Combinatorial Watermarking Under Limited SCER Adversarial Models

  • NAVIGATION: Journal of the Institute of Navigation
  • June 2025,
  • 72
  • (2)
  • navi.696;
  • DOI: https://doi.org/10.33012/navi.696

Abstract

Combinatorial watermarking can help establish trust in global navigation satellite system (GNSS) signals. In combinatorial watermarking, the GNSS provider elects to secretly invert a subset of ranging code chips and then later distributes those inversions to receivers. From these ranging code perturbations, receivers can use signal statistics to determine the authenticity of the signal. In previous work, we demonstrated how one can design combinatorial watermarking schemes and derive the distributions of receiver statistics to ensure low probabilities of missed detection and false alarm, assuming that an adversary does not attempt to estimate the watermarked chips and replay. In this work, we extend the analysis of combinatorial watermarking to adversaries capable of engaging in security code estimation and replay (SCER) attacks. We derive the distributions of our statistics for defense against SCER-capable adversaries. Provided a bound on the estimation capability of the SCER-capable adversary, one can use this work to design a combinatorial watermarking scheme that meets security requirements.

Keywords

1 INTRODUCTION

Global navigation satellite systems (GNSSs) remain vulnerable to spoofing attacks. For civilian users, watermarking a signal could provide a pathway for receivers to utilize cryptography to determine a signal’s authenticity (Scott, 2003). In watermarking signal authentication, the ranging code of a GNSS signal is watermarked cryptographically. Several proposals and studies for performing watermarking signal authentication are underway (Anderson et al., 2017; Hinks et al., 2021; O’Hanlon et al., 2022). Other cryptographic proposals have also suggested utilizing encrypted signals for authentication (Terris-Gallego et al., 2022). Watermarking signal authentication and navigation message authentication could allow receivers to assert the authenticity of an entire GNSS signal.

The security of watermarking signal authentication is limited when adversaries attempt to estimate the watermark perturbations and replay them. These attacks are called security code estimation and replay (SCER) attacks (Caparra & Curran, 2018; Humphreys, 2013; O’Driscoll et al., 2022; Psiaki & Humphreys, 2016). An SCER attack against a watermarked signal would be extraordinarily complex, but is nevertheless possible with sophisticated technical equipment and know-how.

In combinatorial watermarking, the GNSS provider elects to pseudorandomly invert a fixed-number combination of chips within each ranging code. Combinatorial watermarking presents several design advantages over other watermarking approaches such as that reported by the Air Force Research Laboratory (2019), including a pathway for deriving the distributions of receiver-observable statistics in the presence of spoofing, enabling easier mathematical analysis and design. In previous work, we examined the security of combinatorial watermarks in the presence of non-SCER adversaries (Anderson et al., 2024a). Non-SCER adversaries do not listen and replay the signal; rather, they guess the current watermark during spoofing. In this work, we examine the security of combinatorial watermarks in the presence of SCER-capable adversaries, where the adversary attempts to estimate the watermark and then replays the watermarked signal.

The remainder of Section 1 introduces combinatorial watermarking and a previous application to a satellite-based augmentation system (SBAS) that is useful for concrete design exploration and experimentation. Section 2 discusses the foundational mathematical models for this work, reviews the non-SCER case, and introduces the SCER adversary. Sections 3 and 4 derive the security of combinatorial watermarking against two SCER adversary types.

1.1 Combinatorial Watermarking

In this section, we provide an introduction to combinatorial watermarking. We refer to our previous work for additional details, including the mathematical and cryptographic derivations (Anderson, 2024; Anderson et al., 2024a). For the reader’s convenience, Table 1 provides a consolidated reference for the notation of this work.

View this table:
TABLE 1

Variable Notation for Combinatorial Watermarking

For a combinatorial watermark, the GNSS provider selects a combination of r chips among the n total chips to invert within each ranging code (or section of ranging code). The construction from Anderson et al. (2024a) exploits the properties of cryptographic functions to ensure several necessary security properties. Pertinent to this work, the properties ensure that the chip selection is unbiased and that there is no efficient algorithm to predict which chips are inverted or any underlying structure among the inverted chips. Moreover, by adjusting the r and n parameters, the derivations of this work can apply to any GNSS application.

In our prior work (Anderson et al., 2024a), we constructed a radio observable (similar to a correlator) and bound the probabilities of missed detection and false alarm on a threshold detector for the non-SCER adversary case. The mathematical construction of the watermark and the radio observable enables one to compute the distribution under spoofing conditions. Because our prior work (Anderson et al., 2024a) assumed that the adversary was not listening to the authentic signal to directly estimate the watermark, the adversary could only make an exhaustive guess. In this work, we allow the adversary to engage in an SCER attack (Humphreys, 2013) and repeat similar derivations.

1.2 Suggested Scheme

In combinatorial watermarking, the scheme is defined with a signal with parameters r and n. These two parameters characterize any GNSS ranging signal to enable broad and flexible application of the derivations in this work. For concreteness, in our prior work (Anderson et al., 2024b) and in this work, we utilize SBAS L1, which has a ranging code of length n = 1023, for our design and experiment. Applying the methods of this work to other systems is as trivial as changing the values of the scheme parameters.

Our prior work (Anderson et al., 2024b) focused on an application to an SBAS because an SBAS presents a prudent opportunity for watermarking. First, because SBAS signals are generated on the ground, augmenting their ranging codes with watermarking would not require additional satellite launches. Second, with the data authentication proposals for SBASs (Anderson et al., 2023), an SBAS could provide a watermark ranging authentication service with a time to authentication of 6–11 s without additional data bandwidth burden (Anderson, 2024). Regardless, because of the consistent signal structure among all GNSS services, this scheme could also be adapted to the core GNSS constellations.

In our prior work (Anderson et al., 2024b), we use the derivations from Anderson et al. (2024a) to create a scheme that meets reasonable design requirements. Anderson et al. (2024b) suggested that the provider invert r = 15 chips among the n = 1023 for L1 and that a receiver observes 6,000 individual watermarks over 6 s. The 6-s timeline comes from a potential timed efficient stream loss-tolerant authentication (TESLA) distribution strategy via a wide area augmentation system (Anderson et al., 2023). The selection of r = 15 fulfills a missed detection and false alarm requirement of 10-9 for a worst-case 2-MHz receiver operating at C N0=30 dB-Hz. These conditions are intentionally worst-case to accommodate many receivers and operating conditions. As a case study, we will extend our adversarial model to attack this scheme and predict the requirements of the SCER adversary to spoof a receiver. However, the methods still apply to different GNSSs with different noise assumptions and design requirements.

2 ADVERSARIAL AND RADIO MODELS

This section discusses the mathematical model foundations for the adversaries and radios considered in this work. Section 2.1 begins with a short review of the non-SCER case based on our prior work (Anderson et al., 2024a), and Section 2.2 derives the SCER case.

2.1 Non-SCER Case

As described in our prior work (Anderson et al., 2024a), a non-SCER adversary does not observe the watermark with listening equipment. Based on the construction of the watermark, the adversary may only conduct an impossibly large exhaustive search of the r inverted chips among the n chips to spoof a watermark. Because the signal is a stream signal, the receiver will only make one authentication attempt per ranging code. Therefore, the adversary may only make one attempt to spoof a watermarked ranging code, and the adversary must make a guess.

Our prior work (Anderson et al., 2024a) utilized a modified correlator as the radio observable for a receiver determining signal authentication with a watermark. Let R be the original (not watermarked) replica of a ranging code composed of n chips over a coherent integration time T. When the receiver radio samples the signal at frequency F, then R ∈ {−1, 1}FT. The watermarked replica Rw includes the combination of r inverted chips and the sampling rate F; thus, Rw ∈ {-1, 1}FT. For each watermarked ranging code, the receiver computes YΔ from the precorrelation signal SFT according to Equations (1), (2), and (3), as shown in Figure 1. The signal power P must be estimated for the signal S. In Figure 1, the system branches off of the I channel for authentication purposes for concreteness when utilizing the SBAS case (see Section 1.2) but can be modified to accommodate other GNSS signal designs. RΔ is the subtraction of the two replicas Rw and R and is reversed for use in a linear time-invariant matching convolution filter:

RΔ=RwR1

kΔ=1RwR11P=12rnFT1P2

YΔ=kΔ·RΔ*S3

FIGURE 1

Diagram of a radio that verifies the watermark for authentication with a non-SCER adversary

The bottom includes the standard tracking loop. From a converged tracking loop, I-baseband samples are stored in memory to await the cryptographic seed that determines the watermark. After watermark seed distribution, the I-baseband samples are processed through the RΔ filter. The diagram uses I-baseband samples assuming the SBAS signal; other samples would be required depending on the signal design.

The signal S could be authentic or spoofed by a non-SCER adversary, represented as Sauth or S¬SCER, respectively. The signal S is the sum of the ranging signal with power P and an additive white Gaussian noise (AWGN) term NFT with NN(0,σ2I). In the authentic case, the ranging signal derives from the replica Rw (known only to the authentic GNSS provider at the time of broadcast), as in Equation (4):

Sauth =PRw+N4

Because of the cryptographic security on the watermark and the assumption of a non-SCER adversary, the adversary must guess and generate its own R¬SCER to spoof the signal, as in Equation (5). Whereas the constellation will generate Rw from R by randomly inverting r chips among the n chips, the adversary may elect to invert any number of chips s. Thus, we must account for numerous non-SCER adversaries simultaneously and ensure that any authentication detector accounts for this selection by the adversary:

S¬SCER=PR¬SCER+N5

For the non-SCER case, Anderson et al. (2024a) showed that YΔ can be derived from a hypergeometric distribution. Given the typical noisy conditions of GNSS signals, Anderson et al. (2024a) also showed how one can aggregate W watermarks to enable reasonable missed-detection and false-alarm probabilities for a threshold on YΔ. While Equations (4) and (5) assume an AWGN term, aggregating W identically distributed, non-AWGN terms (on the order of W = 6000 in the work by Anderson et al. (2024b)) invokes the central limit theorem, meaning that non-AWGN will approach AWGN in the aggregate:

H(n,r,s)6

PMFH(h)=(rh)(nrsh)(ns)7

Rw*R¬SCER =(n2r2s+4H)FTn8

NΔ,WN(0,1r·nFT·σ2P·1W)9

y=gΔ,¬SCER(hr,s)=12r·(4h2r)10

YΔ,W¬SCER=1WWgΔ,¬SCER(H)+1WWNΔ11

PMFYΔ,WSCER(y)=((PMFH°WgΔ,¬SCER1)*W*PMFNΔ,W)(y)12

For a complete derivation of the above, we refer to the work of Anderson (2024) and Anderson et al. (2024a). Equations (7)–(12) provide a summary of the results of these derivations. However, we note that the SCER derivations of this work follow almost the same mathematical process as the non-SCER derivations.

