Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gianluca Caparra is active.

Publication


Featured researches published by Gianluca Caparra.


international conference on communications | 2016

Energy-based anchor node selection for IoT physical layer authentication

Gianluca Caparra; Marco Centenaro; Nicola Laurenti; Stefano Tomasin; Lorenzo Vangelista

We consider a cellular Internet of things (CIoT) network where many source nodes aim at exchanging messages with a single concentrator node. To this end, they are assisted by anchor nodes that are trusted and securely connected with the concentrator node. In this context, we aim at providing a message authentication scheme based on the characteristics of the channel between the source nodes and the anchor nodes. According to this approach, the anchor nodes estimate the channel to source nodes in an initially externally authenticated fashion, while forthcoming messages are authenticated by comparing the current channel estimate with the initial estimate. Moreover, assuming that the anchor nodes have a limited energy availability, we derive suitable scheduling policies for the activation of the anchor nodes for authentication purposes. In particular, we aim at maximizing the anchors lifespan while guaranteeing given false alarm and missed detection probabilities of the authentication process. The performance of the proposed authentication protocols is evaluated in a typical CIoT scenario.


international conference on localization and gnss | 2016

Evaluating the security of one-way key chains in TESLA-based GNSS Navigation Message Authentication schemes

Gianluca Caparra; Silvia Sturaro; Nicola Laurenti; Christian Wullems

In the proposals for Global Navigation Satellite Systems (GNSS) Navigation Message Authentication (NMA) that are based on adapting the Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocol, the length of the one-time keys is limited (e.g. to 80 bits) by the low transmission rate. As a consequence, the hash function that is used to build the one-way key chain is constructed having a longer, secure hash function (e.g. SHA-256), preceded by a time-varying yet deterministic padding of the input and followed by a truncation of the output. We evaluate the impact of this construction on the collision resistance of the resulting hash function and of the whole chain, and show that with current proposed parameters, combined with the use of efficient hashing hardware, it can lead to a feasible attack with significant collision probability. The collision can be leveraged to mount a long lasting spoofing attack, where the victim receiver accepts all the one time keys and the navigation messages transmitted by the attacker as authentic. We conclude by suggesting possible modifications to make TESLA-based NMA more robust to such attacks.


2017 European Navigation Conference (ENC) | 2017

A key management architecture for GNSS open service Navigation Message Authentication

Gianluca Caparra; Silvia Ceccato; Silvia Sturaro; Nicola Laurenti

Navigation Message Authentication (NMA) is a necessary security provision in GNSS open service, considering that more and more infrastructures rely on civilian GNSS signals, and several cryptographic mechanisms have been proposed to implement it. Most solutions adapt existing protocols to the specific requirement and constraints of the GNSS scenario, which is inherently one-way and asymmetric, and hence make use of asymmetric cryptography. However, no similar proposal has yet been made for the provision of key management services (distribution, upgrade, revocation), which are crucial for the security of any cryptographic mechanism.


esa workshop on satellite navigation technologies and european workshop on gnss signals and signal processing | 2016

An autonomous GNSS anti-spoofing technique

Gianluca Caparra; Christian Wullems; Rigas T. Ioannides

In recent years, the problem of Position, Navigation and Timing (PNT) resiliency has received significant attention due to an increasing awareness on threats and the vulnerability of the current GNSS signals. Several proposed solutions make uses of cryptography to protect against spoofing. A limitation of cryptographic techniques is that they introduce a communication and processing computation overhead and may impact the performance in terms of availability and continuity for GNSS users. This paper introduces autonomous non cryptographic antispoofing mechanisms, that exploit semi-codeless receiver techniques to detect spoofing for signals with a component making use of spreading code encryption.


Proceedings of the 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2016) | 2016

A Novel Navigation Message Authentication Scheme for GNSS Open Service

Gianluca Caparra; Silvia Sturaro; Nicola Laurenti; Christian Wullems; Rigas T. Ioannides


INSIDE GNSS | 2016

Design Drivers and New Trends for Navigation Message Authentication Schemes for GNSS Systems

Gianluca Caparra; Christian Wullems; Silvia Ceccato; Silvia Sturaro; Nicola Laurenti; Oscar Pozzobon; Rigas T. Ioannides; Massimo Crisci


ieee/ion position, location and navigation symposium | 2018

On the achievable equivalent security of GNSS ranging code encryption

Gianluca Caparra; James T. Curran


ieee/ion position, location and navigation symposium | 2018

Exploiting side-information for resilient GNSS positioning in mobile phones

Silvia Ceccato; Francesco Formaggio; Gianluca Caparra; Nicola Laurenti; Stefano Tomasin


international conference on localization and gnss | 2017

Optimization of anchor nodes' usage for location verification systems

Gianluca Caparra; Marco Centenaro; Nicola Laurenti; Stefano Tomasin


Proceedings of the 30th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2017) | 2017

Feasibility and Limitations of Self-Spoofing Attacks on GNSS Signals with Message Authentication

Gianluca Caparra; Silvia Ceccato; Nicola Laurenti; Justan Cramer

Collaboration


Dive into the Gianluca Caparra's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge