Journal of Global Positioning Systems (2004)
Vol. 3, No. 1-2: 200-207
Secure Tracking using Trusted GNSS Receivers and Galileo
Authentication Services
Oscar Pozzobon1, Chris Wullems1, Kurt Kubik2
1 Qascom, Via O.Marinali 87, 36061 Bassano del Grappa (VI), Italy
e-mail: o.pozzobon@qascom.com, c.wullems@qascom.com; Tel: + 39 0424-525-473; Fax: +39 0424-527-800
2 University of Queensland, Brisbane QLD, Australia
e-mail: kubik@itee.uq.edu.au; Tel: +61 7-3365-8328; Fax: +61 7-3365-4999
Received: 08 December 2004 / Accepted: 03 February 2005
Abstract. This paper describes a secure framework for
tracking applications that use the Galileo signal
authentication services. First a number of limitations that
affect the trust of critical tracking applications, even in
presence of authenticated GNSS signals, are detailed.
Requirements for secure tracking are then introduced;
detailing how the integrity characteristics of the Galileo
authentication could enhance the security of active
tracking applications. This paper concludes with a
discussion of our existing tracking technology using a
Siemens TC45 GSM/GPRS module and future
development utilizing our previously proposed trusted
GNSS receiver.
Key words: Galileo, GPS, security, authentication,
privacy, tracking
1 Introduction
In recent years there has been an increasing presence of
real time tracking applications in the GNSS (Global
Navigation Satellite Systems) market. It is possibly one
of the fastest growing areas in GNSS, however, fast
growth brings with it significant drawbacks such as the
lack of standardization and security support for
applications that require security for revenue protection
or even safety critical services.
The emergence of low cost GSM GPRS (General Packet
Radio Service) providing wireless communications
throughout Europe has fuelled rapid growth in the
development of embedded, application specific platforms,
which provides low-cost telematic solutions that are easy
to integrate. This rapid growth has happened at the
expense of a suitable security framework for development
of safety-critical or financially-critical applications. To
date there are few telematic solutions on the market that
even offer security services. Most rely on the flawed
encryption and key establishment protocols of GSM. One
of the most significant issues with GSM encryption is the
lack of support for cryptographic integrity protection.
The increase of tracking applications has resulted in the
emergence of a number of new applications including
GPS based road toll payments, GPS based insurance
policy, location-based access control, finance and
tracking for security. A number of these applications will
be introduced in the following sections.
1.1 GNSS based road toll collection
Future road toll collection systems are planned to be
based on GNSS technology in order to reduce
infrastructure costs and to achieve region based tax
collection facilitating regional tolling variations such as
pollution-tax for highly polluted areas. As taxes are
calculated based on location data from a GNSS receiver,
it is imperative that location data is trusted. An additional
concern is management of privacy in these technologies.
This issue is to a large extent sill unresolved, as location
data obtained by operators of these schemes are hardly
controlled by the user.
In mid-2003, the EC (European Commission) adopted a
proposal (COM(2003) 488) to align the national systems
of road tolling for heavy-goods vehicles in Europe. This
directive does not impose a particular technical solution,
but another EC communication (COM(2003) 123)
proposes the use of GNSS positioning and GSM/GPRS
mobile communications for new electronic toll systems
from 2008 onward (for all vehicle types). In addition, it
proposes that migration from legacy microwave systems
Pozzobon et al.: Secure Tracking using Galileo 201
to GNSS / mobile communications should be complete
by 2012. Authentication, availability and integrity of the
location data will be the main technical problem for
revenue protection of toll operators. From the user
perspective, privacy continues to be the biggest concern,
which will demand innovative solutions for the
management of location data privacy.
1.2 GNSS based insurance policy
GNSS tracking systems can be applied to insurance in
obtaining time usage and location travelled by insured
vehicles. This will permit insurance companies to create
pay per usage policies. For some users this would result
in cost reduction, as the policy cost can be estimated by
vehicle usage as total kilometres, risks of travelled
regions, average speed, time usage and time based risk.
The use of this type of information in insurance policies
continues to be an active area of research. A number of
experiments have been conducted by Norwich Union and
IBM in this area to test the user responses and system
reliability.
