Skip to main content

Main menu

  • Home
  • Current Issue
  • Archive
  • About Us
    • About NAVIGATION
    • Editorial Board
    • Peer Review Statement
    • Open Access
  • More
    • Email Alerts
    • Info for Authors
    • Info for Subscribers
  • Other Publications
    • ion

User menu

  • My alerts

Search

  • Advanced search
NAVIGATION: Journal of the Institute of Navigation
  • Other Publications
    • ion
  • My alerts
NAVIGATION: Journal of the Institute of Navigation

Advanced Search

  • Home
  • Current Issue
  • Archive
  • About Us
    • About NAVIGATION
    • Editorial Board
    • Peer Review Statement
    • Open Access
  • More
    • Email Alerts
    • Info for Authors
    • Info for Subscribers
  • Follow ion on Twitter
  • Visit ion on Facebook
  • Follow ion on Instagram
  • Visit ion on YouTube
Research ArticleOriginal Article
Open Access

Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication

Jason Anderson, Sherman Lo and Todd Walter
NAVIGATION: Journal of the Institute of Navigation September 2024, 71 (3) navi.655; DOI: https://doi.org/10.33012/navi.655
Jason Anderson
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
Sherman Lo
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
Todd Walter
1Stanford University
  • Find this author on Google Scholar
  • Find this author on PubMed
  • Search for this author on this site
  • Article
  • Figures & Data
  • Supplemental
  • References
  • Info & Metrics
  • PDF
Loading

REFERENCES

  1. ↵
    1. Air Force Research Laboratory
    . (2019). IS-AGT-100: Chips Message Robust Authentication (Chimera) enhancement for the L1C signal: Space segment/user segment interface (tech. rep.). Air Force Research Laboratory, Space Vehicles Director.
  2. ↵
    1. Anderson, J.,
    2. Lo, S.,
    3. Neish, A., &
    4. Walter, T.
    (2023). Authentication of satellite-based augmentation systems with over-the-air rekeying schemes. NAVIGATION, 70 (3). https://doi.org/10.33012/navi.595
  3. ↵
    1. Anderson, J.,
    2. Lo, S., &
    3. Walter, T.
    (2022a). Efficient and secure use of cryptography for watermarked signal authentication. Proc. of the 2022 International Technical Meeting of the Institute of Navigation, Long Beach, CA, 68–82. https://doi.org/10.33012/2022.18228
  4. ↵
    1. Anderson, J.,
    2. Lo, S., &
    3. Walter, T.
    (2022b). Time synchronization for TESLA-based GNSS-enabled systems. Proc. of the 35th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2022), Denver, CO, 3408–3417. https://doi.org/10.33012/2022.18442
  5. ↵
    1. Anderson, J. M.,
    2. Carroll, K. L.,
    3. DeVilbiss, N. P.,
    4. Gillis, J. T.,
    5. Hinks, J. C.,
    6. O’Hanlon, B. W.,
    7. Rushanan, J. J.,
    8. Scott, L., &
    9. Yazdi, R. A.
    (2017). Chips-message Robust Authentication (Chimera) for GPS civilian signals. Proc. of the 30th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2017), Portland, OR, 2388–2416. https://doi.org/10.33012/2017.15206
  6. ↵
    1. Arizabaleta, M.,
    2. Gkougkas, E., &
    3. Pany, T.
    (2019). A feasibility study and risk assessment of security code estimation and replay (SCER) attacks. Proc. of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2019), Miami, FL, 1039–1050. https://doi.org/10.33012/2019.17041
  7. ↵
    1. Bentley, J. L.
    (1987). A sample of brilliance. Communications of the ACM, 30(9), 754–757. https://doi.org/10.1145/30401.315746
  8. ↵
    1. Bernabeu, J.,
    2. Palafox, F.,
    3. Li, Y., &
    4. Akos, D. M.
    (2022). A collection of SDRs for global navigation satellite systems (GNSS). Proc. of the 2022 International Technical Meeting of The Institute of Navigation, Long Beach, CA, 906–919. https://github.com/gnsscusdr/CU-SDR-Collection. https://doi.org/10.33012/2022.18230
  9. ↵
    1. Blatter, C.
    (n.d.). What’s the proof of correctness for Robert Floyd’s algorithm for selecting a single, random combination of values? https://math.stackexchange.com/q/178723
  10. ↵
    1. Caparra, G., &
    2. Curran, J. T.
    (2018). On the achievable equivalent security of GNSS ranging code encryption. Proc. of the 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, CA, 956–966. https://doi.org/10.1109/PLANS.2018.8373474
  11. ↵
    1. Dang, Q.
    (2008). The keyed-hash message authentication code (HMAC). https://doi.org/10.6028/NIST.FIPS.198-1
  12. ↵
    1. Falletti, E.,
    2. Pini, M., &
    3. Presti, L. L.
    (2011). Low complexity carrier-to-noise ratio estimators for GNSS digital receivers. IEEE Transactions on Aerospace and Electronic Systems, 47(1), 420–437. https://doi.org/10.1109/TAES.2011.5705684
  13. ↵
    1. Haykin, S.
    (1988). Digital communications. John Wiley & Sons, Inc. https://www.wiley.com/en-us/Digital+Communication+Systems%2C+1st+Edition-p-9781118544051
  14. ↵
    1. Hinks, J.,
    2. Gillis, J. T.,
    3. Loveridge, P.,
    4. Miller, S.,
    5. Myer, G.,
    6. Rushanan, J. J., &
    7. Stoyanov, S.
    (2021). Signal and data authentication experiments on NTS-3. Proc. of the 34th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2021), St. Louis, MO, 3621–3641. https://doi.org/10.33012/2021.17964
  15. ↵
    1. Humphreys, T.
    (2013). Detection strategy for cryptographic GNSS anti-spoofing. IEEE Transactions on Aerospace and Electronic Systems, 49(2), 1073–1090. https://doi.org/10.1109/TAES.2013.6494400
  16. ↵
    1. O’Driscoll, C.,
    2. Scuccato, T.,
    3. DallaChiara, A.,
    4. Pany, T.,
    5. Arizabaleta-Diez, M., &
    6. Hameed, M.
    (2022). The attack agnostic defence: A spoofing detection metric for secure spreading sequences. Proc. of the NAVITEC 2022, Noordwijk, Netherlands. https://www.researchgate.net/publication/366066556_THE_ATTACK_AGNOSTIC_DEFENCE_A_SPOOFING_DETECTION_METRIC_FOR_SECURE_SPREADING_SEQUENCES
  17. ↵
    1. O’Hanlon, B.,
    2. Rushanan, J. J.,
    3. Hegarty, C.,
    4. Anderson, J.,
    5. Walter, T., &
    6. Lo, S.
    (2022). SBAS signal authentication. Proc. of the 35th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2022), Denver, CO, 3369–3377. https://doi.org/10.33012/2022.18443
  18. ↵
    1. Scott, L.
    (2003). Anti-spoofing & authenticated signal architectures for civil navigation systems. Proc. of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS/GNSS 2003), Portland, OR, 1543–1552. https://www.ion.org/publications/abstract.cfm?articleID=5339
PreviousNext
Back to top

