Vai ai contenuti. | Spostati sulla navigazione | Spostati sulla ricerca | Vai al menu | Contatti | Accessibilità

| Crea un account

Caparra, Gianluca (2017) Authentication and Integrity Protection at Data and Physical layer for Critical Infrastructures. [Tesi di dottorato]

Full text disponibile come:

[img]
Anteprima
Documento PDF
3570Kb

Abstract (inglese)

This thesis examines the authentication and the data integrity services in two prominent emerging contexts such as Global Navigation Satellite Systems (GNSS) and the Internet of Things (IoT), analyzing various techniques proposed in the literature and proposing novel methods.
GNSS, among which Global Positioning System (GPS) is the most widely used, provide affordable access to accurate positioning and timing with global coverage. There are several motivations to attack GNSS: from personal privacy reasons, to disrupting critical infrastructures for terrorist purposes.
The generation and transmission of spoofing signals either for research purpose or for actually mounting attacks has become easier in recent years with the increase of the computational power and with the availability on the market of Software Defined Radios (SDRs), general purpose radio devices that can be programmed to both receive and transmit RF signals.
In this thesis a security analysis of the main currently proposed data and signal level authentication mechanisms for GNSS is performed. A novel GNSS data level authentication scheme, SigAm, that combines the security of asymmetric cryptographic primitives with the performance of hash functions or symmetric key cryptographic primitives is proposed. Moreover, a generalization of GNSS signal layer security code estimation attacks and defenses is provided, improving their performance, and an autonomous anti-spoofing technique that exploits semi-codeless tracking techniques is introduced.
Finally, physical layer authentication techniques for IoT are discussed, providing a trade-off between the performance of the authentication protocol and energy expenditure of the authentication process.

Abstract (italiano)

Questa tesi esamina i servizi di autenticazione e la protezione di integrità in due contesti emergenti come Global Navigation Satellite Systems (GNSS) e the Internet of Things (IoT), analizzando varie tecniche proposte in letteratura e proponendone di originali.
I sistemi di navigazione satellitare, di cui il più conosciuto ed utilizzato è GPS, forniscono servizi di posizionamento e sincronizzazione temporale con copertura globale. Esistono vari motivi per attaccare GNSS: dai motivi legati alla privacy, all’attaccare infrastrutture critiche per scopi terroristici.
La generazione e trasmissione di segnali GNSS contraffatti, per scopi di ricerca o per effettuare attacchi, è diventata più semplice negli ultimi anni con l’aumento della potenza computazionale e la disponibilità di Software Defined Radios (SDRs), dispositivi radio general purpose che possono essere programmati sia per ricevere che per trasmettere segnali RF.
Questa tesi fa una analisi di sicurezza delle principali tecniche di autenticazione per GNSS proposte in letteratura, sia al livello dati che al livello di segnale. È proposto uno schema originale di autenticazione al livello dati, SigAm, che combina la sicurezza delle primitive crittografiche asimmetriche con le performance delle funzioni di hashing o di funzioni crittografiche simmetriche. Inoltre, è proposta una generalizzazione degli attacchi security code estimation and replay e delle rispettive tecniche di difesa, migliorando le prestazioni in entrambi i versanti, ed è proposta una tecnica anti-spoofing autonoma che usa semi-codeless tracking.
Infine, sono discusse tecniche di autenticazione a livello fisico applicate ad IoT, mettendo in risalto il trade-off tra le performance e il costo energetico del processo di autenticazione.

Statistiche Download - Aggiungi a RefWorks
Tipo di EPrint:Tesi di dottorato
Relatore:Laurenti, Nicola
Dottorato (corsi e scuole):Ciclo 29 > Corsi 29 > INGEGNERIA DELL'INFORMAZIONE
Data di deposito della tesi:24 Gennaio 2017
Anno di Pubblicazione:24 Gennaio 2017
Parole chiave (italiano / inglese):GNSS, Authentication, Integrity Protection, Critical Infrastructures, Spoofing, IoT, Resilient PNT, NMA
Settori scientifico-disciplinari MIUR:Area 09 - Ingegneria industriale e dell'informazione > ING-INF/03 Telecomunicazioni
Struttura di riferimento:Dipartimenti > Dipartimento di Ingegneria dell'Informazione
Codice ID:9797
Depositato il:09 Nov 2017 17:03
Simple Metadata
Full Metadata
EndNote Format

Bibliografia

I riferimenti della bibliografia possono essere cercati con Cerca la citazione di AIRE, copiando il titolo dell'articolo (o del libro) e la rivista (se presente) nei campi appositi di "Cerca la Citazione di AIRE".
Le url contenute in alcuni riferimenti sono raggiungibili cliccando sul link alla fine della citazione (Vai!) e tramite Google (Ricerca con Google). Il risultato dipende dalla formattazione della citazione.