1.3 GNSS based aircraft tracking
The Future Air Navigation System (FANS) is an example
of aircraft tracking using a system facilitating a free
flight. In this technology, FANS is responsible for
communications, navigation and surveillance. The Flight
Management Computer (FMC) uses GPS, inertial
measurements, air data, and other navigation radios if
available to facilitate surveillance by a traffic
management (ATM) center, such that aircraft can be
tracked at all times. The security of this system is
important where there is an absence of radar systems to
verify the reported location of the aircraft. Security of the
data transmitted to the ATM is particularly critical in this
situation, as it can assist in preventing intentional location
spoofing.
1.4 GNSS based access control and auditing
Location can be used for the enhancement of access
control systems and auditing. There are many
applications where location context information can
supplement existing security. Such applications would
utilize location from GNSS systems in providing
location-based audit trails, or access control policy where
resources are granted or denied based on the location of a
user. Security and trust of location is particularly
important in this type of application, as insecure location
acquisition would not only result in serious security
breaches, but a false sense of security.
2 Limitations of existing technologies
There a number of security issues with tracking systems
which utilize existing GNSS and telematic devices. These
issues limit the potential for development of critical
applications. The most significant limitations are:
1. Lack of signal authentication: There is no civil
method to authenticate the GPS signal;
2. Lack of framework or standardized methodology
to verify the integrity of a device and assess its
security;
3. Lack of standardized telematic protocols that
provide communications security; and
4. Significant privacy issues, such that it is difficult
to obtain the location and preserve privacy at the
same time.
The following subsections discuss these limitations in
terms of signal authentication, device integrity and
telematic security.
2.1 Signal authentication
There have been a number of recent efforts to quantify
the extent of vulnerabilities and limitations the GPS civil
signal imposes on civil applications in the presence of
malicious attacks. Perhaps the most prominent
vulnerability analysis was the report on the vulnerabilities
of GPS in transportation, performed by the Volpe center
for the US Department of Transportation (Volpe 2001).
As the GPS civil signal is not authenticated, it is possible
to simulate it. In recent years simulators have become
readily available, such that a GPS simulator can be hired
relatively cheaply and can be connected to the antenna of
a GPS receiver in a vehicular tracking module for
example. Because of the possibility of signal simulation,
the current generation of GPS tracking modules poses a
potential security risk for use in safety or financially
critical applications, such as the tracking of hazardous
materials.
The U.S. Senate has recently approved a measure
providing funds for the Transportation Security
Administration (TSA) to develop measures for tracking
trucks carrying hazardous materials (HAZMAT). As
stated by (Gibbons 2004) More than 800,000 shipments
of hazardous materials take place in the United States
every day, including flammable fuel products, potentially
explosive fertilizers, and volatile chemicals. GPS signal
authentication is necessary for secure tracking in order to
prevent a hijacker from simply spoofing the reported
location.
The risk of signal simulation attacks is significantly
reduced where the cost of hiring a signal simulator
202 Journal of Global Positioning Systems
outweighs the potential cost savings in defeating a
tracking system. An example of this is performing a
simulation attack in order to avoid the payment of road
tolls or to cheat an insurance company by falsely
reporting the number of kilometers traveled.
In addition to GPS signal spoofing, there is the potential
for spoofing of augmentation data. The most widely used
augmentation systems are satellite based augmentation
systems including the European Geostationary
Navigation Overlay Service (EGNOS) and the American
Wide Area Augmentation System (WAAS). Both these
augmentation systems do not provide authentication or
cryptographic integrity protection. Spoofing of the
correction data provided by these systems can introduce
small but significant errors, which may be problematic
where a few meters of error is critical.
2.2 Device integrity
A typical tracking device is composed of a GPS module
and a communications module such as a GPRS modem or
radio modem. Some tracking devices additionally contain
a microprocessor with software to process the data from
the GPS module. There are a number of limitations of
current GPS modules:
There is no cryptographic authentication or
integrity protection of NMEA position, time or
velocity data sourced from the GPS module; and
The NMEA location data from the GPS module
can be trivially simulated.
In addition to the limitations of GPS modules, the lack of
authentication and end-to-end communications security
between the tracking device and the telematic server can
exacerbate the possible attacks that can be performed,
such as masquerading as the tracking device to spoof the
location.
