Skip to main content

Main menu

  • Home
  • Current Issue
  • Archive
  • About Us
    • About NAVIGATION
    • Editorial Board
    • Peer Review Statement
    • Open Access
  • More
    • Email Alerts
    • Info for Authors
    • Info for Subscribers
  • Other Publications
    • ion

User menu

  • My alerts

Search

  • Advanced search
NAVIGATION: Journal of the Institute of Navigation
  • Other Publications
    • ion
  • My alerts
NAVIGATION: Journal of the Institute of Navigation

Advanced Search

  • Home
  • Current Issue
  • Archive
  • About Us
    • About NAVIGATION
    • Editorial Board
    • Peer Review Statement
    • Open Access
  • More
    • Email Alerts
    • Info for Authors
    • Info for Subscribers
  • Follow ion on Twitter
  • Visit ion on Facebook
  • Follow ion on Instagram
  • Visit ion on YouTube
Research ArticleOriginal Article
Open Access

Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication

Jason Anderson, Sherman Lo and Todd Walter
NAVIGATION: Journal of the Institute of Navigation September 2024, 71 (3) navi.655; DOI: https://doi.org/10.33012/navi.655
Jason Anderson
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
Sherman Lo
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
Todd Walter
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
  • Article
  • Figures & Data
  • Supplemental
  • References
  • Info & Metrics
  • PDF
Loading

Article Figures & Data

Figures

  • Additional Files
  • FIGURE 1
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 1

    A diagram illustrating the release time of specific information in the context of TESLA

    Each arrow represents a one-way operation, admitting no efficient algorithm to guess the preimage of each arrow. The top of the diagram is the TESLA chain used for all other authentication, including navigation message authentication. The red lines indicate inverted sections of the spreading code among the total n available. The red lines correspond to pseudorandom integers derived via Algorithms 1 and 2. “Hash point” comes from our terminology in Anderson et al. (2022a), where the provider uses TESLA secrets for many different authentication aspects (e.g., navigation message authentication).

  • ALGORITHM 1
    • Download figure
    • Open in new tab
    • Download powerpoint
    ALGORITHM 1

    A function that uniformly selects a pseudorandom combination of integers from a pseudorandom seed

  • ALGORITHM 2
    • Download figure
    • Open in new tab
    • Download powerpoint
    ALGORITHM 2

    A one-way random integer function based on HMAC (Dang, 2008)

  • FIGURE 2
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 2

    Plot of the upper-tail probability of the distribution of Embedded Image of a single watermark with the system parameters of our example GPS C/A signal described in Section 3.2.1 The adversary guesses random watermarks. Each line corresponds to a specific attack strategy s, the number of chips the adversary elects to invert. We plot only one tenth of all s results in gray for a clean figure. Some results are colored to show trends. The plot also marks the appropriate bound for a 32-bit security level.

  • FIGURE 3
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 3

    Diagram of our proposed modified matched filter, which produces the statistic Y for determining the authenticity of a cryptographically watermarked signal

    R− and Embedded Image are reversed signal replicas (including carrier, sampling effects, and coherent integration length) without and with a watermark, respectively. Embedded Image forms the filter kernel. K is a gain selected later for mathematical conciseness of the derived probability distributions. While a real receiver may compute the product sum, we are explicit with our use of the valid convolution to aid with propagating noise. We include the relation between the Y filter and a typical GNSS tracking loop producing prompt in-phase and quadrature correlation values and the required memory buffer.

  • FIGURE 4
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 4

    False alert (FA) and missed detection (MD) probabilities of various scheme designs and situations for a given decision boundary on Y

    The parameters are based on a theoretical L1C watermarked signal, and the signal power is based on observations of L1C signals from Section 5. For the (n, r) L1C scheme, the 10230-chip sequence is divided into 1023 10-chip sections, and individual chip sections are inverted. For the (10n, 10r) L1C scheme, 520 of the 10230 chips are inverted in a watermark. For situations in which the integration time is longer than a single spreading code (e.g., 10T, 100T), the curve is computed via repeated convolution, as described in Section 4.1. The line types (i.e., solid, dashed, or dotted) indicate corresponding MD and FA probabilities. For instance, each dashed MD line corresponds to the red dashed FA line.

