Navigation Message

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1377 Experts worldwide ranked by ideXlab platform

Kees De Jong - One of the best experts on this subject based on the ideXlab platform.

  • Integrity Monitoring of IGEX-98 Data – Part III: Broadcast Navigation Message Validation
    GPS Solutions, 2000
    Co-Authors: Niels Jonkman, Kees De Jong
    Abstract:

    At the Delft University of Technology (DUT), data of six stations participating in the first international GLONASS tracking campaign, IGEX-98, were analyzed with integrity monitoring software. The software was developed at the Department of Mathematical Geodesy and Positioning of DUT. The main function of the software is to detect slips and outliers in phase and code observations in real time. In addition, the software also allows the validation of the information contained in the broadcast Navigation Messages. The results of the IGEX-98 data analyses are presented in a three part series. In this third and final part of the series, GLONASS and GPS Navigation Message validation results will be discussed in detail. The first part was concerned with the availability of GLONASS observations (Jonkman & de Jong, 2000a), while in the second part, GLONASS slip and outlier statistics were considered (Jonkman & de Jong, 2000b). The discussion of the Navigation Message validation results concentrates on anomalies detected in the data of an IGEX-98 station in Switzerland. Data collected at this station from September 1998 to December 1999 was analyized. In all, 19 anomalies were detected by the integrity monitoring software, 8 in GLONASS Messages and 11 in GPS Messages. The cause of the anomalies was established by evaluating the original data files, studying official bulletins of the GLONASS and GPS ground segments, and in some cases tracing the anomaly through the complete IGEX-98 network. © 2000 John Wiley & Sons, Inc.

  • integrity monitoring of igex 98 data part iii broadcast Navigation Message validation
    Gps Solutions, 2000
    Co-Authors: Niels Jonkman, Kees De Jong
    Abstract:

    At the Delft University of Technology (DUT), data of six stations participating in the first international GLONASS tracking campaign, IGEX-98, were analyzed with integrity monitoring software. The software was developed at the Department of Mathematical Geodesy and Positioning of DUT. The main function of the software is to detect slips and outliers in phase and code observations in real time. In addition, the software also allows the validation of the information contained in the broadcast Navigation Messages. The results of the IGEX-98 data analyses are presented in a three part series. In this third and final part of the series, GLONASS and GPS Navigation Message validation results will be discussed in detail. The first part was concerned with the availability of GLONASS observations (Jonkman & de Jong, 2000a), while in the second part, GLONASS slip and outlier statistics were considered (Jonkman & de Jong, 2000b). The discussion of the Navigation Message validation results concentrates on anomalies detected in the data of an IGEX-98 station in Switzerland. Data collected at this station from September 1998 to December 1999 was analyized. In all, 19 anomalies were detected by the integrity monitoring software, 8 in GLONASS Messages and 11 in GPS Messages. The cause of the anomalies was established by evaluating the original data files, studying official bulletins of the GLONASS and GPS ground segments, and in some cases tracing the anomaly through the complete IGEX-98 network. © 2000 John Wiley & Sons, Inc.

Niels Jonkman - One of the best experts on this subject based on the ideXlab platform.

  • Integrity Monitoring of IGEX-98 Data – Part III: Broadcast Navigation Message Validation
    GPS Solutions, 2000
    Co-Authors: Niels Jonkman, Kees De Jong
    Abstract:

    At the Delft University of Technology (DUT), data of six stations participating in the first international GLONASS tracking campaign, IGEX-98, were analyzed with integrity monitoring software. The software was developed at the Department of Mathematical Geodesy and Positioning of DUT. The main function of the software is to detect slips and outliers in phase and code observations in real time. In addition, the software also allows the validation of the information contained in the broadcast Navigation Messages. The results of the IGEX-98 data analyses are presented in a three part series. In this third and final part of the series, GLONASS and GPS Navigation Message validation results will be discussed in detail. The first part was concerned with the availability of GLONASS observations (Jonkman & de Jong, 2000a), while in the second part, GLONASS slip and outlier statistics were considered (Jonkman & de Jong, 2000b). The discussion of the Navigation Message validation results concentrates on anomalies detected in the data of an IGEX-98 station in Switzerland. Data collected at this station from September 1998 to December 1999 was analyized. In all, 19 anomalies were detected by the integrity monitoring software, 8 in GLONASS Messages and 11 in GPS Messages. The cause of the anomalies was established by evaluating the original data files, studying official bulletins of the GLONASS and GPS ground segments, and in some cases tracing the anomaly through the complete IGEX-98 network. © 2000 John Wiley & Sons, Inc.