2.3 Privacy
The growth of GNSS tracking applications has also
created significant privacy concerns. The first techniques
for managing privacy where proposed by (Spreitzer and
Theimer 1993). These techniques were based on a
location broker residing in the middleware layer. In
recent times, considerable research has been conducted in
the specification of protocols and policy representations
in the context of a cellular location. For tracking
applications, privacy is an issue for both single purpose
tracking devices and multipurpose ones. For single
purpose tracking, a user may be concerned with the usage
of the location data by the destination application. Where
a tracking device is used in a multi-application context,
such as a device supporting both toll-payment and
insurance tracking applications, the user must be able to
configure privacy policies such that only the absolute
minimum required location data for a given application is
provided.
The user in effect should be able to adjust the accuracy of
the location observations depending on the intended use
and identity of the recipient, and the compliance with
user’s privacy policy. The most prominent effort to
create location privacy standards outside the cellular
domain is seen in the Geographic Location/Privacy
(Geopriv1) working group of the Internet Engineering
Task Force (IETF). This group has developed a number
of draft standards for representation of privacy policy
data and protocols for management of location privacy.
3 Secure tracking using Galileo
There are a number of requirements for security and
privacy in GNSS tracking applications. The following
subsections discuss these requirements and possible
implementations in terms of satellite navigation system
security, tracking device security, communications
security to the telematic server, and privacy.
3.1 Signal authentication
Signal authentication of satellite navigation systems is
required in order to ensure that the source of the satellite
signaling is not from a simulator, but is genuine. There
are a number of existing and proposed signal
authentication methods (Hein and al 2002), (Scott 2003)
which are summarized below:
Signal Authentication through Authentication
Navigation Messages (ANM): The ANMs would
include a digital signature authenticating the
other navigation messages that contain data
including ephemeris and almanac data. Using
the digital signature, the certified receiver is able
to authenticate the source of messages and verify
their integrity. These authentication messages
are created on the ground and transmitted to the
satellites for broadcast. This method has a
security limitation, in that the messages can be
acquired by a certified receiver and modulated
over a simulated signal in order to spoof the
Galileo signal. This would require functionality
that is not commonly found in commercial
signal simulators, and would require the
operation to be performed within a very small
time window. Documents from the Galileo
design consolidation indicates that the Galileo
1 Refer to http://ecotroph.net/geopriv
Pozzobon et al.: Secure Tracking using Galileo 203
Open Service may support this type of signal
authentication (Galilei 2003).
Signal Authentication through Spread Spectrum
Security Codes (SSSC) (Scott 2003): SSSCs are
synchronous cipher streams seeded by an unsent
digital signature from an Authentication
Navigation Message, interleaved with normal
spreading sequences. The receiver stores A/D
samples and once the digital signature is
received, it is able to generate the security
spreading code reference signal and correlate it
with the stored samples. If the SSSC is detected
at the correct power level, the signal is
authenticated. This technique has the innovative
advantage that permits authentication in a signal
open to the public without the difficulties of key
distribution; however it has the limitation that
the spoofing detection is proportional to the
antenna gain and that the authentication
verification is not immediate. A more secure
type of authentication based on SSSCs is also
proposed by (Scott 2003), utilizing a Civil
Antispoof Security Module (CASM) with a
preloaded Red Key and the authentication
navigation message for seeding of the cipher
stream generator. This type of signal
authentication does not have the drawbacks of
the public SSSC version.
Signal Authentication through Spreading Code
Encryption (SCE): Spreading code encryption is
one of the oldest signal authentication
techniques, currently used by the GPS P(Y)
code, an exclusively military service, and is
projected to provide authentication of the
Galileo CS and PRS signals. As the spreading
code is secret, without knowledge of the
spreading code, signal access is denied. For this
reason, the spoofer cannot simulate the signal,
and hence authentication of the signal is
achieved when the user possesses the correct
spreading code. In GPS’ P(Y) code, the P code
is publicly known, and the secret spreading code
is obtained using P code with a Red Key, or a
Black Key and the Selective Availability Anti-
spoofing Module (SAASM) (Callaghan and
Fruehauf 2003). The Black Key is the Red Key
encrypted with the public key of a given
SAASM. , allowing the Red Key to be decrypted
inside the tamper-resistant SAASM which
contains its private key. The Black Keying
infrastructure allows for electronic key
distribution and does not compromise the
classified Red Key.
