Shopping Cart

No products in the cart.

BS EN 16803-3:2020

$198.66

Space. Use of GNSS-based positioning for road Intelligent Transport Systems (ITS) – Assessment of security performances of GNSS-based positioning terminals

Published By Publication Date Number of Pages
BSI 2020 62
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document is a complementary standard to EN 16803-2 that is intended to assessment of the performances of a GBPT placed in real-life or simulated road environments. This document is instead specifically targeting security attacks such as interferences, jamming, meaconing or spoofing. This document cannot be applied independently from EN 16803-2 that describes in detail the general methodology of the assessment procedure.

This document provides normative information necessary to replay in the lab standardized scenarios specifically dedicated to security tests applied to GNSS.

Depending on the case (jamming or spoofing), these scenarios are composed of data sets combining either real life recorded SIS and jamming signals or simulated SIS and spoofing signals. The reason for that will be explained in Clause 6.

Although a high-level categorization of GNSS attacks is given in Annex A, a comprehensive and detailed categorization of possible GNSS attacks is out of the scope of this document.

It is not the aim of this document to standardize the record procedure neither to define the specific requirements for the generation of the attack scenarios. The record procedure itself and its quality framework for accredited GNSS-specialized laboratories (Lab-A), with the detailed definition of standardized attack scenarios, will be totally and precisely described in EN 16803-4 (under preparation). The list of attack scenarios will have to be regularly updated considering the evolution of GNSS technologies, emerging threats, and countermeasures.

PDF Catalog

PDF Pages PDF Title
2 undefined
9 1 Scope
2 Normative references
10 3 Terms, definitions and acronyms
3.1 Terms and definitions
12 3.2 Acronyms
13 4 Description of the general logic of security tests
4.1 Record and Replay principle
14 4.2 Specificity of security tests based upon the R & R approach
4.3 Jamming testing Architecture
16 4.4 Spoofing/meaconing testing architecture
18 5 Definition of the metrics with respect to security performances
5.1 General
5.2 Accuracy metrics
19 5.3 Availability and continuity metrics
20 5.4 Integrity metrics
5.4.1 Protection Level performance metrics
21 5.4.2 Misleading Information metrics
5.5 Timing metrics
5.5.1 Timestamp resolution
5.5.2 Nominal output latency
5.5.3 Nominal output rate
5.5.4 Output latency stability
22 5.5.5 Output rate stability
5.5.6 Time to first fix
23 6 Description of the test procedures and the test equipment
6.1 Scope
6.2 Setting-up of the replay test-bench
6.2.1 Replay device calibration
26 6.2.2 Replay testbed architecture
27 6.3 Validation of the data processing HW and SW by the RF test laboratory
28 6.4 Replaying of the data
6.4.1 General
6.4.2 Jamming scenarios
6.4.3 Spoofing and meaconing scenarios
29 6.5 Computation of metrics degradation
6.5.1 General
6.5.2 Jamming scenarios
30 6.5.3 Spoofing and meaconing scenarios
6.6 Establishment of the final test report
7 Validation procedure
8 Definition of the synthesis report: how to report the results of the tests
38 Annex A (informative)Analysis of the GNSS attacks taxonomy
A.1 General
A.2 Categorization of GNSS attacks
39 A.3 GNSS attack models
A.3.1 General
A.3.2 Interference and jamming attacks
40 A.3.3 Meaconing attacks
A.3.4 Spoofing attacks
42 Annex B (informative)Security-specific metrics (authentication capabilities, spoofing and jamming detection flags, etc.)
44 Annex C (informative)Scenarios proposition
C.1 General
C.2 Jamming/interference proposed scenarios
45 C.3 Spoofing proposed scenario
48 C.4 Meaconing proposed scenarios
50 Annex D (informative)Spoofing insights
D.1 General
51 D.2 Range error impact
D.3 Oscillator error impact
52 D.4 Propagation channel
54 Annex E (informative)Data set record testbed
E.1 General
E.2 Jamming data generation
58 E.3 Spoofing data recording
BS EN 16803-3:2020
$198.66