  • integrity monitoring of igex 98 data part iii broadcast Navigation Message validation
    Gps Solutions, 2000
    Co-Authors: Niels Jonkman, Kees De Jong
    Abstract:

    At the Delft University of Technology (DUT), data of six stations participating in the first international GLONASS tracking campaign, IGEX-98, were analyzed with integrity monitoring software. The software was developed at the Department of Mathematical Geodesy and Positioning of DUT. The main function of the software is to detect slips and outliers in phase and code observations in real time. In addition, the software also allows the validation of the information contained in the broadcast Navigation Messages. The results of the IGEX-98 data analyses are presented in a three part series. In this third and final part of the series, GLONASS and GPS Navigation Message validation results will be discussed in detail. The first part was concerned with the availability of GLONASS observations (Jonkman & de Jong, 2000a), while in the second part, GLONASS slip and outlier statistics were considered (Jonkman & de Jong, 2000b). The discussion of the Navigation Message validation results concentrates on anomalies detected in the data of an IGEX-98 station in Switzerland. Data collected at this station from September 1998 to December 1999 was analyized. In all, 19 anomalies were detected by the integrity monitoring software, 8 in GLONASS Messages and 11 in GPS Messages. The cause of the anomalies was established by evaluating the original data files, studying official bulletins of the GLONASS and GPS ground segments, and in some cases tracing the anomaly through the complete IGEX-98 network. © 2000 John Wiley & Sons, Inc.

Gang Ou - One of the best experts on this subject based on the ideXlab platform.

  • design of Navigation Message authentication assisted by ground based augmentation systems
    China Satellite Navigation Conference, 2018
    Co-Authors: Muzi Yuan, Xiaomei Tang, Gang Ou
    Abstract:

    Spoofing attack organized by generating fake Navigation signal can precisely manipulate PNT output of target receiver. In this paper an authenticated augmentation Message for GBAS is designed to obtain the authentication for both Navigation Message from satellites and augmentation Message from GBAS broadcasters. The proposed Navigation Message authentication method has an advantage in efficiency and authentication delay compared with legacy schemes integrated into satellite signal while has an equally high security level as other schemes.

  • an implementation of Navigation Message authentication with reserved bits for civil bds anti spoofing
    China Satellite Navigation Conference, 2017
    Co-Authors: Muzi Yuan, Zhicheng Lv, Huaming Chen, Jingyuan Li, Gang Ou
    Abstract:

    Since Navigation Message authentication (NMA) requires a modification in space segment and the signal broadcasted by satellites, negligent implementations of NMA may cause a failure in legacy GNSS receiver to process civil GNSS signal. This paper proposes an implementation of NMA applying reserved bits as signature area. Digital signature and key chain algorithms are employed to improve security and efficiency of the implement. In additional, performance of this implementation is investigated.

  • an optimized low power consumption tracking algorithm based on Navigation Message structure for weak signals
    Applied Mechanics and Materials, 2015
    Co-Authors: Feng Tian, Yang Bo Huang, Bo Xu, Gang Ou
    Abstract:

    In order to reduce the power consumption of handset GNSS receivers, we present a novel algorithm that tracks signals at fixed positions of the Navigation Message in an intermittent mode. The tracking channels only run during the beginning part of the Message frame. In the rest they remain in idle state, to reduce power consumption of the channel. The beginning position of each Message frame can be estimated accurately, and the beginning Messages are constant or can be estimated, thus the coherent integration time can exceed one Navigation bit, which can improve the Doppler frequency estimated accuracy. At the fixed position of the frame, the tracking channel only tracks the pseudo-code phase, and does not track the carrier frequency and phase. This algorithm can keep stable tracking for weak signals with 28 dBHz carrier-to-noise ratio (C/N0), while using only 2% of the power required by the computation associated with the traditional tracking.