2.2 SCER Case

In our prior work (Anderson et al., 2024a, 2024b), we assumed that the adversary did not listen to the signal to estimate the watermark and replay a signal with the adversary-observed watermark. Rather, the adversary made a random guess for the watermark and transmitted a spoofed signal. In this work, we now examine an adversary attempting to observe the watermark and replay a signal.

In the literature, attacks that listen for security chips and replay are called SCER attacks (Humphreys, 2013). Figure 2 provides a conceptual diagram of an SCER attack for our combinatorial-watermarking context. Among GNSS spoofing adversaries, SCER-capable adversaries are considerably more sophisticated and complicated, and successfully fooling a receiver is considerably more difficult. In some contexts, schemes that prohibit all but SCER-capable adversaries are sufficient spoofing deterrents. However, even when cryptography is incorporated into GNSS signals, these GNSS signals still remain vulnerable to SCER attacks.

FIGURE 2

Conceptual diagram of an SCER attack

The adversary attempts to directly observe the watermark in the signal and then replay a watermarked signal to spoof a receiver. The thought bubble of the adversary portrays the adversary attempting to use its measurements of the true signal to construct a single watermark likely to spoof a receiver without detection by the receiver. The top row of boxes represents a collection of inverted-chip likelihoods among a single watermarked ranging code. The varying hues of red represent the soft information provided by the likelihood (i.e., a darker red corresponds to a higher inverted-chip likelihood). The bottom row of boxes represents the adversary’s decision to watermark. The adversary can elect to invert any number of chips based on its measurements.

SCER attacks are difficult to carry out for multiple reasons. One reason is that the GNSS signal is below the thermal noise floor, and estimating security chips requires sophisticated (and likely arduous) radio equipment (e.g., high-gain antennas). A second reason is that the adversary must transport the estimate of the security chips to a transmitting antenna within a sufficiently short time to avoid detection by the receiver’s onboard clock. A third reason is that the cryptographic construction limits the effectiveness of advanced decision algorithms beyond an exhaustive search among an enormous search space. Similar to Humphreys (2013), we will assume that our adversary has access to advanced radio equipment, with no delay in its observation antenna, and has access to a watermark decision-making algorithm (although a practical computer must be capable of computing the decision) and replaying antenna (with no information transmission delay among components).

2.2.1 Chip Estimation Model

To conduct an SCER attack, the adversary must estimate the inverted chips within each ranging code. With the unbiased inversion selection algorithm for combinatorial watermarking, the adversary must observe and check the entire ranging code for inverted chips.

Under the standard σ2-noise-power AWGN assumption for a binary phase shift key (BPSK) signal, the constellation points are separated by 2P and distributed normally with standard deviation σ, with 0 located halfway between them, as shown in Figure 3. Without a loss of generality, suppose that a non-inverted chip is centered at P and an inverted chip is centered at P in the baseband measurement. This can be achieved in practice by wiping off the ranging code via element-wise multiplication of the signal S by the replica R.

FIGURE 3

Conceptual figure of the chip estimation model for a single chip after elementwise multiplication by the unwatermarked replica

For the non-watermarked chip hypothesis, the constellation point will be 1. For the watermarked chip hypothesis, the constellation point will be −1. The diagram includes the probability density functions (PDFs) with an SNR of 3 dB. The adversary may choose any decision boundary α (e.g., a maximum likelihood or maximum a posterior decision). The probabilities of errors are labeled, given the decision boundary and noise model.

Using its radio measurements and the model from the previous paragraph, the chip-estimating adversary must select a decision boundary. A halfway boundary would be a good choice, assuming a uniform prior between inverted and non-inverted chips. However, that will never be the case for a watermarked signal because the number of watermarked chips must be less than the number of non-watermarked chips so that receivers can track the signal. Given a boundary α, the probabilities of error pe|r and pe|¬r for whether the chip is inverted or not inverted are provided in Equations (13) and (14), respectively:

per=αPDFN(P,σ)(x)dx13

pe¬r=αPDFN(P,σ)(x)dx14

By parameterizing the chip estimation by α, we account for any prior-chip-inversion probability strategy by the adversary. In the non-SCER case, the adversary has the selection of s in its spoofing strategy. In the SCER case, the adversary has the selection of α in its spoofing strategy. All α values must be accounted for with a SCER spoofing detector.

In the conceptual diagram shown in Figure 2, within the thought bubble, the adversary is using its measurements to decide how to form a spoofed watermarked ranging code. Section 3 analyzes the case in which the SCER adversary implements a decision rule that ignores soft information (i.e., measurement likelihoods) from the chip estimation BPSK model. This model is useful for deriving concise mathematical adversarial distributions of the authentication statistics similar to that of the non-SCER case. Section 4 attempts to utilize soft information to enact a more sophisticated adversary that exploits the soft information.

3 HARD-DECISION SCER ADVERSARY

To conduct a spoof, an adversary will have access to a collection of chip estimation measurements over the ranging code. Given the cryptographic construction of the watermark, the only structure present in the watermark lies in its composition: it is composed of exactly r inverted chips from the original ranging code. An optimal maximum likelihood detector would evaluate the likelihood of its measurement among all (nr) hypotheses. In this imagined detector, the number of hypotheses is too enormous for any practical detector, following the standard cryptographic security approach of limiting attacks to brute force on an enormous search space.

For instance, in the work by Anderson et al. (2024b), (102315)>2109. This section discusses an initial adversary-made decision simplification similar to those made in the error correction code decoder context that ignores soft information.

Suppose that the adversary makes a hard decision on each chip, ignoring potentially useful likelihood information from the measurements. We call this the hard-decision SCER (HDSCER) adversary. The HDSCER adversary will consider whether each chip is inverted independently without knowledge of the r structure of the watermark. This implies that the adversary does not vary P over a ranging code (an assumption that is relaxed in Section 4). While the adversary will select a decision boundary α that incorporates knowledge of r, the hard decision on each chip is made without regard to other measurements of the ranging code. For a particular chip, suppose that the probabilities of estimation error are pe|r and pe|¬r for whether the chip is inverted or not inverted, respectively. Whichever inverted chips are observed by the adversary, based on its decision threshold α, will be inverted in the spoof signal, even if the adversary flips more or less than the actual known number (e.g., r = 15).

For a moment, let us suppose that the adversary samples once per chip and outputs unity power. The adversary measures a chip i over a watermarked ranging code and makes its decision. From the n decisions, the adversary forms a replica RHDSCER ∈ {−1, 1}n, and after a delayed distribution of the watermark seed, the receiver forms R, Rw ∈ {−1, 1}n. We compute the following valid convolutions:

Br(r,1per)15

B¬r(nr,pe|¬r)16

PMF(n,p)(b)=(nb)pb(1p)nb17

Rw*RHDSCER =(n2r+2Br2B¬r)FTn18

R*RHDSCER=(n2Br2B¬r)FTn19

For Equation (18), suppose that RHDSCER = R ; then, the convolution with Rw would be n – 2r, which corresponds to the case in which the spoofer broadcasts the original ranging code without any attempt to incorporate the watermark. However, according to B(r, 1 – pe|r), the adversary will measure watermarked chips and broadcast them correctly, increasing Rw * RHDSCER. Simultaneously, the adversary will incorrectly invert non-watermarked chips according to B(nr, pe|¬r) and broadcast them incorrectly, decreasing Rw * RHDSCER. Equation (18) follows the addition and subtraction of two binomial distributions because each of the component chips is measured independently. For Equation (19), suppose that RHDSCER = R; then, the convolution R * RHDSCER would be n. Each watermarked chip that is measured correctly by the adversary will subtract from the convolution, and each non-watermarked chip that is measured incorrectly by the adversary will again subtract from the convolution. Equation (19) again follows from the independently measured chips. We can relax the unity power assumption by multiplying each equation by P. Moreover, if we assume that the receiver evenly samples at frequency F over ranging code time T, we can adjust each equation via multiplication by FTn.

In our prior work (Anderson et al., 2024a), we suggested a filter RΔ with a gain constant and demonstrated that the distribution in the non-SCER case of that statistic in spoofing conditions is a hypergeometric distribution. In the SCER case, repeating this argument, we show in Section 3.1 that the distribution is a binomial distribution (rather than a hypergeometric distribution). This follows from the subtraction of Equations (18) and (19), where B¬r will cancel out.

The statistic RΔ is 0 in most cases, except where the chips are inverted, meaning that the statistic only considers the ranging measurement where the watermark should be present and ignores the remainder of the ranging code. The adversary could set α to sensitively invert more chips in its spoofed signal; therefore, the adversary could sacrifice some of the receiver’s tracking ability in favor of ensuring that the adversary identifies the inverted chips. This scenario motivates the need for two statistics to detect spoofing.

3.1 Filter Set

From Equations (18) and (19), we suggest two filters of the form shown in Equations (20) and (21). The first filter is a subtraction filter from our previous work, and the second is a sum filter. This symmetric pair poses several advantages related to analysis by separating the two binomial distributions. This separation makes the following mathematic derivations easier and symmetric, provides an intuitive interpretation, and constrains the adversary’s success over its selected α:

(RwR)*RHDSCER=(2r+4Br)FTn20

(Rw+R)*RHDSCER=(2(nr)4B¬r)FTn21

The statistic of Equation (20) measures how well the adversary can predict where the chip inversions exist. The statistic of Equation (21) measures how well the receiver will track the spoofed signal. When we judiciously choose the following gains for these filters, the distribution of the statistics is simplified and is easier to intuitively understand. Equation (2) provides kΔ, which was used in the non-SCER case, and Equation (22) provides kΣ:

kΣ=1Rw+R11P=12(nr)nFT1P22

The final filters for study in this work are defined by Equations (3) and (23), as shown in Figure 4:

YΣ=kΣ·RΣ=kΣ·(Rw+R)23

FIGURE 4

Diagram of a radio that checks the watermark for authentication for the SCER case

The bottom includes the standard tracking loop. From a converged tracking loop, I-baseband samples are stored in memory to await the cryptographic seed that determines the watermark. After the watermark seed distribution, the I-baseband samples are processed through the RΔ and RΣ filters. The diagram uses I-baseband samples assuming the SBAS signal; other samples would be required depending on the signal design.

