Next Article in Journal
A Study of Dose Rate Probes for the País Vasco Environmental Radioactivity Automatic Network
Previous Article in Journal
DB-YOLO: A Dual-Branch Parallel Industrial Defect Detection Network
Previous Article in Special Issue
User-Side Long-Baseline Undifferenced Network RTK Positioning Under Geomagnetic Storm Conditions Using a Power Spectral Density-Constrained Ionospheric Delay Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification

1
College of Electronic Science and Technology, National University of Defense Technology, Changsha 410073, China
2
Key Laboratory of Satellite Navigation Technology, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Sensors 2025, 25(21), 6615; https://doi.org/10.3390/s25216615
Submission received: 20 September 2025 / Revised: 20 October 2025 / Accepted: 23 October 2025 / Published: 28 October 2025
(This article belongs to the Special Issue Advances in GNSS Signal Processing and Navigation—Second Edition)

Abstract

Existing GNSS authentication schemes suffer from critical drawbacks such as high verification latency and prohibitive memory requirements, leaving time-sensitive applications vulnerable to spoofing. The core challenge is the inability to transmit strong, real-time cryptographic credentials through the bandwidth-limited GNSS signal. This paper introduces WAWA, a Wavelet Analysis-based Watermarking Authentication scheme that operates at the physical layer of the GNSS signal. The central innovation of WAWA is its use of the wavelet domain to achieve a high-capacity data channel, allowing a complete public-key digital signature to be embedded directly within the signal structure. This enables receivers to perform immediate, symbol-level authentication using a public key, which fundamentally removes the verification delay and reliance on time synchronization seen in conventional methods. Furthermore, it eliminates the need for large memory buffers, a critical barrier for resource-constrained devices. We present the complete design of the watermark generation, embedding, and extraction process, alongside a novel dual-path verification framework adaptable to both standalone and network-assisted receivers. Performance analysis shows that WAWA achieves immediate authentication while offering superior effective bandwidth and maintaining low memory overhead. Although it introduces a controllable signal correlation loss, validated through both theoretical modeling and simulation, WAWA presents an exceptional balance of security, immediacy, and resource efficiency, offering a promising new paradigm for ensuring trustworthy PNT sensor data in time-critical and resource-sensitive applications, particularly in large-scale sensor networks and autonomous systems.