[1] J. A. Volpe, “Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System,” tech. rep., National Transportation Systems Center, 2001. Cerca con Google

[2] U. Kröner, H. Greidanus, R. Gallagher, M. Sironi, G. Azzalin, F. Littmann, P. Tebaldi, P. Timossi, and D. Shaw, Report on Authentication in Fisheries Monitoring. 2009. Cerca con Google

[3] G. Caparra, S. Sturaro, and N. Laurenti, “Novel and Advanced Authentication Techniques for GNSS - A GOSSIP, A PLAY Technical Note 3.” 2016. Cerca con Google

[4] G. Caparra, S. Sturaro, N. Laurenti, C. Wullems, and R. T. Ioannides, “A Novel Navigation Message Authentication Scheme for GNSS Open Service,” in ION GNSS+ 2016, (Portland, Oregon), pp. 2938 – 2947, 2016. Cerca con Google

[5] G. Caparra, C. Wullems, S. Ceccato, S. Sturaro, N. Laurenti, O. Pozzobon, R. T. Ioannides, and M. Crisci, “Design Drivers for Navigation Message Authentication Schemes for GNSS Systems,” InsideGNSS, vol. 11, no. 5, pp. 64–73, 2016. Cerca con Google

[6] G. Caparra, N. Laurenti, R. T. Ioannides, and M. Crisci, “Improving Secure Code Estimation and Replay Attack and Detection on GNSS Signals,” in ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, NAVITEC, 2014. Cerca con Google

[7] G. Caparra, C. Wullems, and R. T. Ioannides, “An Autonomous GNSS Anti-Spoofing Technique,” in Navitec 2016, (Noordwijk, The Netherlands), 2016. Cerca con Google

[8] G. Caparra, M. Centenaro, N. Laurenti, S. Tomasin, and L. Vangelista, “Energy-based anchor node selection for IoT physical layer authentication,” in 2016 IEEE International Conference on Communications (ICC), (Kuala Lumpur, Malaysia), pp. 1–6, IEEE, may 2016. Cerca con Google

[9] G. Caparra, M. Centenaro, N. Laurenti, S. Tomasin, and L. Vangelista, “Energy-Efficient Physical Layer Authentication in the Internet of Things,” in Information Theoretic Security and Privacy of Information Systems (R. F. Schaefer, H. Boche, A. Khisti, and H. V. Poor, eds.), Cambridge University Press, 2017. Cerca con Google

[10] Navipedia, “Correlators - Navipedia,” in http://www.navipedia.net/index.php/Correlators, (Date Accessed: 2016-11-15), 2011. Vai! Cerca con Google

[11] E. D. Kaplan and C. J. Hegarty, Understanding GPS: principles and applications. Artech house, 2005. Cerca con Google

[12] M. Appel, A. Konovaltsev, and M. Meurer, “Joint Antenna Array Attitude Tracking and Spoofing Detection Based on Phase Difference Measurements,” in ION GNSS+ 2016, (Portland, Oregon), 2016. Cerca con Google

[13] K. D. Wesson, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing,” Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2011), pp. 177–193, 2011. Cerca con Google

[14] D. M. Akos, “Who’s Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC),” Navigation, vol. 59, pp. 281–290, dec 2012. Cerca con Google

[15] A. Jafarnia Jahromi, GNSS Signal Authenticity Verification in the Presence of Structural Interference. PhD thesis, University of Calgary, 2013. Cerca con Google

[16] K. D. Wesson, M. Rothlisberger, and T. E. Humphreys, “Practical Cryptographic Civil GPS Signal Authentication,” Journal of the Institute of Navigation, pp. 1–15, 2011. Cerca con Google