3.2 Statistic Distributions

Based on their construction, YΔ and YΣ derive from independent binomial distributions. Because of the central limit theorem effect, the spread of the distributions of Y will shrink about their expectations, which are shown to be functions of pe|r and pe|¬r in Section 3.3. Another set of statistics would not be independent, complicating the analysis.

In this section, we feed the HDSCER-spoofed signal SHDSCER from Equation (24) into the filter set from Section 3.1:

SHDSCER=PRHDSCER+N24

For mathematical conciseness, we use the following:

y=gΔ,HDSCER(br)=12r·(4b2r)25

y=gΣ,HDSCER(br)=12(nr)·(2(nr)4b)26

NΣ,WN(0,1nr·nFT·σ2P·1W)27

The choice of filters YΔ and YΣ separates the binomial distributions. Feeding signal SHDSCER into YΔ yields Equation (29):

YΔHDSCER=kΔ(RwR)*(PRHDSCER+N)=kΔP(RwR)*RHDSCER+kΔ·(RwR)*N=12r(2r+4Br)+kΔ·(RwR)*NYΔHDSCER=gΔ, HDSCER (Br)+NΔ28

PMFYΔHDSCER (y)=PMFBr(gΔ, HDSCER 1(y))*PMFNΔ(y)PMFYΔHDSCER (y)=((PMFBr°gΔ, HDSCER 1)*PMFNΔ)(y)29

Feeding signal SHDSCER into YΣ yields Equation (31):

YHDSCER=k(Rw+R)*(PRHDSCER+N)=kP(Rw+R)*RHDSCER+k·(Rw+R)*N=12(nr)(2(nr)4B¬r)+kΣ·(Rw+R)*NYHDSCER=g, HDSCER (B¬r)+N30

PMFYΣHDSCER(y)=PMFB¬r(gΣ,HDSCER1(y))*PMFNΣ(y)PMFYΣYHDSCER (y)=((PMFB¬r°gΣ, HDSCER 1)*PMFNΣ)(y)31

For the case in which the receiver averages over W watermarks, we have the following:

PMFYΔ,WHDSCER(y)=((PMFBr°WgΔ,HDSCER1)*W*PMFNΔ,W)(y)32

PMFYΣ,WHDSCER(y)=((PMFB¬r°WgΣ,HDSCER1)*W*PMFNΣ,W)(y)33

The YΔ statistic indicates how well the adversary can predict where the chip inversions exist, and the YΣ statistic indicates how low the adversary’s false-inverted-chip estimation rate is. Because the receiver will initially track with R, the YΣ statistic also measures how well the receiver will track the spoofed signal.

In this section, we take a direct computational approach via convolution for YΔHDSCER and YΣHDSCER, similar to the work by Anderson et al. (2024a) for YΔ¬SCER . We note that in several authentication designs, the receiver will receive multiple watermarks (Air Force Research Laboratory, 2019; Anderson et al., 2024b). For example, we adopt the 6-s watermark observation window of Anderson et al. (2024b), where the receiver receives an average of 6,000 individual values of YΔ and YΣ, allowing us to apply the central limit theorem and use the results of the following section. The adversary model is a group of adversaries with varying observation capability (via pe|r and pe|¬r). Therefore, for this work, we expect that examining trends in the statistic expectation over varying adversary errors will be useful for watermark design.

3.3 Deriving the Mean and Variance of the Filter Set

This section derives the mean and variance of the statistics from Section 3.2 to enable a study of useful design trends in Section 3.4. For E[YΔ,WHDSCER], which is the expectation of YΔ in the presence of an HDSCER adversary with the receiver averaging over W watermarks, we have Equation (34):

E[YΔ,WHDSCER]=E[YΔHDSCER]=E[gΔ,HDSCER(Br)+NΔ]=12r·E[2r+4Br]=12r·(2r+4r(1per))=1+2(1per)E[YΔ,WHDSCER]=12per34

For E[YΣ,WHDSCER], which is the expectation of YΣ in the presence of an HDSCER adversary with the receiver averaging over W watermarks, we have Equation (35):

E[YΣ,WHDSCER]=E[YΣHDSCER]=E[gΣ,HDSCER(B¬r)+NΣ]=12(nr)·E[2(nr)4B¬r]=12(nr)·(2(nr)4(nr)pe¬r)E[YΣ,WHDSCER]=12pe¬r35

For V[YΔ,WHDSCER], we have Equation (36):

V[YΔ,WHDSCER]=1WV[gΔ,HDSCER(B¬r)+NΔ]=1WV[gΔ,HDSCER(B¬r)]+1rnFTσ2P1W=4r2V[Br]1W+1rnFTσ2P1W=4r2rpe¬r(1per)1W+1rnFTσ2P1WV[YΔ,WHDSCER]=4rper(1per)1W+1rnFTσ2P1W36

For V[YΣ,WHDSCER], we have Equation (37):

V[YΣ,WHDSCER]=1WV[gΣ,HDSCER(B¬r)+NΣ]=1WV[gΣ, HDSCER (B¬r)]+1nrnFTσ2P1W=4(nr)2V[B¬r]+1nrnFTσ2P1W=1W4(nr)2(nr)pe¬r(1per)+1nrnFTσ2P1WV[YΣ,WHDSCER]=4nrpe¬r(1pe¬r)1W+1nrnFTσ2P1W37

The above distributions cover the spoofing case. For the authentic case, the provider knows the watermark, meaning that pe|r = pe|¬r = 0. Therefore, the binomial terms cancel, leaving statistics with a mean of 1 and the variances above, but with no binomial terms.