1. Introduction

Global Navigation Satellite Systems (GNSS) have evolved into a ubiquitous and indispensable global utility. They provide the foundational Positioning, Navigation, and Timing (PNT) data that underpin a vast array of modern technologies, from synchronizing critical infrastructure like power grids and financial networks to enabling precision agriculture and facilitating emerging technologies such as the Internet of Things (IoT) and autonomous vehicles [1]. The integrity of PNT information is therefore of paramount importance. Modern society’s dependence on GNSS extends beyond simple navigation, encompassing Remote Sensing reflectometry for Earth observation and climate research, intelligent transportation systems in smart cities, and multi-sensor integration for autonomous operations [2,3]. This widespread reliance makes the reliability and security of GNSS services increasingly critical, as illustrated in Figure 1.
However, the open and unencrypted nature of civilian GNSS signals makes them fundamentally vulnerable to manipulation [4,5]. While threats include relatively simple signal replay attacks (meaconing), the most pernicious form is generative spoofing, where an adversary broadcasts entirely counterfeit signals. By doing so, a spoofer can gain arbitrary control over a receiver’s calculated position and time, making it a severe threat to systems that depend on reliable PNT services [6,7]. The development of robust defenses against such generative attacks is therefore of paramount importance and the primary focus of this paper. These attacks have already demonstrated the potential for significant economic disruption and catastrophic failures (a simplified illustration is provided in Figure 2).
Recent analysis of GNSS interference incidents reveals substantial economic consequences, with a single spoofing event estimated to cost GBP 1.28 million in the UK alone due to transportation delays, flight disruptions, and reduced operational efficiency [8]. The sophistication of spoofing technology has increased dramatically, with documented cases of aviation incidents where aircraft lost all navigation systems and drifted 80 miles off course, requiring emergency navigation procedures to complete flights safely [4]. Critical infrastructure sectors, including maritime shipping, precision agriculture, and financial timing systems, face escalating risks as low-cost spoofing devices become increasingly accessible, with the potential to disrupt supply chains, compromise automated farming operations, and destabilize time-sensitive financial transactions [9]. Consequently, developing robust methods to authenticate GNSS signals and guarantee their trustworthiness has become a critical area of research.
Current approaches to combat GNSS spoofing can be broadly divided into two categories. The first category involves non-cryptographic methods, such as monitoring signal characteristics at the physical layer [10,11] or performing consistency checks at the receiver level [4,9,12]. While these techniques can detect certain anomalies, they often lack the mathematical certainty of cryptographic methods and can be circumvented by more sophisticated attacks or fail in complex signal environments [13]. This paper focuses on the second category: cryptographic signal authentication, where security data is embedded within the signal itself to cryptographically verify its origin and integrity [14]. The two most prominent frameworks in this domain are Navigation Message Authentication (NMA) and Spreading Code Authentication (SCA).
NMA schemes operate by embedding authentication data into the navigation message broadcast by the satellites. The leading example is the Galileo Open Service Navigation Message Authentication (OSNMA) [15], which is based on the Timed Efficient Stream Loss-tolerant Authentication (TESLA) protocol [16]. TESLA ingeniously uses delayed key disclosure over a public channel to achieve authentication with computationally efficient symmetric cryptography. However, this mechanism comes with a significant operational drawback: receivers must buffer incoming data and wait for a period of seconds to tens of seconds for the corresponding key to be broadcast, creating a substantial verification latency [17]. Moreover, TESLA’s security model depends on a loose time synchronization between the satellite and the receiver. This dependency has been identified as a potential vulnerability, as attackers could manipulate a receiver’s sense of time to bypass the authentication check [18,19,20].
SCA schemes aim to protect the signal’s pseudorange measurements by authenticating the spreading code itself [21]. A well-known example is the Chimera protocol proposed for GPS [22], which embeds encrypted markers known as Secure Pilot Components (SPCs) into the signal. In practice, SCA is often used in conjunction with NMA to provide comprehensive protection. However, this hybrid approach inherits a critical flaw from NMA. The keys required to verify the SCA markers are typically transmitted via the slow NMA layer. This forces the receiver to buffer large quantities of raw baseband signal data until the NMA key is finally received and processed. The resulting memory requirement can reach several megabytes [23,24], a demand that is often prohibitive for the low-cost, power-constrained hardware typical of large-scale IoT deployments and other resource-sensitive applications.
At its core, the fundamental challenge facing existing cryptographic GNSS authentication is the efficient real-time delivery of strong cryptographic credentials. While the architectural elements for this, such as a Public Key Infrastructure (PKI), are increasingly mature—with Galileo deploying its own and schemes like TrustCNAV [25] offering advanced designs—the physical means of transmission remain a critical bottleneck. The existing satellite-to-earth channel simply lacks the bandwidth to carry a full public-key digital signature without incurring the unacceptable delays of NMA or the high memory costs of SCA. Therefore, this paper focuses on solving this specific transmission problem.
To overcome this fundamental challenge, this paper proposes a Wavelet Analysis-based Watermarking Authentication (WAWA) scheme. WAWA is designed to create a high-capacity side channel by embedding authentication data directly into the physical layer of the GNSS signal using a wavelet-domain digital watermark. This enables the transmission of a full public-key digital signature, allowing for immediate verification at the receiver. The following main contributions of this work are threefold:
  • Novel Authentication Architecture for Immediate Verification: We introduce the WAWA scheme, which integrates public-key cryptography with wavelet-domain watermarking. This architecture facilitates the transmission of a complete digital signature within the physical signal layer, thereby eliminating the verification delay and time-synchronization dependency that are inherent weaknesses of TESLA-based protocols.
  • Low-Memory, Dual-Mode Verification Framework: We design a flexible, dual-path verification framework adaptable to diverse receiver capabilities. It features a “slow path” for fully standalone receivers and a “fast path” for network-assisted receivers, enabling the architecture to support a wide range of resource-constrained devices without the need for large data buffers.
  • Comprehensive Performance Modeling and Simulation Verification: We develop theoretical models to evaluate the scheme’s detection performance and its impact on the primary GNSS signal and validate the models through simulation. This analysis quantifies the trade-offs between key system parameters, providing a clear framework for system design and optimization.
The remainder of this paper is structured as follows: Section 2 details the system model and the proposed WAWA scheme. Section 3 presents the results of the theoretical performance analysis and an impact assessment on legacy receivers. Section 4 discusses the interpretation and implications of these results in comparison to existing schemes. Finally, Section 5 concludes the paper.