[17] C. Yang, M. Miller, E. Blasch, and T. Nguyen, “Comparative study of coherent, non-coherent, and semi-coherent integration schemes for GNSS receivers,” in Proceedings of the 63rd Annual Meeting of the Institute of Navigation, pp. 572–588, 2001. Cerca con Google

[18] R. T. Ioannides, L. E. Aguado, and G. Brodin, “Diverse Signals Combinations for HighSensitivity GNSS,” Journal of Navigation, vol. 60, p. 497, sep 2007. Cerca con Google

[19] R. van Nee, J. Siereveld, P. Fenton, and B. Townsend, “The multipath estimating delay lock loop: approaching theoretical accuracy limits,” in Proceedings of 1994 IEEE Position, Location and Navigation Symposium - PLANS’94, pp. 246–251, IEEE, 1994. Cerca con Google

[20] G. Gamba, S. Fantinato, O. Pozzobon, M. Anghileri, R. T. Ioannides, and J.-Á. Ávila-Rodríguez, “The Spoofing Estimating Delay Lock Loop,” in Navitec 2014, (Noordwijk, The Netherlands), 2014. Cerca con Google

[21] A. J. Jahromi, A. Broumandan, S. Daneshmand, G. Lachapelle, and R. T. Ioannides, “Galileo signal authenticity verification using signal quality monitoring methods,” in 2016 International Conference on Localization and GNSS (ICL-GNSS), pp. 1–8, IEEE, jun 2016. Cerca con Google

[22] C. O’Driscoll, J.-Á. Ávila-Rodríguez, and R. T. Ioannides, “Bandlimiting and Dispersive Effects´ on High Order BOC Signals,” in ION GNSS+ 2016, (Portland, Oregon), 2016. Cerca con Google

[23] S. Hewitson and J. Wang, “GNSS Receiver Autonomous Integrity Monitoring (RAIM) Performance Analysis,” GPS Solutions, vol. 10, no. 3, pp. 155–170, 2006. Cerca con Google

[24] J. Ventura-Traveset and D. Flament, EGNOS – The European Geostationary Navigation Overlay System. ESA, sp-1303 ed., 2006. Cerca con Google

[25] ICAO, Annex 10 - Volume 1 Aeronautical Telecommunications - Radio Navigation Aids. Cerca con Google

[26] R. T. Ioannides, T. Pany, and G. Gibbons, “Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques,” Proceedings of the IEEE, vol. 104, pp. 1174–1194, jun 2016. Cerca con Google

[27] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, “On the requirements for successful GPS spoofing attacks,” in ACM conference on Computer and communications security, CCS, (New York, New York, USA), p. 75, ACM Press, 2011. Cerca con Google

[28] A. Pando and D. Horacio, “Distance-Decreasing Attack in Global Navigation Satellite System,” 2009. Cerca con Google

[29] K. Zhang and P. Papadimitratos, “GNSS receiver tracking performance analysis under distance-decreasing attacks,” in IEEE International Conference on Location and GNSS, ICL-GNSS, pp. 1–6, IEEE, jun 2015. Cerca con Google

[30] T. E. Humphreys, “Detection Strategy for Cryptographic GNSS Anti-Spoofing,” IEEE Transactions on Aerospace and Electronic Systems, vol. 49, pp. 1073–1090, apr 2013. Cerca con Google

[31] O. Pozzobon, C. Wullems, and M. Detratti, “Security considerations in the design of tamper resistant GNSS receivers,” in ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, NAVITEC, pp. 1–5, IEEE, dec 2010. Cerca con Google

[32] C. Wullems, O. Pozzobon, and K. Kubik, “Signal Authentication and Integrity Schemes for Next Generation Global Navigation Satellite Systems,” in European Navigation Conference, (ENCGNSS), pp. 1–10, 2005. Cerca con Google

[33] A. Dalla Chiara, G. Da Broi, O. Pozzobon, S. Sturaro, G. Caparra, N. Laurenti, J. Fidalgo, M. Odriozola, J. Caro Ramon, I. Fernández-Hernández, and E. Chatre, “Authentication Concepts for Satellite-Based Augmentation Systems,” in ION GNSS+ 2016, (Portland, Oregon), pp. 3208 – 3221, 2016. Cerca con Google

[34] A. Perrig and J. Tygar, “Secure Broadcast Communication,” Wired and Wireless Networks, Springer, 2003. Cerca con Google

[35] K. Grover and A. Lim, “A survey of broadcast authentication schemes for wireless networks,” Ad Hoc Networks, vol. 24, pp. 288–316, jan 2015. Cerca con Google

[36] N. P. Smart, V. Rijmen, B. Gierlichs, K. G. Paterson, M. Stam, B. Warinschi, and G. Watson, “Algorithms, Key Size and Parameters Report,” tech. rep., ENISA, 2014. Cerca con Google

[37] J. Jonsson and B. Kaliski, “Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1,” 2003. Cerca con Google

[38] “ISO/IEC 9796-2:2010. Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms,” ISO ISO/IEC\char9796-2:2010, International Organization for Standardization, Geneva, Switzerland, 2010. Cerca con Google

[39] D. Pointcheval and S. Vaudenay, “On provable security for digital signature algorithms,” tech. rep., 1996. Cerca con Google

[40] C.-P. Schnorr, “Efficient Identification and Signatures for Smart Cards,” in Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’89, (London, UK, UK), pp. 239–252, Springer-Verlag, 1990. Cerca con Google

[41] S. C. Lo and P. K. Enge, “Authenticating aviation augmentation system broadcasts,” in IEEE/ION Position, Location and Navigation Symposium, pp. 708–717, IEEE, may 2010. Cerca con Google

[42] A. J. Kerns, K. D. Wesson, and T. E. Humphreys, “A blueprint for civil GPS navigation message authentication,” in 2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014, pp. 262–269, IEEE, may 2014. Cerca con Google

[43] G. Ateniese and B. de Medeiros, “A Provably Secure Nyberg-Rueppel Signature Variant with Applications,” IACR Cryptology ePrint Archive, 2004. Cerca con Google

[44] D. Boneh, B. Lynn, and H. Shacham, “Short Signatures from the Weil Pairing,” in Advances in Cryptology — ASIACRYPT 2001, pp. 514–532, 2001. Cerca con Google

[45] A. Perrig, “The BiBa one-time signature and broadcast authentication protocol,” in Proceedings of the 8th ACM conference on Computer and Communications Security - CCS ’01, (New York, New York, USA), p. 28, ACM Press, nov 2001. Cerca con Google

[46] L. Reyzin and N. Reyzin, “Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying,” in Information Security and Privacy, 7th Australasian Conference, ACISP 2002 (L. Batten and J. Seberry, eds.), (Melbourne, Australia), pp. 144–153, Springer-Verlag Heidelberg, 2002. Cerca con Google

[47] A. A. Yavuz, “ETA: efficient and tiny and authentication for heterogeneous wireless systems,” in ACM conference on Wireless network security, WiSec, pp. 67–72, 2013. Cerca con Google

[48] J. T. Curran, M. Paonni, and J. Bishop, “Securing the Open-Service: A Candidate Navigation Message Authentication Scheme for Galileo E1 OS,” in European Navigation Conference, (ENCGNSS), (Rotterdam), 2014. Cerca con Google

[49] I. Fernández-Hernández, V. Rijmen, G. Seco-Granados, J. Simón, I. Rodríguez, and J. D. Calle, “Design Drivers, Solutions and Robustness Assessment of Navigation Message Authentication for the Galileo Open Service,” in International Technical Meeting of The Satellite Division of the Institute of Navigation, ION GNSS, pp. 2810–2827, 2014. Cerca con Google

[50] P. Walker, V. Rijmen, I. Fernández-Hernández, G. Seco-Granados, J. Simón, J. D. Calle, and O. Pozzobon, “Galileo Open Service Authentication : A Complete Service Design and Provision Analysis,” in ION GNSS+ 2015, (Tampa, Florida), 2015. Cerca con Google

[51] I. Fernández-Hernández, G. Seco-Granados, I. Rodríguez, and J. D. Calle, “A Navigation Message Authentication Proposal for the Galileo Open Service,” NAVIGATION: Journal of The Institute of Navigation, vol. 63, no. 1, pp. 85–102, 2016. Cerca con Google

[52] ETSI, White Paper Quantum Safe Cryptography and Security; An introduction , benefits , enablers and challenges. 2014. Cerca con Google

