Anti-spoofing method for Beidou second-generation system based on elliptic curve algorithm

An algorithm and scheme technology, applied in the field of information security, can solve problems such as poor receivers and influence, and achieve the effects of reduced calculation, high efficiency, and short signature length

Inactive Publication Date: 2019-04-12
CIVIL AVIATION UNIV OF CHINA
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In summary, generative spoofing attacks have worse impact on the receiver than forwarding spoofing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-spoofing method for Beidou second-generation system based on elliptic curve algorithm
  • Anti-spoofing method for Beidou second-generation system based on elliptic curve algorithm
  • Anti-spoofing method for Beidou second-generation system based on elliptic curve algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The scheme of the present invention adopts a simulation experiment, and the entity implementation process is divided into five steps. Firstly, the present invention utilizes a key generation module to generate a private key and a public key; secondly, the signature of the basic navigation message is generated by the private key, and is inserted into the corresponding reserved bit; again, the present invention encodes, interleaves and modulates the navigation message BCH into Satellite signals; the present invention then performs interference with zero-mean Gaussian noise on these signals. When the receiver receives these signals, they are demodulated, deinterleaved and BCH decoded to obtain the navigation message; finally the present invention extracts the signature from the navigation message and passes the public key verification. Specific process such as Figure 10 and Figure 11 shown.

[0051] In the present invention, the elliptic curve used by the ECDSA algori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and designs an anti-spoofing scheme based on an Elliptic Curve Digital Signature Algorithm, ECDSA. Due to the transparency and predictability of a civil Beidou second-generation navigation signal, a Beidou civil satellite navigation system is easily threatened by spoofing attacks. Digital signature authentication information isinserted into reserved positions of Beidou D1 and D2 navigation messages, the authenticity and integrity of navigation data are verified, and then the purpose of resisting the spoofing attacks is achieved. The effectiveness, the security and the real-time performance of the anti-spoofing scheme are verified through a simulation experiment. An experimental result shows that the anti-spoofing schemecan effectively provide authentication for the Beidou second-generation navigation messages and enhance the ability of the civil satellite navigation system to resist the spoofing attacks.

Description

technical field [0001] The invention relates to the technical field of information security, and relates to a security authentication scheme for a Beidou second-generation navigation message generated with a digital signature based on an elliptic curve digital signature algorithm (ECDSA). Background technique [0002] Global Navigation Satellite System (GNSS) has been widely used in many fields such as military and industrial transportation. The good quality of service provided by GNSS can guarantee the normal operation of many safety technology systems. However, since the signal parameters and information formats of civil navigation systems are public, most of the civil navigation systems currently have huge potential safety hazards. [0003] The spoofing attacks of satellite signals by spoofers can cause great interference to GNSS positioning and timing services. By generating erroneous GNSS signals, a spoofer can spoof or even control a GNSS receiver to achieve the desi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G01S19/21
CPCH04L9/3252G01S19/215
Inventor 吴志军刘如森罗煊
Owner CIVIL AVIATION UNIV OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products