IMPLEMENTATION OF NOVEL PGP ALGORITHM FOR ENCRYPTED GPS COMMUNICATION IN SMART CONTAINERS
Authors:
Mehrunnisa Saleem, Sheeraz Ahmed, Salman Ahmad, Safdar Nawaz Khan Marwat, Adnan Khan, Muhammad Aadil, Said Ul AbrarDOI NO:
https://doi.org/10.26782/jmcms.2021.12.00001Abstract:
The ability to check the location of both static and dynamic devices is improving increasingly with each passing day. To track locations of both static and dynamic machines, Global Positioning System (GPS) is used to exchange the location between the sender and the receiver. However, there are still challenges in the sage and secure transmission and reception of GPS location. The most common challenge is spoofing attacks data. This paper proposes the implementation of a Pretty Good Privacy (PGP) encryption algorithm to ensure the safety of GPS packets shared across the communication channels. The GPS location is first encrypted and subsequently sent across a communication channel, which is strong encryption and cannot be decrypted by an unauthorized user.Keywords:
Spoofing,Encryption,Decryption,Global Positioning System (GPS),Refference:
I. A. Broumandan, A. Jafarnia-Jahromi, V. Dehghanian, J. Nielsen, and G. Lachapelle, “GNSS spoofing detection in handheld receivers based on signal spatial correlation,” in Proceedings of the IEEE Position Location and Navigation Symposium (PLANS), 2012.
II. A. Dabir and A. Matrawy, “Bottleneck Analysis of Traffic Monitoring using Wireshark,” 2007 Innovations in Information Technologies (IIT), 2007, pp. 158-162, doi: 10.1109/IIT.2007.4430446.
III. A. Juels and T. Ristenpart, “Honey encryption: Security beyond the brute-force bound” in Advances in Cryptology-EUROCRYPT 2014, Springer, pp. 293-310, 2014.
IV. A. Juels and T. Ristenpart, “Honey encryption: Security beyond the brute-force bound” in Advances in Cryptology-EUROCRYPT 2014, Springer, pp. 293-310, 2014.
V. A. Ranganathan, H. Olafsd · ottir, and S. Capkun, “Spree: A spoofing · resistant gps receiver,” in Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking. ACM, 2016
VI. Bowen, B.M., Hershkop, S., Keromytis, A.D., Stolfo, S.J.: Baiting Inside Attackers Using Decoy Documents, pp. 51–70 (2009)
VII. D. M. Akos, “Who’s afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC),” Navigation, 2012.
VIII. Developing GPS monitoring for the public transport fleet,” http://civitas. eu/measure/developing-gps-monitoring-public-transport-fleet.
IX. E. Schmidt, Z. Ruble, D. Akopian and D. J. Pack, “Software-Defined Radio GNSS Instrumentation for Spoofing Mitigation: A Review and a Case Study,” in IEEE Transactions on Instrumentation and Measurement, vol. 68, no. 8, pp. 2768-2784, Aug. 2019, doi: 10.1109/TIM.2018.2869261.
X. F. L. Aryeh, B. K. Alese and O. Olasehinde, “Graphical analysis of captured network packets for detection of suspicious network nodes,” 2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2020, pp. 1-5, doi: 10.1109/CyberSA49311.2020.9139672.
XI. G. GSA, “Market report issue 3,” 2017, https://www.gsa.europa.eu/.
XII. G. Mintsis, S. Basbas, P. Papaioannou, C. Taxiltaris, and I. Tziavos, “Applications of gps technology in the land transportation system,” European journal of operational Research, 2004.
XIII. J. Carn, ”Smart Container Management: Creating value from real-time container security device data,” 2011 IEEE International Conference on Technologies for Homeland Security (HST), 2011, pp. 457-465
XIV. J. Zhang, B. Chen, Y. Zhao, X. Cheng and F. Hu, ”Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues,” in IEEE Access, vol. 6, pp. 18209-18237, 2018
XV. K. C. Zeng, Y. Shu, S. Liu, Y. Dou, and Y. Yang, “A practical gps location spoofing attack in road navigation scenario,” in Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications. ACM, 2017.
XVI. K. K. Songala, S. R. Ammana, H. C. Ramachandruni and D. S. Achanta, “Simplistic Spoofing of GPS Enabled Smartphone,” 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), 2020, pp. 460-463, doi: 10.1109/WIECON-ECE52138.2020.9397980.
XVII. K. Wesson, D. Shepard, J. Bhatti, and T. E. Humphreys, “An evaluation of the vestigial signal defense for civil GPS anti-spoofing,” in Proceedings of the ION GNSS Meeting, 2011.
XVIII. K. Wesson, M. Rothlisberger, and T. Humphreys, “Practical cryptographic civil GPS signal authentication,” Journal of Navigation, 2012.
XIX. M. A. Poltavtseva, D. P. Zegzhda and E. Y. Pavlenko, “High-performance NIDS Architecture for Enterprise Networking,” 2019 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), 2019, pp. 1-3, doi: 10.1109/ Black Sea Com. 2019.8812808.
XX. M. Abadi and B. Warinschi, “Password-based encryption analyzed” in Automata Languages and Programming, Springer, pp. 664-676, 2005.
XXI. M. G. Kuhn, “An asymmetric security mechanism for navigation signals,” in Information Hiding, 2005.
XXII. M. L. Psiaki, S. P. Powell, and B. W. O’Hanlon, “GNSS spoofing detection using high-frequency antenna motion and carrier-phase data,” in Proceedings of the ION GNSS+ Meeting, 2013..
XXIII. P. Misra and P. Enge, Global Positioning System: Signals, Measurements and Performance Second Edition. Lincoln, MA: Ganga-Jamuna Press, 2006.
XXIV. R. Das and G. Tuna, “Packet tracing and analysis of network cameras with Wireshark,” 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 2017, pp. 1-6, doi: 10.1109/ISDFS.2017.7916510.
XXV. R. Jedermann, T. Poetsch and W. Lang, ”Smart Sensors for the Intelligent Container,” Smart SysTech 2014; European Conference on Smart Objects, Systems and Technologies, 2014, pp. 1-2
XXVI. S. C. Lo and P. K. Enge, “Authenticating aviation augmentation system broadcasts,” 2010.
XXVII. T. E. Humphreys, “Detection strategy for cryptographic GNSS antispoofing,” IEEE Transactions on Aerospace and Electronic Systems, 2013.
XXVIII. T. Humphreys, “Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil gps spoofing,” University of Texas at Austin (July 18, 2012), 2012.
XXIX. Tallapalli Chandra Prakash, Srinivas Samala, Kommabatla Mahender. : ‘ MULTICARRIER WAVEFORMS FOR ADVANCED WIRELESS COMMUNICATION’. J. Mech. Cont.& Math. Sci., Vol.-15, No.-7, July (2020) pp 252-259
XXX. US Department of Transportation: In-vehicle Performance Monitoring and Feedback,” https:// www. transportation.gov/ mission/health/ Invehicle -Performance – Monitoring-and-Feedback.
XXXI. W. Yue, Z. Xu and Z. Dapeng, “A High-reliability Network Architecture Based on Parallel Redundancy Protocol,” 2019 14th International Conference on Computer Science & Education (ICCSE), 2019, pp. 43-46, doi: 10.1109/ICCSE.2019.8845328.