Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services

Abstract

This paper describes a secure framework for tracking applications that use the Galileo signal authentication services. First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed. Requirements for secure tracking are then introduced; detailing how the integrity characteristics of the Galileo authentication could enhance the security of active tracking applications. This paper concludes with a discussion of our existing tracking technology using a Siemens TC45 GSM/GPRS module and future development utilizing our previously proposed trusted GNSS receiver.

Share and Cite:

O. Pozzobon, C. Wullems and K. Kubik, "Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services," Positioning, Vol. 1 No. 8, 2004, pp. -.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Callaghan, S., and Fruehauf, H. (2003). SAASM and Direct P(Y) Signal Acquisition, The Journal of Defens Software Engineering, 16(6), 12-16.
[2] Dierks, T., and Allen, C. (1999). The TLS Protocol Version 1.0, Network Working Group, Internet Engineering Task Force, Request for Comments 2246.
[3] Galilei. (2003). The Galilei Project: GALILEO Design Consolidation, European Commission.
[4] Gibbons, G. (2004). HazMat Keeps on Truckin', GPSWorld (October), 6.
[5] Hein, G. W. et al. (2002). Status of Galileo Frequency and Signal Design. Brussels.
[6] Pozzobon, O., Wullems, C., and Kubik, K. Requirements for Enhancing Trust, Security and Integrity of GNSS Location Services, Institute of Navigation (ION ), 60th annual meeting, Dayton, OH, USA.
[7] Scott, L. Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems, ION GPS, GNSS 2003, Portland, OR.
[8] Spreitzer, M., and Theimer, M. Providing Location Information in a Ubiquitous Computing Environment. Fourteenth ACM Symposium on Operating System Principles, 270–283.
[9] Volpe, J. A. (2001). Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.