This work derives the authentication security of pseudorandom function (PRF) GNSS ranging under multiple GNSS spoofing models, including the Security Code Estimation and Replay (SCER) spoofer. When GNSS ranging codes derive from a PRF utilizing a secret known only to the broadcaster, the spoofer cannot predict the ranging code before broadcast. Therefore, PRF ranging can be used to establish trust in the GNSS pseudoranges and the resulting receiver position, navigation, and timing (PNT) solution. I apply the methods herein to Galileo's Signal Authentication Service (SAS) utilizing the encrypted Galileo E6-C signal to compute that, at most, 400 ms of Galileo E6-C data to assert 128-bit authentication security under non-SCER models. For the SCER adversary, I predict the adversary's needed receiving radio equipment to break authentication security. One can use this work to design a PRF GNSS ranging protocol to meet useful authentication security requirements by computing the probability of missed detection.
This research derives the authentication security of pseudorandom function (PRF) GNSS ranging under multiple GNSS spoofing models, including the Secure Code Estimation and Replay (SCER) spoofing attack. When GNSS ranging codes are derived from PRFs generated using keys known only to the broadcaster, spoofers cannot predict the ranging codes before transmission. Therefore, PRF ranging can be used to establish trust in GNSS pseudoranges and the resulting receiver position, navigation, and timing (PNT) solutions. The authors apply this methodology to the Galileo Signal Authentication Service (SAS), utilizing encrypted Galileo E6-C signals to determine that a maximum of 400ms of Galileo E6-C data is required to assert 128-bit authentication security under the non-SCER model.
The core problem addressed by this research is the authentication security of GNSS signals. As GNSS signal spoofing becomes prevalent in conflict zones and near critical infrastructure, ensuring the authenticity of GNSS signals has become a critical challenge.
Watermarking Approaches: While mathematical models for combined watermarking exist, PRF ranging lacks equivalent security analysis
Pseudorange Difference Methods: Methods based on authenticated and non-authenticated pseudorange differences have specificity issues
Insufficient Statistical Arguments: Existing work does not fully exploit the relationships between multiple unpredictable code chips and the rapid decay of binomial distribution tails
Mathematical Security Model: Provides a complete probabilistic model for Probability of Missed Detection (PMD) and Probability of False Alarm (PFA) for PRF GNSS ranging
Multiple Adversarial Models: Analyzes security under both Non-SCER and SCER adversarial models
Practical Application: Applies theory to Galileo E6-C signals, providing specific security parameter recommendations
Device Prediction: Predicts the receiver equipment specifications required for SCER attackers
Monte Carlo Verification: Validates theoretical derivations through simulation experiments
Non-SCER Verification: 10,000 trials verify formula (21) accuracy, with theoretical predictions and simulation results consistent within 99.7% confidence interval
HDSCER Verification: 10,000 trials verify formula (23), achieving similarly high consistency
GNSS authentication technology development history
TESLA protocol and related cryptographic foundations
Galileo SAS and related European technical documentation
GNSS spoofing detection and countermeasure techniques
Author's previous work on watermark authentication
Overall Assessment: This is a high-quality technical paper that achieves excellent balance between theoretical rigor and practical value. The paper fills an important theoretical gap in PRF GNSS ranging authentication security analysis and provides valuable design guidance for deployed systems. While there is room for improvement in analyzing certain complex attack models, the overall contribution is significant and holds important implications for GNSS security.