  • FIGURE 5
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 5

    Comparison of our predicted distributions with postprocessed GPS C/A observations obtained via a 25-MHz software-defined radio (based on a mirrored problem described in Section 5)

    Over a 60-s time period, we obtain 6000 measurements of the proposed statistic Y, each computed over a 10-ms integration within a converged tracking loop. Each millisecond contains its own mirrored watermark such that each Y is related to 10 independent watermarks, and we computed Embedded Image via repeated convolution. In our scenario, the adversary has elected to randomly guess s = 52 chips to flip per millisecond against r = 52 chips flipped by the provider.

  • FIGURE 6
    • Download figure
    • Open in new tab
    • Download powerpoint
    FIGURE 6

    Comparison of our predicted distributions with postprocessed GPS L1C observations obtained via a 25-MHz software-defined radio (based on a mirrored problem described in Section 5)

    Over a 60-s time period, we collected 6000 measurements of the proposed statistic Y, each computed over a 10-ms integration within a converged tracking loop. Each 10-ms duration contains its own mirrored watermark, where sections of 10 chips each were flipped together. In our scenario, the adversary has elected to randomly guess s = 52 chip sections to flip per millisecond against r = 52 chip sections flipped by the provider. Because 52 10-chip sections are flipped, a total of 520 chips are inverted per watermark.

Additional Files

  • Figures
  • Video Abstract

PreviousNext
Back to top

In this issue

NAVIGATION: Journal of the Institute of Navigation: 71 (3)
NAVIGATION: Journal of the Institute of Navigation
Vol. 71, Issue 3
Fall 2024
  • Table of Contents
  • Index by author
Print
Download PDF
Article Alerts
Sign In to Email Alerts with your Email Address
Email Article

Thank you for your interest in spreading the word on NAVIGATION: Journal of the Institute of Navigation.

NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
(Your Name) has sent you a message from NAVIGATION: Journal of the Institute of Navigation
(Your Name) thought you would like to see the NAVIGATION: Journal of the Institute of Navigation web site.
Citation Tools
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
Jason Anderson, Sherman Lo, Todd Walter
NAVIGATION: Journal of the Institute of Navigation Sep 2024, 71 (3) navi.655; DOI: 10.33012/navi.655

Citation Manager Formats

  • BibTeX
  • Bookends
  • EasyBib
  • EndNote (tagged)
  • EndNote 8 (xml)
  • Medlars
  • Mendeley
  • Papers
  • RefWorks Tagged
  • Ref Manager
  • RIS
  • Zotero
Share
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
Jason Anderson, Sherman Lo, Todd Walter
NAVIGATION: Journal of the Institute of Navigation Sep 2024, 71 (3) navi.655; DOI: 10.33012/navi.655
Twitter logo Facebook logo Mendeley logo
  • Tweet Widget
  • Facebook Like
  • Google Plus One
Bookmark this article

Jump to section

  • Article
    • Abstract
    • 1 INTRODUCTION
    • 2 SECURE WATERMARK SELECTION
    • 3 HYPERGEOMETRIC SUBTRACTED MATCH
    • 4 RECEIVER OBSERVABLE SECURITY
    • 5 EXPERIMENTAL VALIDATION
    • 6 CONCLUSIONS
    • HOW TO CITE THIS ARTICLE
    • APPENDIX A PROOF OF FLOYD’S ALGORITHM
    • REFERENCES
  • Figures & Data
  • Supplemental
  • References
  • Info & Metrics
  • PDF

Related Articles

  • Google Scholar

Cited By...

  • No citing articles found.
  • Google Scholar

More in this TOC Section

  • ATLAS: Orbit Determination and Time Transfer for a Lunar Radio Navigation System
  • GNSS L5/E5a Code Properties in the Presence of a Blanker
  • Robust Interference Mitigation in GNSS Snapshot Receivers
Show more Original Article

Similar Articles

Keywords

  • authentication
  • security
  • signal authentication
  • TESLA
  • watermarking

Unless otherwise noted, NAVIGATION content is licensed under a Creative Commons CC BY 4.0 License.

© 2025 The Institute of Navigation, Inc.

Powered by HighWire