rate (AER), Time Between Authentications (TBA), and Authenticated Throughput.
Findings reveal that by superimposing the authentication tag (of length m bits) onto the navigation message (of length n bits), a remarkable reduction in authentication latency by a factor of n/(n+m) is achieved compared to the current state-of-the-art. Additionally, this approach provides a SNR gain of 1.5˜2 dB over the current state-of-the-art for AER ranging from 10−2 to 10−10.
To further reduce authentication latency, the option of segmenting the navigation message into multiple segments, allowing for simultaneous transmission alongside the authentication tag was explored. This approach demonstrated significant gains in authentication latency, promoting faster and more efficient verification processes.
Furthermore, the proposed method exhibited a substantial improvement in authenticated throughput compared to existing techniques. As a result, the approach may hold immense value in GNSS, where timely verification of the authenticity of received navigation messages remains crucial. These innovative methods pave the way for enhanced security and more reliable navigation systems.
While the present technology has been illustrated by a description of one or more embodiments thereof and while these embodiments have been described in considerable detail, they are not intended to restrict or in any way limit the scope of the appended claims to such detail. Additional advantages and modifications will readily appear to those skilled in the art. The technology in its broader aspects is therefore not limited to the specific details, representative apparatus and method, and illustrative examples shown and described. Accordingly, departures may be made from such details without departing from the scope of the general inventive concept.
Pursuant to 37 C.F.R. § 1.78(a)(4), this application claims the benefit of and priority to prior filed co-pending Provisional Application Ser. No. 63/579,347, filed Aug. 29, 2023, which is expressly incorporated herein by reference in its entirety.
The technology described herein may be manufactured and used by or for the Government of the United States for all governmental purposes without the payment of any royalty.
Number | Date | Country | |
---|---|---|---|
63579347 | Aug 2023 | US |