590
Figure8. A PRN code sequence a, of length 1023,
constructedwithinScenarioD
Figure9. Cross‐correlation function of twoalternative
PRN codes, constructed within Scenarios B and D,
respectively
4 DISCUSSIONANDCONCLUSION
ShortcomingsofthecurrentlydeployedGoldcodefor
GNSS pseudorange measurements are addressed in
researchpresentedinthismanuscript.Constructionof
Chaotic Ranging Code (CRC), an alternative logistic
map‐basedrangingPRNcodeforsatellitepositioning,
was considered in this research, and resulting code
assessedforits
performance,asapotentialcandidate
for the GNSS pseudorange measurement code. The
alternative CRC code performance was compared
with Gold code ones, based on methodology and
Gold code assessment presented by (Mitra, 2007).
Research was focused on spectrum efficiency and
code orthogonality issues, as well as as with
transparency of
the process, with the quality of
encryptionmarginallyconcerned in accordance with
theguidingmethodologyadopted.
Scenarios A, B, C, and D (Table 1) presented the
CRC sequences with different performance levels.
Their auto‐correlation functions performed well,
allowingforacceptableorthogonality, andthereforea
proper inter‐operability, allowing for simultaneous
utilisationofthesamespectrumbyaconstellationof
GNSS satellites. Lattices are suppressed sufficiently,
with several scenarios performing even better than
the standard GNSS Gold code PRN (Mitra, 2007).
However,FoMvaluesvarylargely.Asitisexpected,
larger codes and wider spread brings more robust
encryption and wider
bandwidth. Still, the selection
ofparticularconfigurationofalogisticmapmayhave
significant impact on the FoM for particular logistic
map‐encryptedPRNcode.
In summary, a framework for construction of a
ranging code alternativeto the GNSS Gold code for
pseudorange measurement was assembled, in
compliancewithrequirementsfor
GNSSrangingcode
performance and based on utilisationof chaotically‐
behavinglogisticmap.TheCRCgenerationalgorithm
developedby(Kanso,Smaoui,2009) was configured
and assessed for performance using methodology
developed by (Mitra, 2007) to compare its quality
withtheexistingGNSSPRNGoldcode.Fourvariants
oftheCRCs
weregenerated,andtheirperformances
assessed. The interpretation of research results
revealed variations in encryption robustness
depending on logistic map configuration, and
confirmed importance of construction of long PRN
codes. Future research will address a wider set of
logistic map configurations across the range of
configuration parameters, development and
utilisation of
more exact measures of encryption
strength for PRN code assessment based on
methodological approach outlined in (Roeck, 2009)
and(Yang,Xiao‐Jun,2012),andCRCfieldvalidation
in simulated scenarios of GNSS spoofing cyber‐
attacks.
REFERENCE
Filić, M. (2018). Foundations of GNSS spoofing detection
and mitigation with distributed GNSS SDR receiver.
TransNav,12(4),649‐656.
GPS Directorate. (2013). Global Positioning Systems
Directorate Systems Engineering and Integration
Interface Specification IS‐GPS‐200J. Washington, DC.
Availableat:https://bit.ly/2R6MkSF
HMGovernmentOfficeforScience.(2018).Satellite‐Derived
Time
and Position: A Study of Critical Dependencies.
HM Government of the UK and NI. Available at:
https://bit.ly/2E2STnd
Huang, N E et al. (1998). The empirical mode
decomposition and the Hilbert spectrum for nonlinear
andnon‐stationarytimeseriesanalysis.ProcRSocLond,
454,903‐995.
Kanso,A,Smaoui.(2009).
Logisticchaoticmapsforbinary
numbers generations. Ch, Sol and Fract, 40, 2557‐2568.
Availableat:https://bit.ly/2RY2Xku
May, R M. (1976). Simple mathematical models with very
complicateddynamics.Nature,261,459‐467.
Mitra, A. (2007). On Pseudo‐Random and Orthogonal
BinarySpreadingSequences.Int J of Inf Tech, 4(2),137‐
144.
Pecora,LM,Carroll,TL.(2015).Synchronizationofchaotic
systems.Chaos,25,097611.doi:
10.1063/1.4917383
Petrovski, I, Tsujii, T. (2012). Digital Satellite Navigation
and Geophysics: A Practical Guide with GNSS Signal
Simulator and Receiver Laboratory. Cambridge
UniversityPress.Cambridge,UK.
Roeck,A.(2009).QuantifyingStudiesof(Pseudo)Random
Number Generation for Cryptography (PhD thesis).
L’Ecole Polytechnique. Palaiseau, France. Available at:
https://bit.ly/2WRBEdv
Tippenhauer, N O, Poepper,
C, Rasmussen, K B, and
Čapkun, S. (2011). On the Requirements for Successful
GPSSpoofingAttacks.Procofthe18thACMconference
on Computer and communications security, 75‐86.
Chicago,IL.
Yang,L,Xiao‐Jun,T.(2012).Anewpseudorandomnumber
generator based on complexnumber chaotic equation..
Chyn
PhysB,21(9),090506.
Yang,T.(2004).Asurveyofchaoticsecurecommunication
systems. Int J of Comp Cogn, 2(2), 81‐130. Available at:
https://bit.ly/2LiGImY