Civil signal authentication is a challenge for next
generation satellite systems. As detailed above, there are
a range of different strength security solutions and
proposals. The suitability of a particular signal
authentication mechanism is dependant on the cost to
defeat the mechanism; balanced against the possible gain
should the mechanism be successfully defeated.
The Galileo signals and corresponding authentication
schemes to date have not been decided. Based on
generally available information, it is evident that Galileo
will provide a number of different services, the following
of which are projected to provide signal authentication:
(Hein and al 2002)
Open Service (OS): Based on available literature
(Galilei 2003), encryption may be provided to
the open service on the E5b-I data channel. This
service will provide authentication through
Authentication Navigation Messages (ANM);
Safety of Life Service (SOL): This service will
provide satellite and signal integrity messages
and Authentication Navigation Messages
(ANM);
Commercial Service (CS): This service will
provide access restriction and authentication
through spreading code and data encryption
(SCE); and
Public Regulated Service (PRS): This service
will provide access restriction and authentication
through spreading code and data encryption
(SCE).
Of particular interest to consumer applications such as
insurance tracking and toll collection is the signal
authentication provided on the Open Service. Fig. 1
illustrates a candidate navigation message authentication
scheme as detailed in the Galilei Project Galileo Design
Consolidation (Galilei 2003).
The authenticated navigation messages would be created
by the Ground Control Centre and up-linked to the
satellites. In theory a public key certificate certified by
the Galileo certification authority would be included in
the navigation messages, and could be verified by the
Galileo certification authority certificate stored on a
certified receiver. Once the public key is verified, the
receiver would be able to verify the signature included in
the navigation messages, and hence authenticate the
source of the navigation messages, and implicitly the
integrity of the messages.
For applications with greater security requirements, the
CS and PRS signals will provide signal authentication
through encrypted ranging codes. While there is no
literature on the key distribution schemes, it can be
assumed that that the implementation would be similar to
the declassified Black Key distribution framework used
204 Journal of Global Positioning Systems
with the P(Y) code of GPS. The key distribution and key
storage problem in this scenario are similar to the
Selective Availability Anti Spoofing Module (SAASM)
(Callaghan and Fruehauf 2003), used in military
applications.
Fig. 1 Navigation authentication message
3.2 Receiver security for tracking applications
We have previously proposed the design for a trusted
civil receiver in (Pozzobon et al. 2004). In this
architecture a tamper resistant receiver uses public key
cryptography to assure the chain of trust to the
application, and provide authentication and cryptographic
integrity of the data to the application. The tamper
resistant receiver acquires and authenticates the signal,
calculates the location and creates data authentication
messages containing a digital signature of the location
data, signal state and tamper-resistance state using the
receiver private key. The data is sent to a telematic server
via a wireless communications service such as GPRS.
The data is send using an extension to the National
Marine Electronic Association (NMEA) protocol 0183
for GPS data navigation we have proposed (Pozzobon et
al. 2004), which provides authenticated position, time and
velocity information as well as signal state and tamper-
resistance state of the receiver.
As integrity verification is a computation embedded in
the device, the computation must be trusted. The device
must implement all the necessary integrity verification
algorithms and transmit to the telematic server any
information regarding status, availability, integrity of the
signal, and the results from the verification operations.
Technology such as the Trusted Computing Platform
(TCP)2 can be used to build trusted systems, that is,
systems where the application running can be trusted,
2 Refer to https://www.trustedcomputinggroup.org/
with the assurance that it has not been compromised, or
modified by an attacker.
Fig. 2 Tracking with a certified receiver
The concept behind this technology is to build a computer
with trusted building blocks (TBB). In TBB, the core root
of trust for measurement (CRTM) is the Basic
Input/Output system (BIOS) of the computer. The CRTM
uses the trusted platform module (TPM) for cryptography
operations (storage of keys, encryption) in order to trust
the system boot3 and verify the integrity of the
subsequently executed applications. The whole “chain of
trust” is based on public key infrastructure (PKI), RSA
and 3DES algorithms.
