Signal Authentication in Trusted Satellite Navigation Receivers

  • Markus G. KuhnEmail author
Part of the Information Security and Cryptography book series (ISC)


Physical location can be an important security parameter, whether for location-based access control or to audit the whereabouts of goods and people. In outdoor applications, location is often most easily determined with a global navigation satellite system (GNSS) receiver. This means today primarily GPS [9, 11], but the list is growing (GLONASS, Galileo, Beidou/Compass, etc.). Each of these operates a constellation of the Earth-orbiting satellites that broadcast a high-precision time signal, along with a low bit rate data stream (50–1,000 bit/s) that carries orbital position (ephemeris) predictions and calibration data.


Global Navigation Satellite System Global Navigation Satellite System Spreading Sequence Tracking Loop Global Navigation Satellite System Receiver 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work was supported by the European Commission under FP7 grant 228443 (TIGER project).


  1. 1.
    R.J. Anderson, in On the Security of Digital Tachographs. European Symposium on Research in Computer Security (ESORICS), Louvain-la-Neuve, Belgium, 16–18 Sept 1998. Lecture Notes in Computer Science, vol. 1485 (Springer, 1998), pp. 111–125Google Scholar
  2. 2.
    R.J. Anderson, M.G. Kuhn, in Tamper Resistance — A Cautionary Note. The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, CA, USA, 18–21 Nov 1996 (USENIX Association, 1996) pp. 1–11Google Scholar
  3. 3.
    Anti-tamper physical security for electronic hardware. GORE
  4. 4.
    K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, S.H. Jensen, A Software-Defined GPS and Galileo Receiver (Birkhäuser, Boston, MA, 2007)zbMATHGoogle Scholar
  5. 5.
    J.A. Garay, J. Staddon, A. Wool, in Long-Lived Broadcast Encryption. Advances in Cryptology (CRYPTO), Santa Barbara, CA, USA, 20–24 Aug 2000. Lecture Notes in Computer Science, vol. 1880 (Springer, 2000), pp. 333–352Google Scholar
  6. 6.
    GPS Interface Control Document, ICD-GPS-200C, 2003-01-14Google Scholar
  7. 7.
    T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, B.W. O’Hanlon, P.M. Kintner, Assessing the spoofing threat. GPS World 20(1), 28–38 (Jan 2009)Google Scholar
  8. 8.
    S. Joshi, Addressing the physical security of encryption keys. Maxim Eng. J. 62, 7–11 (2008) Google Scholar
  9. 9.
    E.D. Kaplan, C.J. Hegarty, Understanding GPS: Principles and Applications, 2nd edn. (Artech House, Norwood, MA 2006)Google Scholar
  10. 10.
    M.G. Kuhn in An Asymmetric Security Mechanism for Navigation Signals. 6th Information Hiding Workshop, Toronto, Canada, 23–25 May 2004. Lecture Notes in Computer Science, vol. 3200 (Springer, 2004), pp. 239–252Google Scholar
  11. 11.
    B.W. Parkinson, J.J. Spilker Jr., Global Positioning System: Theory and Applications – Volume I. Progress in Astronautics and Aeronautics, Vol. 163 (American Institute of Aeronautics and Astronautics, Washington, DC, 1996), ISBN 1-56347-106-XGoogle Scholar
  12. 12.
    M.L. Psiaki, Spoofing Detection for Civilian GNSS Signals via Aiding from Encrypted Signals, Savannah, GA, USA, 22–25 Sept (ION GNSS, 2009)Google Scholar
  13. 13.
    L. Scott, in Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems. Proceedings of ION GPS/GNSS (Institute of Navigation, Portland, OR, USA, 9–12 Sept 2003), pp. 1543–1552Google Scholar
  14. 14.
    S.H. Weingart, Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses. Cryptographic Hardware and Embedded Systems (CHES), Worcester, MA, USA, 17–18 Aug 2000. Lecture Notes in Computer Science, vol. 1965 (Springer, 2000), pp. 45–68Google Scholar
  15. 15.
    H. Wen, P.Y.-R. Huang, J. Dyer, J. Archinal, J. Fagan, Countermeasures for GPS Signal Spoofing, Long Beach, CA, USA, 13–16 Sept 2005 (ION GNSS, 2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations