{"title":"Time Synchronization of TESLA-Enabled GNSS Receivers","authors":"Jason Anderson;Sherman Lo;Todd Walter","doi":"10.1109/TAES.2025.3552074","DOIUrl":null,"url":null,"abstract":"As timed efficient stream loss-tolerant authentication (TESLA)-enabled global navigation satellite systems (GNSS) for authenticated positioning reaches ubiquity, receivers must use an onboard, GNSS-independent clock (GIC) and carefully constructed time synchronization algorithms to assert the authenticity afforded. This work provides the necessary checks and synchronization protocols needed in the broadcast-only GNSS context. We provide proof of security for each of our algorithms under a delay-capable adversary. The algorithms included herein enable a GNSS receiver to use its GIC to determine whether a message arrived at the correct time, to determine whether its GIC is safe to use and when the clock will no longer be safe in the future due to predicted clock drift, and to resynchronize its GIC. Each algorithm is safe to use even when an adversary induces delays within the protocol. Moreover, we discuss the implications of GNSS authentication schemes that use two simultaneous TESLA instances of different authentication cadences. To a receiver implementer or standards author, this work provides the necessary implementation algorithms to assert security and provides a comprehensive guide on why these methods are required. We discuss and address a vulnerability related to the standard synchronization protocols in the context of broadcast-only TESLA.","PeriodicalId":13157,"journal":{"name":"IEEE Transactions on Aerospace and Electronic Systems","volume":"61 4","pages":"9550-9566"},"PeriodicalIF":5.7000,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10930432","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Aerospace and Electronic Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10930432/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, AEROSPACE","Score":null,"Total":0}
引用次数: 0
Abstract
As timed efficient stream loss-tolerant authentication (TESLA)-enabled global navigation satellite systems (GNSS) for authenticated positioning reaches ubiquity, receivers must use an onboard, GNSS-independent clock (GIC) and carefully constructed time synchronization algorithms to assert the authenticity afforded. This work provides the necessary checks and synchronization protocols needed in the broadcast-only GNSS context. We provide proof of security for each of our algorithms under a delay-capable adversary. The algorithms included herein enable a GNSS receiver to use its GIC to determine whether a message arrived at the correct time, to determine whether its GIC is safe to use and when the clock will no longer be safe in the future due to predicted clock drift, and to resynchronize its GIC. Each algorithm is safe to use even when an adversary induces delays within the protocol. Moreover, we discuss the implications of GNSS authentication schemes that use two simultaneous TESLA instances of different authentication cadences. To a receiver implementer or standards author, this work provides the necessary implementation algorithms to assert security and provides a comprehensive guide on why these methods are required. We discuss and address a vulnerability related to the standard synchronization protocols in the context of broadcast-only TESLA.
期刊介绍:
IEEE Transactions on Aerospace and Electronic Systems focuses on the organization, design, development, integration, and operation of complex systems for space, air, ocean, or ground environment. These systems include, but are not limited to, navigation, avionics, spacecraft, aerospace power, radar, sonar, telemetry, defense, transportation, automated testing, and command and control.