Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services ()
Abstract
This paper describes a secure framework for tracking applications that use the Galileo signal authentication services. First a number of limitations that affect the trust of critical tracking applications, even in presence of authenticated GNSS signals, are detailed. Requirements for secure tracking are then introduced; detailing how the integrity characteristics of the Galileo authentication could enhance the security of active tracking applications. This paper concludes with a discussion of our existing tracking technology using a Siemens TC45 GSM/GPRS module and future development utilizing our previously proposed trusted GNSS receiver.
Share and Cite:
O. Pozzobon, C. Wullems and K. Kubik, "Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services," Positioning, Vol. 1 No. 8, 2004, pp. -.
Conflicts of Interest
The authors declare no conflicts of interest.
References
[1]
|
Callaghan, S., and Fruehauf, H. (2003). SAASM and Direct P(Y) Signal Acquisition, The Journal of Defens Software Engineering, 16(6), 12-16.
|
[2]
|
Dierks, T., and Allen, C. (1999). The TLS Protocol Version 1.0, Network Working Group, Internet Engineering Task Force, Request for Comments 2246.
|
[3]
|
Galilei. (2003). The Galilei Project: GALILEO Design Consolidation, European Commission.
|
[4]
|
Gibbons, G. (2004). HazMat Keeps on Truckin', GPSWorld (October), 6.
|
[5]
|
Hein, G. W. et al. (2002). Status of Galileo Frequency and Signal Design. Brussels.
|
[6]
|
Pozzobon, O., Wullems, C., and Kubik, K. Requirements for Enhancing Trust, Security and Integrity of GNSS Location Services, Institute of Navigation (ION ), 60th annual meeting, Dayton, OH, USA.
|
[7]
|
Scott, L. Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems, ION GPS, GNSS 2003, Portland, OR.
|
[8]
|
Spreitzer, M., and Theimer, M. Providing Location Information in a Ubiquitous Computing Environment. Fourteenth ACM Symposium on Operating System Principles, 270–283.
|
[9]
|
Volpe, J. A. (2001). Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System.
|