3.4 Adversarial Spoofing Efficacy Among Two Statistics

Now that we have derived the mean and variance of the filter distribution under authentic and spoofing conditions (as a function of the adversary’s chip estimation error probability) in Section 3.3, in this section, we discuss the receiver decision problem. First, we discuss an intuitive example; we then discuss design implications.

In Figure 5, we conceptually connect the adversary’s choice of α to the sum and difference statistics. On the left, we have the security code estimation model with a decision boundary α=0.75P selected by the adversary (as an intuitive example). The decision boundary α directly relates to the prior probability that a chip is flipped. On the right, we have the 1-sigma confidence interval for a single 1-ms watermark with a signal-to-noise ratio (SNR) of 0 dB from Anderson et al. (2024b). The green region shows the probability distribution under authentic conditions, and the red region corresponds to spoofing conditions, each from the derivations of Section 3.3. The dashed line is a trajectory defined by Equation (39). As the adversary changes their selection of α, the red ellipse traverses the dashed trajectory. As the SCER SNR increases, the spoofing probability distribution trajectory moves closer to intersecting the authentic case and vice versa.

FIGURE 5

Conceptual figure relating the adversary’s choice of α to the probability distribution function (PDF) of YΔ and YΣ, as explained in Section 3.4

Figure 5 provides an intuitive visual on the dynamics of how α relates to YΔ and YΣ. When the receiver applies the central limit theorem over the observation of thousands of watermarks, the ellipses will shrink substantially (e.g., by a factor of 6000). Ultimately, with better radio and computational equipment, pe|r → 0 and pe|¬r → 0 for the SCER adversary; thus, the adversary will be able to approach a perfect estimation and replay of the watermark. The combination of the narrowing central limit theorem distribution and the knowledge that an increasingly successful SCER adversary could exist motivates a design based exclusively on the expectation value (ignoring the spread of the distribution). Therefore, we provide Figure 6 based on the SNR-level sets computed via Equation (39).

FIGURE 6

Hard-decision expectation trajectory (along α) for varying levels of SNR The non-SCER trajectory line follows along possible values of s.

For the non-SCER case, as in our prior work (Anderson et al., 2024a), we used only YΔ. However, for the SCER case, the adversary can select an α that results in missed detection if only YΔ is checked. When both terms are checked, we can constrain the adversary’s ability to circumvent authentication checks up to the adversary’s chip estimation efficacy and its choice of α.

From the viewpoint of mathematical conciseness, one can better account for the upper tail Y distributions (for bounding missed-detection probabilities with a threshold detector) and other effects (such as advantages from Section 4) by adjusting the actual SNR of the adversary. For instance, rather than computing the false-alarm and missed-detection probabilities from the integration of the repeatedly convolved distributions of a receiver-decided decision boundary on YΔ, YΣ, one could approximate this effect by computing the dB-width of sigma, adjust the adversary’s SNR, and continue the design with the central limit theorem formulations in Section 3.3. To design a scheme similar to that of Anderson et al. (2024b), we now consider the problem of selecting n and r values under an SCER model (i.e., how large of a dish can the SCER-capable adversary use while yielding a specific SNR) that yields acceptable missed-detection probabilities. However, it is possible to consider the distribution tails (rather than just the expectation) via repeated convolution of the binomial distributions.

The efficacy of receiver decisions on YΔ, YΣ can be evaluated by integrating over the joint decision space shown in Figure 6 or with the SNR adjusted by a 3-sigma dB-width or with other adjustments from Section 4. An interesting consequence is the possibility of using Equation (39) as the decision boundary to have a more favorable probability of missed detection and false alarms compared with a linear decision boundary. Note that as YΣ decreases, the receiver’s ability to track the signal rapidly decreases, informing a reasonable decision area over YΔ, YΣ for integration.

4 SOFT-DECISION SCER

Whereas the previous section considered a hard-decision adversary, in this section, we consider a soft-decision adversary that beats the performance of the hard-decision adversary. We can only show its advantage via Monte Carlo simulation without knowledge of a concise pathway to derive the distribution equations.

In Section 3.4, the hard-decision adversary makes a hard decision on the security code estimation problem. This approach ignores potentially useful soft information, such as the measurement likelihood from the BPSK model. Moreover, the hard-decision adversary employs a constant chip power. We propose the following soft-decision adversary without any claim about whether this adversary is the best obtainable. Here, the soft-decision adversary will set the chip power to be proportional to the hypothesis likelihood, as in Equation (38):

Pi{p(r) if SCER adversary does not invert chip ip(¬r) if SCER adversary does invert chip i38

Our choice for Pi is simply a judicious, first-guess choice, inspired by O’Driscoll et al. (2022), that serves our intuitive purpose. When the adversary is highly confident that a chip is inverted, it will place more power on that particular chip (and the same for a chip that is highly believed to be not inverted). When the adversary is not confident that a chip is inverted or not inverted, the adversary places less power on that particular chip. For our adversary, we re-normalize the signal so that it contains the same aggregate average power over the entire ranging code, hence our use of ∞ for Equation (38). This approach accounts for tracking-loop automated gain control and establishes a fair comparison in the YΔ and YΣ space. We attempted using other functions that ensure more power on more confident measurements (e.g., having Pi be a function of the likelihood ratio) with varying advantages, but we present the simplest function for this work.

