Skip to main content

Table 2 This table compares the performance of different navigation signal authentication schemes

From: Authenticating GNSS civilian signals: a survey

Scheme

Robustness

Security

Efficiency

Cost

\(P_{D}\)

MPT

USR

USW

TTFAF

TBA

\(L_{{C/N_{0} }}\)

\(R_{u}\)

\(N_{{{\text{cal}}}}\)

\(N_{storage}\)

OSNMA for Galileo

High

~ 6 s

~ 5 SPS

10 ms

~ 270 s

30 s

0

0

Low

Very low

SBAS assisted NMA

High

~ 6 s

~ 10 SPS

~ 10 ms

~ 36 s

6 s

0

Low

Low

Very low

Chimera for GPS (Fast channel)

Moderate

~ 50 μs

~ 256 × 103 SPS

~ 2 μs

Variable*

Variable*

~ − 1 dB

Moderate*

Low

Low

Chimera for GPS (Slow channel)

Moderate

~ 50 μs

~ 256 × 103 SPS

~ 2 μs

~ 270 s

180 s

~ − 1 dB

0

Low

High

PROSPA

Moderate

~ 1 μs

~ 10 × 106 SPS

~ 1 μs

Variable**

Variable**

0

Moderate to high

High

Moderate

ASPIRE

High

~ 1 μs

~ 10 × 106 SPS

~ 1 μs

Variable**

Variable**

0

Moderate to high

Low

High

P(Y) samples (Psiaki et al., 2013)

Moderate

~ 20 μs

~ 5.115 × 103 SPS

~ 20 μs

Variable**

Variable**

0

Moderate to high

Low

High

Supersonic code (Pozzobon et al., 2014)

Moderate

~ 10 μs

~ 1 × 106 SPS

~ 10 μs

~ 50 ms

~ 1 ms

Variable***

Low

High

Low

Codeless authentication (Gkougkas et al., 2019)

Moderate

~ 20 μs

~ 500 × 103 SPS

~ 20 μs

~ 1 s

~ 20 ms

Variable***

Low

High

Low

Binary phase hop (Wang et al., 2021)

Moderate

~ 10 μs

~ 1 × 106 SPS

~ 10 μs

~ 50 ms

~ 50 ms

Variable***

Low

High

Low

  1. Some indicators are assessed qualitatively and others quantitatively
  2. The performance evaluation of the authentication scheme mainly comes from its recommended set of typical implementation parameters. Also, it refers to other articles and research on the performance evaluation of the authentication scheme. Since \(P_{FA}\) is a design parameter, the performance analysis will let \(P_{FA} = 10^{ - 3}\) as a background set. Besides, all the authentication schemes can equip a high length of \(L_{ek}\) that will not display again in the table.
  3. *The efficiency of the fast channel is depended on the capability of the communication channel.
  4. **The efficiency of PROSPA, ASPIRE and P(Y) sample authentication depends on the communication bit rate.
  5. ***The \(L_{{C/N_{0} }}\) of the supersonic code, codeless authentication and binary phase hopping depends on how much power is assigned from the civilian signal to the supersonic code signal.