  • Rapid BCH Coding for Satellite Navigation Message Based on Look-Up Table
    Lecture Notes in Electrical Engineering, 2012
    Co-Authors: Xin Zhang, Gang Ou
    Abstract:

    BCH codes have strict algebraic structure, and are easy to implement coding and decoding. As a class of code which is in-depth studied, BCH codes are widely used in all kinds of digital systems. When implementing coding of satellite Navigation Message, BCH coding speed has an important influence on the system performance. The traditional single-bit cyclic shift coding method is slow, and taking up much microprocessor processing time. After the analysis of the characteristics of linear block codes, a multi-bit BCH rapid coding method based on look-up table was proposed in this paper, which can be applied to arbitrary code length, and the processing time occupied by this method decrease significantly. The method was applied to the encoding process of Navigation Message in the BeiDou2 Navigation signal simulator, and achieved a high performance.

Christian Wullems - One of the best experts on this subject based on the ideXlab platform.

  • ICL-GNSS - Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes
    2016 International Conference on Localization and GNSS (ICL-GNSS), 2016
    Co-Authors: Gianluca Caparra, Silvia Sturaro, Nicola Laurenti, Christian Wullems
    Abstract:

    In the proposals for Global Navigation Satellite Systems (GNSS) Navigation Message Authentication (NMA) that are based on adapting the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocol, the length of the one-time keys is limited (e.g. to 80 bits) by the low transmission rate. As a consequence, the hash function that is used to build the one-way key chain is constructed having a longer, secure hash function (e.g. SHA-256), preceded by a time-varying yet deterministic padding of the input and followed by a truncation of the output. We evaluate the impact of this construction on the collision resistance of the resulting hash function and of the whole chain, and show that with current proposed parameters, combined with the use of efficient hashing hardware, it can lead to a feasible attack with significant collision probability. The collision can be leveraged to mount a long lasting spoofing attack, where the victim receiver accepts all the one time keys and the Navigation Messages transmitted by the attacker as authentic. We conclude by suggesting possible modifications to make TESLA-based NMA more robust to such attacks.

  • Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes
    Proceedings of 2016 International Conference on Localization and GNSS ICL-GNSS 2016, 2016
    Co-Authors: Gianluca Caparra, Silvia Sturaro, Nicola Laurenti, Christian Wullems
    Abstract:

    ? 2016 IEEE.In the proposals for Global Navigation Satellite Systems (GNSS) Navigation Message Authentication (NMA) that are based on adapting the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocol, the length of the one-time keys is limited (e.g. to 80 bits) by the low transmission rate. As a consequence, the hash function that is used to build the one-way key chain is constructed having a longer, secure hash function (e.g. SHA-256), preceded by a time-varying yet deterministic padding of the input and followed by a truncation of the output. We evaluate the impact of this construction on the collision resistance of the resulting hash function and of the whole chain, and show that with current proposed parameters, combined with the use of efficient hashing hardware, it can lead to a feasible attack with significant collision probability. The collision can be leveraged to mount a long lasting spoofing attack, where the victim receiver accepts all the one time keys and the Navigation Messages transmitted by the attacker as authentic. We conclude by suggesting possible modifications to make TESLA-based NMA more robust to such attacks.