3.3 Location privacy
As detailed in Section 2.3, there are a set of emerging
standards for location privacy developed by the Geopriv
working group of the IETF. A high level diagram of the
interactions between architecture components in using
Geopriv protocols for management of privacy between a
GNSS tracking device and telematic server is illustrated
in Fig. 3. The components of the architecture include:
GNSS tracking device: The proposed tamper
resistant GNSS device;
The Telematic Server: The server that manages
location and communications;
3 The procedure that starts all the necessary process of an
operating system
Pozzobon et al.: Secure Tracking using Galileo 205
Rule Holder: The entity that provides the rules
associated with a particular target for the
distribution of location information; and
Rule Maker: The authority that creates rules
governing access to location information for a
target.
Fig. 3 Location privacy using Geopriv protocols
Fig. 3 additionally illustrated the process of privacy rule
upload on the telematic server and how privacy is
protected in the location acquisition process. This
process, which complies with the RFC3693 requirements,
consists of the following steps:
Rule Transfer: The Rule Maker sends a Rule to
the Telematic Server containing the privacy
information;
(1a) Signed Rule: the Rule Maker may write a
Rule and place it in a Public Rule Holder as an
alternative. The Telematic Server can access the
Public Rule Holder to read the signed Rules;
Location Information Request: The Location
Recipient Application requests location
information to the Telematic Server.
Locate: The Telematic Server is either
continuously receiving the location data from
the GNSS tracking device or can request updates
on the location. The communication is
encrypted; and
Filtered Location Information: The Telematic
Server sends the location information to the
Location Recipient Application. The
information may be filtered in order to comply
with the privacy policy and rules defined by the
rule maker.
4 Secure tracking using current and emerging
technology
The following subsections detail current and emerging
technologies that have been developed or are currently
under development.
4.1 Current tracking devices developed by Qascom
A number of tracking solutions have been developed
using commercially available hardware such as the
Siemens TC454 GSM module and SiRF5 GPS Receiver.
Fig. 4 illustrates the components in the Qascom tracking
blackbox. The location information is processed by a Java
applet loaded into the flash memory of the TC45 GSM
module. The java applet is responsible for processing
GPS location, velocity and time data. The information is
then processed according to the requirements of the
application, such as insurance.
The applet signs the resulting information destined for the
telematic server by invoking a sign function using the
SIM Toolkit interface6 of the SIM card. This functionality
requires a SIM card with support for public key
operations accessible through the SIM toolkit interface.
The signature of the data provides cryptographic integrity
protection of the data as well as authenticating the source
of the data. The resulting information and signature are
sent to the telematic server using one of two supported
communication modes: SMS (Short Messaging Service)
messaging or GPRS (General Packet Radio Service).
To ensure the privacy of the data communicated to the
telematic server, appropriate security must be used.
Where SMS is chosen as the mode of communication, no
session cryptography is used. This is for three reasons:
SMS is a point-to-point delivery service where
the end point is another device on the GSM
network. It is assumed that a destination on the
GSM network cannot easily be spoofed. The
tracking device can be authenticated using the
source MSISDN (Mobile Station International
ISDN Number);
GSM provides data encipherment using the A5
algorithm from the mobile station to the base
stations. The core network is assumed to be
protected from intruders. Flaws in the encryption
and key establishment protocols of GSM are
overcome by the use of new protocols in 3G
deployments; and
A significant number of messages would be
required for authentication and establishment of
keys, resulting in a communications protocol
that is too costly.
In this mode, the telematic server must have a mobile
station present on the GSM network.
4 Refer to http://www.siemens-mobile.com
5 Refer to http://www.sirf.com/
6 SIM Application Toolkit (SAT) is defined in GSM
11.14 standard for 2G networks, and 3GPP 31.111 for 3G
networks.
206 Journal of Global Positioning Systems
Fig. 4 Qascom GPS/GSM tracking box
Where GPRS is chosen as the mode of communications,
the processed data and signature must pass through the
GPRS Gateway (GGSN) and over the Internet to the
telematic server as illustrated in Fig. 5. For this reason,
the tracking device must be able to authenticate the
destination telematic server, and establish session keys
with this entity in order to transfer the processed data.
This process is facilitated through a small implementation
of SSL (Secure Sockets Layer) in the Java applet.
This implementation of SSL uses the SIM card to verify
the public key certificate of the telematic server and
perform public key operations for the exchange of keys.
Computation of the pre-master-secret is performed in the
Java applet, using the real-time clock in the GSM module
for generation of random numbers. The pre-master-secret
generated by the applet is then encrypted in the SIM card
using the telematic server’s public key. The master secret
is generated from the pre-master secret as specified in
(Dierks and Allen 1999). The master-secret is the key
used for encrypting the session between the device and
the telematic server. The processed data and signature can
then be transmitted over the established security context.