[53] L. Chen, S. Jordan, Y.-K. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone, “Quantum Cryptography Report on Post - Quantum Cryptography,” pp. 1–15, 2016. Cerca con Google

[54] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. Cerca con Google

[55] N. Courtois, M. Finiasz, and N. Sendrier, “How to achieve a McEliece-based digital signature scheme,” in Advances in Cryptology - ASIACRYPT 2001 (C. Boyd, ed.), (Gold Coast, Australia), pp. 157–174, Springer Berlin Heidelberg, 2001. Cerca con Google

[56] M. Finiasz, “Parallel-CFS,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6544 LNCS, pp. 159– 170, 2011. Cerca con Google

[57] M. Baldi, M. Bianchi, F. Chiaraluce, J. Rosenthal, and D. Schipani, “Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures,” in Post-Quantum Cryptography, PQ, pp. 1–15, Springer Berlin Heidelberg, may 2013. Cerca con Google

[58] A. Kipnis, J. Patarin, and L. Goubin, “Unbalanced Oil and Vinegar Signature Schemes,” in Advances in Cryptology — EUROCRYPT ’99 (J. Stern, ed.), pp. 206–222, Prague, Czech Republic: Springer Berlin Heidelberg, 1999. Cerca con Google

[59] J. Ding and D. Schmidt, “Rainbow, a New Multivariable Polynomial Signature Scheme,” in Applied Cryptography and Network Security, pp. 164–175, New York, USA: Springer Berlin Heidelberg, 2005. Cerca con Google

[60] J. Ding, B.-Y. Yang, C.-H. O. Chen, M.-S. Chen, and C.-M. Cheng, “New Differential-Algebraic Attacks and Reparametrization of Rainbow,” in Applied Cryptography and Network Security, vol. 5037 LNCS, pp. 242–257, Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. Cerca con Google

[61] A. Petzoldt, S. Bulygin, and J. Buchmann, “Selecting Parameters for the Rainbow Signature Scheme,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6061 LNCS, pp. 218–240, 2010. Cerca con Google

[62] A. Perrig, R. Canetti, J. Tygar, and D. Song, “Efficient authentication and signing of multicast streams over lossy channels,” in Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, pp. 56–73, IEEE Comput. Soc, 2000. Cerca con Google

[63] I. Fernández-Hernández, “Method and system to optimise the authentication of radionavigation signals,” 2015. Cerca con Google

[64] A. Perrig, R. Canetti, J. Tygar, and B. Briscoe, “Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction”, RFC 4082,” 2005. Cerca con Google

[65] M. Archer, “Proving correctness of the basic TESLA multicast stream authentication protocol with TAME,” in WITS ’02, (Portland, Oregon), 2002. Cerca con Google

[66] A. Lomuscio and B. Wozna, “A complete and decidable security-specialised logic and its application to the TESLA protocol,” in Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS ’06, (Hakodate, Hokkaido, Japan), ACM, 2006. Cerca con Google

[67] I. Ouranos, K. Ogata, and P. Stefaneas, “Formal Analysis of TESLA Protocol in the Timed OTS/CafeOBJ Method,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7610 LNCS, pp. 126– 142, 2012. Cerca con Google

[68] J. Guilford, K. Yap, and V. Gopal, “Fast SHA-256 Implementations on Intel Architecture Processors,” IA Architects, 2012. Cerca con Google

[69] Bitmaintech, “https://www.bitmaintech.com/product.htm.” Vai! Cerca con Google

[70] Antpool, “https://www.antpool.com.” Vai! Cerca con Google

[71] Blockchain.info, “https://blockchain.info/charts/hash-rate?timespan=all.” Vai! Cerca con Google

[72] I. Fernández-Hernández, I. Rodríguez, G. Tobías, J. D. Calle, E. Carbonell, G. Seco-Granados, J. Simón, and R. Blasi, “Galileo Commercial Service. Testing GNSS High Accuracy and Authentication,” InsideGNSS, vol. 10, no. 1, pp. 38–48, 2015. Cerca con Google

[73] M. E. Hellman, “A Cryptanalytic Time-Memory Trade-Off,” IEEE Transactions on Information Theory, vol. 26, no. 4, pp. 401–406, 1980. Cerca con Google

[74] J. T. Curran and C. O’Driscoll, “Message Authentication and Channel Coding,” in ION GNSS+ 2016, (Portland, Oregon), 2016. Cerca con Google