We will first provide a Monte Carlo experiment for the purpose of intuition and then a second experiment for design implication. Figure 7 presents the results of a Monte Carlo simulation of the soft-decision adversary compared against the hard-decision adversary. The dashed line denotes the statistical expectation for the hard-decision adversary. The distributions provided correspond to the aggregation of W = 6000 watermarks. The green region shows the 3σ authentic distribution ellipse, and the red region shows the results for 100 spoofing Monte Carlo trials. The soft-decision advantage is demonstrated by the spoofing ellipse being to the right of the hard-decision trajectory line.

FIGURE 7

Monte Carlo (MC) experiment showing the advantage of our soft-decision (SD) adversary

The adversary in this figure chose α = 0. For the hard-decision (HD) adversary, the expectation will be along the trajectory defined by Equation (39) (dashed line). The Monte Carlo simulation demonstrates a small advantage by having the power of each chip be a function of the confidence of the chip estimation.

In a typical scenario, the adversary and receiver observe different SNRs for the GNSS signal because the adversary is likely using a better antenna. The actual spoofing distribution must account for both variances. Figure 8 does not show distributions of Y; rather, it shows distributions of E[Y] under the central limit theorem. Figure 8 shows the trend of the expectations when the adversary selects different values of α, which affects whether the r or ¬r condition applies within Equation (38). The α trajectories follow the general trend of the hard-decision α trajectory, except that the soft decision shows a slight advantage over the hard decision by appearing to the right.

FIGURE 8

Diagram generated via Monte Carlo simulations, showing the trend of the expectations of YΔ and YΣ under spoofing conditions with the soft-decision (SD) adversary of Section 4 with varying α values

The soft-decision ellipses are 3σ central limit theorem (CLT) confidence ellipses of where the expectation should be. For differing SCER SNRs (only 0 dB is depicted), the soft-decision adversary poses a small advantage over the hard-decision (HD) trajectory line. In the case of this figure, an SCER adversary would need an antenna with a gain of approximately 10 dB to achieve this performance. Note that the receiver will lose the ability to track the signal when YΣ decreases.

4.1 Better SCER Adversaries and Design Implications

At the time of this work, we have not yet found a pathway to mathematically derive the advantage for the soft-decision adversary, determine the best soft-decision adversary, or bound the advantage of any soft-decision adversary. Given the convenience of the mathematically concise derivations for the hard-decision adversary and the conventions of error-correction code, it is likely appropriate to attempt to find a soft-information advantage bound or correction for use in designing a system with the hard-decision derivations. For instance, suppose that one could show that a soft-decision adversary performs no better than a hard-decision adversary with an x -dB-larger SNR. Then, one could design a system using the hard-decision formulae with simple corrections.

Because an adversary could continually achieve a better radio for the security code estimation, the GNSS designer should focus on ensuring that the system design requires an antenna that is reasonably burdensome on the spoofer and easy for someone in the area to detect. For instance, one could design the system to require a large dish antenna that would likely be visible in a protected area (e.g., in the vicinity of an airport). Noting that the r = 15 design of Anderson et al. (2024b) was created before this work, we can derive the gain required to spoof a receiver. In our prior work (Anderson et al., 2024b), we suggested a decision boundary of YΔ > 0.5 for missed-detection and false-alarm rates of 10-9 for non-SCER adversaries. To spoof a receiver on expectation, the adversary would need an antenna array or a high-gain antenna until the spoofing ellipses from Figure 8 cross past the receiver’s decision boundary (e.g., YΔ, YΣ > 0.5 or YΔ + YΣ > 1).

Rigorously determining the advantage of a soft-decision adversary presents a difficult challenge in both deriving an answer and defining a model. For instance, in the model of this work, an adversary could put enormous power on a single chip (and zero out the other chips). Among all of the ranging code measurements, suppose that the adversary placed power on only two chips: the one with the highest measured likelihood of being inverted and the one with the highest measured likelihood of not being inverted. It is very likely that these two measurements (e.g., among r and nr) are correct. With a perfectly tracking receiver, the adversary could spoof YΔ and YΣ by placing maximum power on those two chips. However, this represents a degenerate case, motivating a more sophisticated receiver and spoofing radio models (e.g., where the power of these chips is saturated in the two-chip power spoof). As the model becomes more complicated and realistic, it is unlikely that there will be a mathematically concise answer, motivating us to determine the best solution via Monte Carlo methods and direct experimentation.

5 CONCLUSION

In this work, we extended combinatorial watermarking analysis to SCER-capable adversaries. We provided a set of receiver statistics that can be used to detects SCER attacks, provided there is a limitation on how well an adversary can estimate watermarked chips, and proposed a hard-decision watermark detection strategy. We derived the distributions of the receiver statistics in the presence of an HDSCER spoofing attack and provided a pathway to design a combinatorial watermarking scheme to meet security requirements in the presence of an SCER-capable adversary. We proposed a soft-decision SCER spoofing attack with an advantage over the HDSCER spoofing attack, as demonstrated via Monte Carlo simulation. By applying this work, a GNSS designer can approximately predict the resistance of a combinatorial watermark against an SCER adversary.

How to cite this article

Anderson, J., Lo, S., & Walter, T. (2025). Combinatorial watermarking under limited SCER adversarial models. NAVIGATION, 72(2). https://doi.org/10.33012/navi.696

A HARD-DECISION TRAJECTORY EQUATION

This section derives the (YΔ, Y) trajectory over α from Figures 5(right), 6, 7, and 8.