This mode of communications is significantly more
secure than the SMS mode.
Fig. 5 GNSS tracking using GPRS
While the current solution provides protection from
malicious attacks on the communications between the
tracking device and the telematic server, the solution does
not prevent an attacker from loading malicious firmware
(Java applet) onto the tracking device. As the device has
no mechanism to authenticate the firmware, the malicious
software could generate data that minimizes the amount
payable to an insurance company, for example. The
software would still be able to use the cryptographic
functionality of the SIM card, such that the telematic
server would be unaware of such malicious activity.
In addition, the current GPS implementation provides no
signal authentication or protection from spoofing. Thus, it
is possible to attach a GPS signal simulator to the antenna
and spoof the location.
4.2 Next generation devices being developed by
Qascom
We are currently involved in development of a next
generation tracking device that will fulfill the security
requirements of applications such as insurance tracking.
The proposed tracking device will contain a trusted
GNSS receiver, which will be developed by a consortium
of research institutions and companies including Qascom
in Europe. The trusted GNSS receiver is described by
Pozzobon, Wullems and Kubik in (Pozzobon et al. 2004).
The proposed tracking device will contain a general
purpose processor with tamper-resistant key storage and a
cryptographic coprocessor (trusted platform module). In
addition to supporting secure communications over
GPRS, the tracking device will also provide the facility
for authentication of firmware as well as support for
trusted GNSS positioning. Fig. 6 illustrates the secure
tracking box.
The verification of the data provided by the trusted GNSS
receiver is performed by the authenticated software. This
verification initially involves verification of the public
key of the trusted GNSS receiver, before being able to
verify the digital signatures contained within the
authentication data.
This software not only verifies the GNSS position, time
and velocity data, it additionally processes the data as
required by the application. The resulting data to be sent
to a telematic server contains the processed GNSS data,
signal state and device compliance reports obtained from
the trusted GNSS receiver, the public key certificate of
the tracking device, and a digital signature of this data.
The digital signature is calculated by the cryptographic
co-processor using the private key stored in the tamper-
resistant, secure key storage. The telematic server first
must verify the public key certificate of the tracking
device, after which it is able to verify the data received.
Pozzobon et al.: Secure Tracking using Galileo 207
Fig. 6 Qascom secure tracking box
5 Conclusions
This paper has described a secure framework for tracking
applications that use the Galileo Authentication Services.
Requirements for secure tracking in both consumer and
critical applications were introduced, detailing how the
new signal characteristics of Galileo can be used to
enhance the security of tracking applications.
Requirements in terms of authenticated signaling, device
security and location privacy were introduced. This paper
concluded with a discussion of both existing and future
tracking device developments and detailed the strategies
used to mitigate the security issues in the presence of the
Galileo security differentiators.
References
Callaghan, S., and Fruehauf, H. (2003). SAASM and Direct
P(Y) Signal Acquisition, The Journal of Defense
Software Engineering, 16(6), 12-16.
Dierks, T., and Allen, C. (1999). The TLS Protocol Version
1.0, Network Working Group, Internet Engineering
Task Force, Request for Comments 2246.
Galilei. (2003). The Galilei Project: GALILEO Design
Consolidation, European Commission.
Gibbons, G. (2004). HazMat Keeps on Truckin', GPSWorld
(October), 6.
Hein, G. W. et al. (2002). Status of Galileo Frequency and
Signal Design. Brussels.
Pozzobon, O., Wullems, C., and Kubik, K. Requirements for
Enhancing Trust, Security and Integrity of GNSS
Location Services, Institute of Navigation (ION ), 60th
annual meeting, Dayton, OH, USA.
Scott, L. Anti-Spoofing & Authenticated Signal Architectures
for Civil Navigation Systems, ION GPS, GNSS 2003,
Portland, OR.
Spreitzer, M., and Theimer, M. Providing Location
Information in a Ubiquitous Computing Environment.
Fourteenth ACM Symposium on Operating System
Principles, 270–283.
Volpe, J. A. (2001). Vulnerability Assessment of the
Transportation Infrastructure Relying on the Global
Positioning System.