[75] J. T. Curran, M. Navarro, M. Anghileri, P. Closas, and S. Pfletschinger, “Coding Aspects of Secure GNSS Receivers,” Proceedings of the IEEE, vol. 104, pp. 1271–1287, jun 2016. Cerca con Google

[76] J. T. Curran, M. Bavaro, P. Closas, M. Anghileri, M. Navarro, B. Schotsch, and S. Pfletschinger, “On the Threat of Systematic Jamming of GNSS,” in ION GNSS+ 2016, (Portland, Oregon), 2016. Cerca con Google

[77] D. Borio, C. Gioia, G. Baldini, and J. Fortuny, “GNSS Receiver Fingerprinting for SecurityEnhanced Applications,” in ION GNSS+ 2016, (Portland, Oregon), 2016. Cerca con Google

[78] Y. Liu, J. Li, and M. Guizani, “PKC Based Broadcast Authentication using Signature Amortization for WSNs,” IEEE Transactions on Wireless Communications, vol. 11, pp. 2106–2115, jun 2012. Cerca con Google

[79] J. T. Curran and M. Paonni, “Securing GNSS: An End-to-End Feasibility Study for the Galileo Open Service,” in International Technical Meeting of the Satellite Division of The Institute of Navigation, ION GNSS, pp. 1–15, 2014. Cerca con Google

[80] M. Canale, S. Fantinato, and O. Pozzobon, “Performance Comparison of Different Data Authentication Solutions for the Galileo CS,” in ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, NAVITEC, 2014. Cerca con Google

[81] N. Zivic and M. F. Flanagan, “On Joint Cryptographic Verification and Channel Decoding via the Maximum Likelihood Criterion,” IEEE Communications Letters, vol. 16, pp. 717–719, may 2012. Cerca con Google

[82] N. Zivic, “Reliability of Soft Verification of Message Authentication Codes,” in 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks, pp. 191–196, IEEE, jun 2013. Cerca con Google

[83] N. Zivic, “Security Aspects of Soft Verified Messages Protected by Message Authentication Codes,” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1316–1322, IEEE, jun 2012. Cerca con Google

[84] T. Walter, J. Blanch, R. Eric Phelts, and P. Enge, “Evolving WAAS to serve L1/L5 users,” Navigation, Journal of the Institute of Navigation, vol. 59, no. 4, pp. 317–327, 2012. Cerca con Google

[85] P. Enge and T. Walter, “Digital Message Authentication for SBAS ( and APNT ),” 2014. Cerca con Google

[86] I. Fernández-Hernández, J. Simón, R. Blasi, C. Payne, T. Miquel, and J. P. Boyero, “The Galileo Commercial Service: Current Status and Prospects,” in European Navigation Conference, (ENCGNSS), (Rotterdam), 2014. Cerca con Google

[87] I. Rodríguez, G. Tobías, J. D. Calle, J. M. Martín, O. Pozzobon, M. Canale, D. Maharaj, P. Walker, E. Göhler, P. Toor, and I. Fernández-Hernández, “Preparing for the Galileo Commercial Service – Proof of Concept and Demonstrator Development,” in International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS, pp. 1–12, 2014. Cerca con Google

[88] M. Ågren, M. Hell, T. Johansson, and W. Meier, “Grain-128a: a new version of Grain-128 with optional authentication,” International Journal of Wireless and Mobile Computing, vol. 5, p. 48, dec 2011. Cerca con Google

[89] H. Zhang and X. Wang, “Cryptanalysis of Stream Cipher Grain Family.,” IACR Cryptology ePrint Archive, vol. 2009, 2009. Cerca con Google

[90] M. G. Kuhn, “An asymmetric security mechanism for navigation signals,” in International Workshop on Information Hiding, IH (J. Fridrich, ed.), vol. 3200 of Lecture Notes in Computer Science, (Berlin, Heidelberg), pp. 239–252, Springer Berlin Heidelberg, 2005. Cerca con Google

[91] L. Scott, “Anti-spoofing & authenticated signal architectures for civil navigation systems,” Proceedings of the Institute of Navigation GPS/GNSS 2003 conference, pp. 1543–1552, 2003. Cerca con Google

