Authenticated time for detecting GNSS attacks

02/22/2022
by   M. Spanghero, et al.
0

Information cross-validation can be a powerful tool to detect manipulated, dubious GNSS data. A promising approach is to leverage time obtained over networks a mobile device can connect to, and detect discrepancies between the GNSS-provided time and the network time. The challenge lies in having reliably both accurate and trustworthy network time as the basis for the GNSS attack detection. Here, we provide a concrete proposal that leverages, together with the network time servers, the nearly ubiquitous IEEE 802.11 (Wi-Fi) infrastructure. Our framework supports application-layer, secure and robust real time broadcasting by Wi-Fi Access Points (APs), based on hash chains and infrequent digital signatures verification to minimize computational and communication overhead, allowing mobile nodes to efficiently obtain authenticated and rich time information as they roam. We pair this method with Network Time Security (NTS), for enhanced resilience through multiple sources, available, ideally, simultaneously. We analyze the performance of our scheme in a dedicated setup, gauging the overhead for authenticated time data (Wi-Fi timestamped beacons and NTS). The results show that it is possible to provide security for the external to GNSS time sources, with minimal overhead for authentication and integrity, even when the GNSS-equipped nodes are mobile, and thus have short interactions with the Wi-Fi infrastructure and possibly intermittent Internet connectivity, as well as limited resources.

READ FULL TEXT
research
02/22/2022

Protecting GNSS-based Services using Time Offset Validation

Global navigation satellite systems (GNSS) provide pervasive accurate po...
research
04/29/2023

ZIRCON: Zero-watermarking-based approach for data integrity and secure provenance in IoT networks

The Internet of Things (IoT) is integrating the Internet and smart devic...
research
07/27/2021

Practical quantum multiparty signatures using quantum key distribution networks

Digital signatures are widely used for providing security of communicati...
research
08/14/2022

Aggregation and probabilistic verification for data authentication in VANETs

Vehicular ad-hoc networks, where traffic information is distributed from...
research
01/15/2021

CARE: Lightweight Attack Resilient Secure Boot Architecturewith Onboard Recovery for RISC-V based SOC

Recent technological advancements have proliferated the use of small emb...
research
07/11/2021

BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains

With the rapidly evolving next-generation systems-of-systems, we face ne...
research
05/05/2023

Detecting GNSS misbehavior leveraging secure heterogeneous time sources

Civilian Global Navigation Satellite Systems (GNSS) vulnerabilities are ...

Please sign up or login with your details

Forgot password? Click here to reset