In this issue

NAVIGATION: Journal of the Institute of Navigation: 71 (3)
NAVIGATION: Journal of the Institute of Navigation
Vol. 71, Issue 3
Fall 2024
  • Table of Contents
  • Index by author
Print
Download PDF
Article Alerts
Sign In to Email Alerts with your Email Address
Email Article

Thank you for your interest in spreading the word on NAVIGATION: Journal of the Institute of Navigation.

NOTE: We only request your email address so that the person you are recommending the page to knows that you wanted them to see it, and that it is not junk mail. We do not capture any email address.

Enter multiple addresses on separate lines or separate them with commas.
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
(Your Name) has sent you a message from NAVIGATION: Journal of the Institute of Navigation
(Your Name) thought you would like to see the NAVIGATION: Journal of the Institute of Navigation web site.
Citation Tools
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
Jason Anderson, Sherman Lo, Todd Walter
NAVIGATION: Journal of the Institute of Navigation Sep 2024, 71 (3) navi.655; DOI: 10.33012/navi.655

Citation Manager Formats

  • BibTeX
  • Bookends
  • EasyBib
  • EndNote (tagged)
  • EndNote 8 (xml)
  • Medlars
  • Mendeley
  • Papers
  • RefWorks Tagged
  • Ref Manager
  • RIS
  • Zotero
Share
Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
Jason Anderson, Sherman Lo, Todd Walter
NAVIGATION: Journal of the Institute of Navigation Sep 2024, 71 (3) navi.655; DOI: 10.33012/navi.655
Twitter logo Facebook logo Mendeley logo
  • Tweet Widget
  • Facebook Like
  • Google Plus One
Bookmark this article

Jump to section

  • Article
    • Abstract
    • 1 INTRODUCTION
    • 2 SECURE WATERMARK SELECTION
    • 3 HYPERGEOMETRIC SUBTRACTED MATCH
    • 4 RECEIVER OBSERVABLE SECURITY
    • 5 EXPERIMENTAL VALIDATION
    • 6 CONCLUSIONS
    • HOW TO CITE THIS ARTICLE
    • APPENDIX A PROOF OF FLOYD’S ALGORITHM
    • REFERENCES
  • Figures & Data
  • Supplemental
  • References
  • Info & Metrics
  • PDF

Related Articles

  • Google Scholar

Cited By...

  • No citing articles found.
  • Google Scholar

More in this TOC Section

  • ATLAS: Orbit Determination and Time Transfer for a Lunar Radio Navigation System
  • GNSS L5/E5a Code Properties in the Presence of a Blanker
  • Robust Interference Mitigation in GNSS Snapshot Receivers
Show more Original Article

Similar Articles

Keywords

  • authentication
  • security
  • signal authentication
  • TESLA
  • watermarking

Unless otherwise noted, NAVIGATION content is licensed under a Creative Commons CC BY 4.0 License.

© 2025 The Institute of Navigation, Inc.

Powered by HighWire