  • signal authentication and integrity schemes for next generation global Navigation satellite systems
    Centre for Accident Research & Road Safety - Qld (CARRS-Q); Faculty of Health; Institute of Health and Biomedical Innovation, 2005
    Co-Authors: Christian Wullems, Oscar Pozzobon, Kurt Kubik
    Abstract:

    This paper describes a number of techniques for GNSS Navigation Message authentication. A detailed analysis of the security facilitated by Navigation Message authentication is given. The analysis takes into consideration the risk of critical applications that rely on GPS including transportation, finance and telecommunication networks. We propose a number of cryptographic authentication schemes for Navigation data authentication. These authentication schemes provide authenticity and integrity of the Navigation data to the receiver. Through software simulation, the performance of the schemes is quantified. The use of software simulation enables the collection of authentication performance data of different data channels, and the impact of various schemes on the infrastructure and receiver. Navigation Message authentication schemes have been simulated at the proposed data rates of Galileo and GPS services, for which the resulting performance data is presented. This paper concludes by making recommendations for optimal implementation of Navigation Message authentication for Galileo and next generation GPS systems.

Zhijun Wu - One of the best experts on this subject based on the ideXlab platform.

  • BD-II NMA&SSI: An Scheme of Anti-Spoofing and Open BeiDou II D2 Navigation Message Authentication
    IEEE Access, 2020
    Co-Authors: Zhijun Wu, Yun Zhang
    Abstract:

    Due to openness and lack of authentication, like other members of the Global Navigation Satellite System (GNSS) Club, BeiDou-II civilian Navigation signals are vulnerable to all kinds of spoofing attacks. As a result, both the positioning and timing functions of BeiDou-II civil satellite Navigation are likely to be controlled by the spoofer. In this paper, an anti-spoofing scheme of BeiDou-II Navigation Message Authentication & Spread Spectrum Information (BD-II NMA&SSI) is proposed by using SM cryptographic algorithms and spread spectrum information to resist spoofing attacks. The SM cryptographic algorithms are used for generating authentication information to detect spoofing attacks. The spread spectrum information is to protect the authentication information in the D2 Navigation Messages from modification. Experimental results show that the scheme guarantees the authenticity of BD-II satellite Navigation Messages, meets the requirement of anti-spoofing and takes a rather less effect on the satellite Navigation system.

  • bd ii nma ssi an scheme of anti spoofing and open beidou ii d2 Navigation Message authentication
    IEEE Access, 2020
    Co-Authors: Zhijun Wu, Yun Zhang
    Abstract:

    Due to openness and lack of authentication, like other members of the Global Navigation Satellite System (GNSS) Club, BeiDou-II civilian Navigation signals are vulnerable to all kinds of spoofing attacks. As a result, both the positioning and timing functions of BeiDou-II civil satellite Navigation are likely to be controlled by the spoofer. In this paper, an anti-spoofing scheme of BeiDou-II Navigation Message Authentication & Spread Spectrum Information (BD-II NMA&SSI) is proposed by using SM cryptographic algorithms and spread spectrum information to resist spoofing attacks. The SM cryptographic algorithms are used for generating authentication information to detect spoofing attacks. The spread spectrum information is to protect the authentication information in the D2 Navigation Messages from modification. Experimental results show that the scheme guarantees the authenticity of BD-II satellite Navigation Messages, meets the requirement of anti-spoofing and takes a rather less effect on the satellite Navigation system.

  • ECDSA-Based Message Authentication Scheme for BeiDou-II Navigation Satellite System
    IEEE Transactions on Aerospace and Electronic Systems, 2019
    Co-Authors: Zhijun Wu
    Abstract:

    This paper proposes a BeiDou-II Navigation Message authentication scheme to defend against the generating spoofing attacks. In this scheme, a digital signature is generated by the elliptic curve digital signature algorithm and is inserted into the reserved bits of the BeiDou-II Navigation Message. This signature will verify the integrity and authenticity of the Navigation data to avoid entity masquerade and data tampering. Furthermore, the key exchange process is also designed through the short Message service or digital certificate. The effectiveness and security of the scheme is evaluated in the simulation. The results indicate that the authentication of BeiDou-II Navigation Message can be realized in the harsh environment, and the resistance ability of civil BeiDou-II against a spoofing attack could be enhanced by this scheme.