2. Materials and Methods

2.1. Foundations of the WAWA Scheme

To thoroughly understand the WAWA scheme, this section establishes its theoretical and technical foundations, including the signal model, cryptographic framework, and the principles of wavelet-domain embedding.

2.1.1. GNSS Baseband Signal Model

Modern civil GNSS signals, such as those from GPS and Galileo, are built upon Direct Sequence Spread Spectrum (DSSS) technology. Figure 3 provides a simplified illustration of a typical DSSS modulation and demodulation process. At the transmitter (satellite), low-rate navigation data bits are modulated by a high-rate pseudorandom noise (PRN) spreading code, which spreads the signal’s energy across a wide bandwidth. This baseband signal is then modulated onto a carrier frequency and broadcast towards Earth.
At the receiver, the incoming signal is down-converted and processed to remove carrier frequency and Doppler shifts, yielding the baseband signal. A key observation is that the structure of this baseband signal within a single navigation symbol period, T s y m , is stable and predictable. The WAWA scheme leverages this stability by embedding authentication information directly at the baseband signal level, treating the inherent signal structure as a carrier for the watermark. For the remainder of this paper, the term “Original GNSS Signal”, denoted as s ( t ) , refers to this baseband signal within one symbol period.

2.1.2. Cryptographic Cornerstone: Public Key Cryptography for Immediate Authentication

To fundamentally eliminate the verification delays and time-synchronization risks associated with the TESLA protocol, the WAWA scheme is built upon Public Key Cryptography (PKC). Unlike symmetric cryptography, which requires the sender and receiver to share a secret key, PKC employs a mathematically linked key pair for each user: a private key ( K p r i v ) and a public key ( K p u b ). The private key is held securely by the originator (e.g., the GNSS control segment), while the public key can be distributed openly to all receivers.
Digital signatures are a primary application of PKC and are central to WAWA. To generate a signature, the sender uses their private key K p r i v to sign a message M (e.g., a portion of the navigation data). This produces a unique cryptographic value, the digital signature S i g , which is intrinsically tied to both the message and the sender’s identity. The message and signature are then transmitted to the receiver. The receiver uses the sender’s public key K p u b to perform a verification algorithm on the received message and signature. A successful verification provides strong cryptographic assurance that the message originated from the legitimate sender and that its content has not been altered in transit.
The critical advantage of digital signatures for GNSS authentication is that verification depends only on the public key and the received data. This means verification can occur the moment a complete message and signature have been received, without waiting for any subsequent key disclosures. This property is the foundation for WAWA’s real-time verification capability. The public-key framework outlined in TrustCNAV [25] provides a relevant model for the cryptographic operations within WAWA.The fundamental workflow of this process is depicted in Figure 4.

2.1.3. Embedding Strategy: Digital Watermarking

To transmit the relatively long digital signature over the GNSS channel, WAWA employs digital watermarking. Digital watermarking is a technique of information hiding that embeds auxiliary data into a host digital medium [26]. A key requirement is that the embedding process should have a minimal and controllable impact on the host medium’s primary function and be robust against routine processing or noise. This makes it an ideal technique for embedding authentication data within the noise-limited GNSS broadcast signal.
A powerful watermarking strategy is transform-domain embedding. In this approach, the host signal is first mapped into a different domain using a mathematical transform. The watermark is then embedded by modifying the coefficients in this new domain. Finally, an inverse transform returns the signal to its original domain. By choosing an appropriate transform, it is possible to leverage its properties to achieve higher embedding capacity, better imperceptibility, or stronger robustness than direct time-domain methods.

2.1.4. Embedding Domain: Discrete Wavelet Transform (DWT)

The WAWA scheme is founded upon the orthogonal Discrete Wavelet Transform (DWT), a signal processing tool uniquely suited for analyzing non-stationary signals. This capability is paramount for GNSS applications, where receiver dynamics can induce time-varying frequency characteristics. Unlike the Fourier transform’s global frequency representation, DWT provides a superior time-frequency analysis by decomposing a signal into components localized in both domains,
s DWT { A l , D l , D l 1 , , D 1 }
where A l represents the low-frequency approximation coefficients and { D j } are the detail coefficients across multiple higher-frequency levels. Crucially, unlike the Fourier transform, which uses fixed sine and cosine functions as its basis for all signals, a wavelet transform utilizes a family of basis functions (wavelets) that are localized in both time and frequency. This adaptability allows DWT to more efficiently capture transient or non-stationary features within a signal.
Conceptually, this decomposition is equivalent to a multi-resolution filter bank that partitions the original signal’s spectrum into a series of orthogonal, dyadic sub-bands, as depicted in Figure 5. This illustrates the fundamental principle of creating distinct spectral partitions for analysis and modification.
The true power of DWT for WAWA’s embedding strategy, however, is revealed by observing this decomposition in the time domain, as illustrated in the concrete example of Figure 6. While Figure 5 shows the what (the spectral division), Figure 6 demonstrates the critical how: Each set of sub-band coefficients is itself a time series that preserves the temporal features of the original signal corresponding to its respective frequency band. It is this dual localization in both time and frequency that makes DWT the ideal transform for our application. It allows us to treat a specific detail sub-band as an independent, lower-rate ’channel’ into which we can add our time-structured watermark signal, w ( t ) , with minimal interference to other components. This principle is central to the embedding process detailed in Section 2.2.2.
WAWA’s embedding strategy is designed to directly exploit this multi-resolution framework. Rather than superimposing the watermark across the entire time-domain signal, WAWA performs a targeted insertion into one or more of the detail coefficient sub-bands. This approach affords the system designer a crucial degree of freedom: the ability to place the watermark in spectral regions of lower host signal energy, thereby maximizing watermark robustness while minimizing interference with the primary navigation components.

2.2. Design of the WAWA Scheme

This section details the end-to-end design of the WAWA scheme, from watermark generation at the transmitter to the dual-path verification at the receiver.

2.2.1. System Architecture

The overall architecture of the WAWA scheme is depicted in Figure 7. The system is composed of cryptographic, watermark processing, and navigation signal processing modules, logically separated into a transmitter-side process and a receiver-side process.
At the transmitter, e.g., the GNSS ground control segment, the process begins with the cryptographic module, which generates a digital signature S i g for a block of navigation data using a private key K p r i v . This signature, which serves as the core authentication payload, is then transformed into a robust, spread-spectrum watermark signal w by the Watermark Generation module. The central innovation resides in the Watermark Embedding module. Instead of directly modifying the time-domain signal, it first decomposes the original GNSS baseband signal s into its constituent time-frequency components via the DWT. The watermark w is then embedded by modifying a specific set of these components. Finally, an Inverse DWT IDWT reconstructs the signal, yielding the final watermarked signal s w , ready for uplink and broadcast.
At the receiver, the process is designed for both efficiency and flexibility. After the front-end has acquired and tracked the signal, the Watermark Extraction module performs a DWT on the received baseband signal r w to isolate the sub-bands containing the watermark. It then despreads these components to obtain the raw extracted watermark w r . At this point, WAWA’s key architectural feature comes into play: a dual-path verification framework.
  • The slow path is designed for fully autonomous, standalone receivers. It performs a hard-decision decoding on the extracted watermark w r to reconstruct the full digital signature, which is then verified using the public key K p u b . This path guarantees authentication without reliance on any external communication.
  • The fast path is designed for network-assisted receivers that prioritize speed. In this mode, the receiver obtains the authentic signature S i g in advance from a trusted, high-speed channel, e.g., a cellular network. It then uses this authentic signature as a local template for a rapid correlation detection against the soft-decision values of the extracted watermark w r , enabling near real-time authentication.
Both paths culminate in a definitive signal authentication result, providing a versatile solution adaptable to a wide range of application requirements and device capabilities.

2.2.2. Wavelet Domain Embedding Process

WAWA utilizes the time-frequency localization property of DWT to embed the watermark with precise energy control, minimizing its impact on critical signal components. The core embedding mechanism is illustrated in the yellow-highlighted portion of Figure 8.
The process begins by applying an l-level DWT to the discrete baseband signal s ( t ) , which represents the spread-spectrum signal corresponding to one complete navigation symbol period. This choice allows us to embed the watermark into the fine structure of the symbol itself, prior to modulation onto the carrier. This yields a set of detail coefficient sub-bands { D 1 , D 2 , , D l } and a final approximation coefficient sub-band A l .
For the implementation of WAWA, the Daubechies (db) wavelet family is selected as the basis function. This choice is motivated by several key properties that are highly advantageous for this application: orthogonality, which is a prerequisite for the energy-based embedding model; compact support, which helps in localizing the analysis in time; and regularity, which contributes to a less perceptible watermark. The choice of the specific wavelet (e.g., db4) and the decomposition level are fixed system parameters known to all compliant receivers. WAWA selects one or more of these sub-bands, denoted D t a r g e t , for watermark embedding. Typically, sub-bands with lower original signal energy are chosen to maximize the watermark’s robustness.
To control the watermark’s power and its impact on the original signal, a power allocation factor α is defined as the ratio of the watermark power P w to the power of the original signal C,
α = P w / C
The normalized watermark sequence w ( t ) is then scaled and added to the target sub-band coefficients D t a r g e t ( t ) to produce the modified coefficients D t a r g e t ( t ) ,
D t a r g e t ( t ) = D t a r g e t ( t ) + α C · w ( t )
It is crucial to note that this additive operation is performed in the wavelet coefficient domain. Both D t a r g e t ( t ) and the scaled watermark w ( t ) represent sequences of coefficients at this stage, not time-domain signals. This ensures the watermark energy is precisely injected into the desired spectral sub-band. This additive embedding strategy also relies on the orthogonality of the chosen wavelet basis, which ensures that the energy of the watermark adds linearly to the energy of the original signal, allowing the correlation loss to be precisely controlled by the parameter α according to Parseval’s theorem.
Finally, the modified coefficients D t a r g e t ( t ) and all other unmodified coefficients ( A l , D o t h e r ) are used to reconstruct the final watermarked signal s w ( t ) via the Inverse Discrete Wavelet Transform (IDWT),
s w ( t ) = IDWT ( A l , D t a r g e t , D o t h e r )

2.2.3. Authentication Watermark Sequence Design

The watermark sequence w ( t ) is designed to carry the authentication information robustly and efficiently. It employs a composite structure that combines the raw authentication bits with spread spectrum modulation. The generation process is shown in the gray-highlighted portion of Figure 8.
First, the authentication payload is defined. The sender signs a segment of the navigation message, M s e g , concatenated with a timestamp T, using the private key K p r i v to generate the digital signature S i g ,
S i g = Sign ( K p r i v , M s e g | | T )
This signature, along with any necessary overhead (e.g., metadata), forms the complete authentication sequence w a u ( k ) , with a total length of N a u bits.
Next, this bit sequence is mapped to the time domain. We define a key parameter, N b p s y m (bits per symbol), as the average number of authentication bits embedded within one navigation symbol period T s y m . The duration of a single authentication bit, T b i t , is therefore
T b i t = T s y m N b p s y m
Finally, each authentication bit w a u ( k ) is spread using a public and fixed spreading sequence C w ( t ) to enhance its robustness for subsequent embedding and extraction. The length of this spreading sequence, L c w , depends on the original signal’s chipping rate R c , the number of DWT levels l, and the bit duration T b i t ,
L c w = R c 2 l T b i t
The final watermark sequence w ( t ) is generated by modulating each bit with the spreading sequence
w ( t ) = k w a u ( k ) · C w ( t k T b i t )
By using a public, fixed spreading code C w ( t ) , the receiver can perform despreading with minimal complexity and memory, as it only needs to store this known sequence.