First, we substitute the probability of errors with their functions of α from Equations (13) and (14) and isolate α for both statistics:

E[YΔHDSCERα]=12per,α=12·αPDFN(P,σ2)(y)dy=12·(1CDFN(P,σ2)(α))=1+2·CDFN(P,σ2)(α)=1+2·(12(1+erf(α+Pσ2)))=erf(α+Pσ2)α=P+2σ·erf1(E[YΔα])E[YΣHDSCER α]=12pe¬r,α=12·αPDFN(P,σ2)(y)dy=12·CDFN(P,σ2)(α)=12·(12(1+erf(αPσ2)))=erf(αPσ2)=P+2σ·erf1(E[YΣα])α=P2σ·erf1(E[YΣα])

Then, we set the values of α equal to each other:

P2σ·erf1(E[YΣα])2σ·erf1(E[YΣα])+2σ·erf1(E[YΔα])erf1(E[YΣα])+erf1(E[YΔα])erf1(E[YΣα])+erf1(E[YΔα])=P+2σ·erf1(E[YΔα])=2P=2P/σ2=2SNRSCER39

Note that the SNR here is the SNR of the SCER adversary, which is a function of the adversary’s radio equipment.

This is an open access article under the terms of the Creative Commons Attribution License, which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

REFERENCES

  1. Air Force Research Laboratory. (2019). IS-AGT-100: Chips Message Robust Authentication (Chimera) enhancement for the L1C signal: Space segment/user segment interface (tech. rep.). Air Force Research Laboratory, Space Vehicles Director. https://www.gpsexpert.net/chimera-specification
  2. Anderson, J. (2024). Designing cryptography systems for GNSS data and ranging authentication [Doctoral dissertation Stanford University]. https://purl.stanford.edu/pj787wh6240
  3. Anderson, J. M., Carroll, K. L., DeVilbiss, N. P., Gillis, J. T., Hinks, J. C., O’Hanlon, B. W., Rushanan, J. J., Scott, L., & Yazdi, R. A. (2017). Chips-message Robust Authentication (Chimera) for GPS civilian signals. Proc. of the 30th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2017), Portland, OR, 23882416. https://doi.org/10.33012/2017.15206
  4. Anderson, J., Lo, S., Neish, A., & Walter, T. (2023). Authentication of satellite-based augmentation systems with over-the-air rekeying schemes. NAVIGATION, 70(3). https://doi.org/10.33012/navi.595
  5. Anderson, J., Lo, S., & Walter, T. (2024a). Authentication security of combinatorial watermarking for GNSS signal authentication. NAVIGATION, 71 (3). https://doi.org/10.33012/navi.655
  6. Anderson, J., Lo, S., & Walter, T. (2024b). Combinatorial watermarking for GNSS signal authentication. Proc. of the 2024 International Technical Meeting of the Institute of Navigation, Long Beach, CA, 381389. https://doi.org/10.33012/2024.19483
  7. Caparra, G., & Curran, J. T. (2018). On the achievable equivalent security of GNSS ranging code encryption. Proc. of the 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, CA, 956966. https://doi.org/10.1109/PLANS.2018.8373474
  8. Hinks, J., Gillis, J. T., Loveridge, P., Miller, S., Myer, G., Rushanan, J. J., & Stoyanov, S. (2021). Signal and data authentication experiments on NTS-3. Proc. of the 34th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2021), St. Louis, MO, 36213641. https://doi.org/10.33012/2021.17964
  9. Humphreys, T. (2013). Detection strategy for cryptographic GNSS anti-spoofing. IEEE Transactions on Aerospace and Electronic Systems, 49(2), 10731090. https://doi.org/10.1109/TAES.2013.6494400
  10. O’Driscoll, C., Scuccato, T., DallaChiara, A., Pany, T., Diez, M., & Hameed, M. (2022). The attack agnostic defence: A spoofing detection metric for secure spreading sequences. Proc. of the 10th Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), Noordwijk, Netherlands. https://www.researchgate.net/publication/366066556_THE_ATTACK_AGNOSTIC_DEFENCE_A_SPOOFING_DETECTION_METRIC_FOR_SECURE_SPREADING_SEQUENCES
  11. O’Hanlon, B., Rushanan, J. J., Hegarty, C., Anderson, J., Walter, T., & Lo, S. (2022). SBAS signal authentication. Proc. of the 35th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2022), Denver, CO, 33693377. https://doi.org/10.33012/2022.18443
  12. Psiaki, M. L., & Humphreys, T. E. (2016). GNSS spoofing and detection. Proceedings of the IEEE, 104(6), 12581270. https://doi.org/10.1109/JPROC.2016.2526658
  13. Scott, L. (2003). Anti-spoofing & authenticated signal architectures for civil navigation systems. Proc. of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS/GNSS 2003), 15431552. https://www.ion.org/publications/abstract.cfm?articleID=5339
  14. Terris-Gallego, R., Fernandez-Hernandez, I., López-Salcedo, J. A., & Seco-Granados, G. (2022). Guidelines for Galileo assisted commercial authentication service implementation. Proc. of the 2022 International Conference on Localization and GNSS (ICL-GNSS), Tampere, Finland, 0107. https://doi.org/10.1109/ICL-GNSS54081.2022.9797027
Loading
Loading
Loading
Loading