[92] O. Pozzobon, L. Canzian, M. Danieletto, and A. Dalla Chiara, “Anti-spoofing and open GNSS signal authentication with signal authentication sequences,” in ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, NAVITEC, pp. 1–6, IEEE, dec 2010. Cerca con Google

[93] O. Pozzobon, C. Sarto, A. Pozzobon, D. Dötterböck, B. Eissfeller, E. Pérez, and D. Abia, “Open GNSS signal authentication based on the Galileo Commercial Service (CS),” in International Technical Meeting of The Satellite Division of the Institute of Navigation, ION GNSS+, pp. 1– 10, 2013. Cerca con Google

[94] M. L. Psiaki, B. W. O’Hanlon, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, “GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals,” IEEE Transactions on Aerospace and Electronic Systems, vol. 49, pp. 2250–2267, oct 2013. Cerca con Google

[95] T. Bull, “A new high performance way of detecting and mitigating the Jamming Meaconing and spoofing of commercial GNSS signals,” in ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, NAVITEC, pp. 1–5, IEEE, dec 2010. Cerca con Google

[96] J. Hall, M. Barbeau, and E. Kranakis, “Detection of transient in radio frequency fingerprinting using signal phase,” Wireless and Optical Communications, pp. 13–18, 2003. Cerca con Google

[97] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless device identification with radiometric signatures,” in Proceedings of the 14th ACM international conference on Mobile computing and networking - MobiCom ’08, (New York, New York, USA), p. 116, ACM Press, 2008. Cerca con Google

[98] U. M. Maurer, “Authentication theory and hypothesis testing,” IEEE Transactions on Information Theory, vol. 46, pp. 1350–1356, jul 2000. Cerca con Google

[99] L. Lai, H. El Gamal, and H. V. Poor, “Authentication Over Noisy Channels,” IEEE Transactions on Information Theory, vol. 55, pp. 906–916, feb 2009. Cerca con Google

[100] P. Baracca, N. Laurenti, and S. Tomasin, “Physical Layer Authentication over MIMO Fading Wiretap Channels,” IEEE Transactions on Wireless Communications, vol. 11, pp. 2564–2573, jul 2012. Cerca con Google

[101] O. Pozzobon, G. Gamba, M. Canale, and S. Fantinato, “Supersonic GNSS Authentication Codes,” in International Technical Meeting of The Satellite Division of the Institute of Navigation, ION GNSS, pp. 1–8, 2014. Cerca con Google

[102] S. M. Kay, Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory. New Jersey: Prentice-Hall Inc, 1993. Cerca con Google

[103] O. Zeitouni, J. Ziv, and N. Merhav, “When is the generalized likelihood ratio test optimal?,” IEEE Transactions on Information Theory, vol. 38, no. 5, pp. 1597–1602, 1992. Cerca con Google

[104] Greatscottgadgets, “https://greatscottgadgets.com/hackrf/.” Vai! Cerca con Google

[105] T. E. Humphreys, J. A. Bhatti, D. P. Shepard, and K. D. Wesson, “The Texas Spoofing Test Battery : Toward a Standard for Evaluating GPS Signal Authentication Techniques,” in ION GNSS 2012, (Nashville, Tennessee), pp. 3569 – 3583, 2012. Cerca con Google

[106] I. Fernández-Hernández and G. Seco-Granados, “Galileo NMA Signal Unpredictability and AntiReplay Protection,” in ICL-GNSS 2016, 2016. Cerca con Google

[107] H. V. Poor and O. Hadjiliadis, Quickest Detection. Cambridge University Press, 2009. Cerca con Google

[108] D. Egea-Roca, G. Seco-Granados, J. A. Lopez-Salcedo, E. Domíngez, L. E. Aguado, D. Lowe, D. Naberzhnykh, F. Dovis, I. Fernández-Hernández, and J. P. Boyero, “Signal-level Integrity and Metrics Based on the Application of Quickest Detection Theory to Interference Detection,” in ION GNSS+ 2015, (Tampa, Florida), pp. 3136 – 3147, 2015. Cerca con Google

[109] Z. Zhang, M. Trinkle, L. Qian, and H. Li, “Quickest detection of GPS spoofing attack,” in MILCOM 2012 - 2012 IEEE Military Communications Conference, pp. 1–6, IEEE, oct 2012. Cerca con Google