2.2.4. Receiver Watermark Extraction and Dual-Path Verification

The receiver’s main task is to extract the embedded signature from the received signal and perform verification. The dual-path framework offers flexibility to trade authentication latency for reliance on external communication channels. The receiver processing flow is detailed in Figure 9.
After acquiring and tracking the GNSS signal, the receiver performs an l-level DWT on the baseband signal r w ( t ) to obtain the target sub-band coefficients D t a r g e t r e c e i v e d . Using a local replica of the public spreading code C w l o c a l ( t ) , it then performs a correlation-based despreading operation to obtain a soft-decision value z b i t ( k ) for each embedded authentication bit,
z b i t ( k ) = j = 1 L c w D t a r g e t r e c e i v e d ( k , j ) · C w l o c a l ( j )
where D t a r g e t r e c e i v e d ( k , j ) is the j-th coefficient in the target sub-band corresponding to the k-th bit interval. Since C w is public and fixed, the receiver only needs to buffer the current soft-decision values, leading to minimal memory usage. From here, verification can follow one of two paths.
(1)
Slow Path Verification: Standalone Signature Check
This path is designed for standalone receivers without access to external channels. The verification process begins by making a hard decision on each soft value z b i t ( k ) to recover the estimated authentication bits w ^ a u ( k ) , for example, based on the sign
w ^ a u ( k ) = sign ( z b i t ( k ) )
The receiver accumulates these recovered bits over time to reconstruct the complete estimated signature, S i g ^ . Once the corresponding navigation message segment M s e g and timestamp T are also received, the receiver can immediately perform the standard digital signature verification using the pre-stored public key K p u b ,
R e s u l t = Verify ( K p u b , M s e g | | T , S i g ^ )
A true result from the ‘Verify’ function confirms the authenticity and integrity of the navigation message. The key advantage here is immediacy: unlike TESLA, this verification does not require waiting for a future key disclosure.
(2)
Fast Path Verification: Assisted Correlation Detection
This path is designed for network-assisted receivers that can obtain the authentic signature S i g in advance via a fast external channel (e.g., a cellular network). This allows for a more rapid and robust authentication process.
With the authentic signature S i g , the receiver constructs a local, error-free reference bit sequence w a u l o c a l ( k ) . It then correlates this reference sequence with the stream of real-time soft-decision values z b i t ( k ) to compute a final detection statistic, Z s e q ,
Z s e q = k = 1 N a u z b i t ( k ) · w a u l o c a l ( k )
This approach provides significant processing gain by correlating over the entire signature sequence, which greatly improves the detection Signal-to-Noise Ratio (SNR) compared to the bit-by-bit hard decisions of the slow path. Consequently, high authentication reliability can be achieved even at lower Carrier-to-Noise density ratios ( C / N 0 ). The authentication speed is limited only by the latency of the external channel, enabling near real-time verification.

3. Results

This section presents a theoretical performance analysis of the proposed WAWA scheme. The analysis uses parameters consistent with the Galileo E1-B signal as a case study to evaluate the core performance metrics: watermark detection reliability, effective channel bandwidth, and the impact of the watermark on the primary navigation signal.

3.1. Watermark Detection Performance

The reliability of detecting the embedded watermark is crucial for both verification paths. We analyze the performance of each path separately.