[110] K. T. Woo, “Optimum Semi-Codeless Carrier Phase Tracking of L2,” in Navigation, vol. 47, pp. 82–99, 1999. Cerca con Google

[111] M. Cagalj, S. Capkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux, “Integrity (I) codes: message integrity protection and authentication over insecure channels,” in 2006 IEEE Symposium on Security and Privacy (S&P’06), pp. 15 pp.–294, IEEE, 2006. Cerca con Google

[112] K. B. Rasmussen, S. Capkun, and M. Cagalj, “SecNav: Secure Broadcast Localization and Time Synchronization in Wireless Networks,” in Proceedings of the 13th annual ACM international conference on Mobile computing and networking - MobiCom ’07, (New York, New York, USA), p. 310, ACM Press, sep 2007. Cerca con Google

[113] M. Bertier, A.-M. Kermarrec, and G. Tan, “Message-Efficient Byzantine Fault-Tolerant Broadcast in a Multi-hop Wireless Sensor Network,” in 2010 IEEE 30th International Conference on Distributed Computing Systems, pp. 408–417, IEEE, 2010. Cerca con Google

[114] J.-Á. Ávila-Rodríguez, “On Generalized Signal Waveforms for Satellite Navigation.” PhD thesis, Universität der Bundeswehr München, 2008. Cerca con Google

[115] O. Pozzobon, “Keeping the Spoofs Out. Signal Authentication Services for Future GNSS,” InsideGNSS, vol. 6, no. 3, pp. 48–55, 2011. Cerca con Google

[116] NIST, “Pub 800-38C, Recommendation for Block Cipher Modes of Operation—The CCM Mode for Authentication and Confidentiality.,” tech. rep., U.S. Department of Commerce/N.I.S.T., 2004. Cerca con Google

[117] E. Jorswieck, S. Tomasin, and A. Sezgin, “Broadcasting Into the Uncertainty: Authentication and Confidentiality by Physical-Layer Processing,” Proceedings of the IEEE, vol. 103, no. 10, pp. 1702–1724, 2015. Cerca con Google

[118] G. J. Simmons, “Authentication theory/coding theory,” in Advances in Cryptology: Proceedings of CRYPTO 84 (G. R. Blakley and D. Chaum, eds.), pp. 411–431, Springer Berlin Heidelberg, 1985. Cerca con Google

[119] G. J. Simmons, “A survey of information authentication,” Proceedings of the IEEE, vol. 76, no. 5, pp. 603–620, 1988. Cerca con Google

[120] P. L. Yu, J. S. Baras, and B. M. Sadler, “Physical-Layer Authentication,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 1, pp. 38–51, 2008. Cerca con Google

[121] P. L. Yu, J. S. Baras, and B. M. Sadler, “Power allocation tradeoffs in multicarrier authentication systems,” in IEEE Sarnoff Symp., pp. 1–5, 2009. Cerca con Google

[122] P. Baracca, N. Laurenti, and S. Tomasin, “Physical Layer Authentication over an OFDM Fading Wiretap Channel,” in Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS ’11, (ICST, Brussels, Belgium, Belgium), pp. 648–657, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2011. Cerca con Google

[123] A. Ferrante, N. Laurenti, C. Masiero, M. Pavon, and S. Tomasin, “On the Error Region for Channel Estimation-Based Physical Layer Authentication Over Rayleigh Fading,” IEEE Transactions on Information Forensics and Security, vol. 10, pp. 941–952, may 2015. Cerca con Google

[124] S. Jiang, “Keyless Authentication in a Noisy Model,” IEEE Transactions on Information Forensics and Security, vol. 9, pp. 1024–1033, jun 2014. Cerca con Google

[125] A. Biral, M. Centenaro, A. Zanella, L. Vangelista, and M. Zorzi, “The challenges of M2M massive access in wireless cellular networks,” Digital Communications and Networks, vol. 1, no. 1, pp. 1–19, 2015. Cerca con Google

[126] H. V. Khuong and H. Y. Kong, “General expression for pdf of a sum of independent exponential random variables,” IEEE Communications Letters, vol. 10, no. 3, pp. 159–161, 2006. Cerca con Google

Download statistics

Solo per lo Staff dell Archivio: Modifica questo record