3.1.1. Slow Path: Bit Error Rate (BER) Analysis

The performance of the slow path depends on the ability to correctly decode individual authentication bits, which is quantified by the Bit Error Rate (BER). In an Additive White Gaussian Noise (AWGN) channel, the BER is a function of the Signal-to-Noise Ratio (SNR) per bit, S N R b i t ,
S N R b i t = E b i t N 0 = α C T b i t N 0 = α C N 0 · T s y m N b p s y m
where E b i t is the energy per watermark bit, and N 0 is the single-sided noise power spectral density.
Assuming the watermark bits are modulated using Binary Phase Shift Keying (BPSK), the theoretical BER for the WAWA slow path is given by the standard Q-function
B E R W A W A = Q 2 · S N R b i t = Q 2 α N b p s y m C N 0 T s y m
The probability of successfully authenticating an entire signature of N a u bits without error is
P d _ s l o w ( 1 B E R W A W A ) N a u

3.1.2. Fast Path: Correlation Detection Performance

The fast path correlates the received signal with a known authentic signature. Its performance is characterized by the detection probability ( P d ) for a given false alarm probability ( P f a ), which depends on the accumulated SNR over the entire sequence, S N R s e q ,
S N R s e q = ( E [ Z s e q | signal ] ) 2 Var ( Z s e q | signal ) ( N a u E b i t ) 2 N a u N 0 / 2 = 2 α C N 0 T a u
where T a u = N a u T b i t is the total time to transmit the signature. The detection probability is given by
P d _ f a s t = Q Q 1 ( P f a ) S N R s e q
where Q 1 ( · ) is the inverse Q-function.

3.1.3. Performance Evaluation

For evaluation, we compare WAWA’s performance with the uncoded data bit BER of Galileo OSNMA. Neglecting channel coding, the BER for OSNMA data bits [15] is given by
B E R D a t a = Q 2 C N 0 T s y m
We use parameters based on the Galileo E1-B signal and a representative cryptographic configuration, as summarized in Table 1. The signature length of 672 bits is based on the design in TrustCNAV [25], which provides a concrete example of a modern certificateless PKC scheme suitable for GNSS.
Figure 10 plots the BER of the WAWA slow path against the uncoded OSNMA BER for two different power allocation factors ( α = 0.05 and α = 0.1 ) and an embedding rate of N b p s y m = 1 . Figure 11 shows the detection probability of the WAWA fast path for a false alarm rate of P f a = 10 6 and a rapid authentication interval of T a u = 1 s.
The results show that the WAWA slow path’s BER is dependent on the power allocation factor α . At α = 0.1 , its performance is comparable to that of uncoded OSNMA bits. The fast path exhibits highly reliable performance, achieving near-certain detection ( P d 1 ) even at moderate C / N 0 values over a short 1-s interval.

3.2. Effective Channel Bandwidth

A primary innovation of WAWA is the establishment of a high-bandwidth authentication channel. OSNMA is limited to a fixed data rate, embedding 40 bits of authentication data every 2 s, which results in an effective bandwidth of 20 bps [15]. Figure 12 provides a conceptual illustration of this structural difference.
In contrast, the effective bandwidth of the WAWA watermark channel, R w a w a , is determined by the number of bits embedded per symbol, N b p s y m ,
R w a w a = N b p s y m T s y m
Figure 13 plots this relationship for the Galileo E1-B signal ( T s y m = 4 ms). The results show that WAWA’s bandwidth scales linearly with N b p s y m and can significantly surpass the fixed, low rate of OSNMA. For instance, embedding just one bit per symbol ( N b p s y m = 1 ) yields a bandwidth of 250 bps, over an order of magnitude greater than OSNMA.

3.3. Impact on Legacy GNSS Receivers

A foundational requirement for any GNSS signal component is a thorough understanding of its impact on existing, legacy receivers. Backward compatibility is paramount for the technology’s adoption. To provide a comprehensive evaluation of this critical aspect for WAWA, this section presents a quantitative investigation into its effects. We first establish and validate the theoretical model for the watermark’s primary physical effect—correlation loss—and then analyze the downstream consequences of this loss on the receiver’s code tracking precision.

3.3.1. Correlation Loss: Theory and Validation

For a legacy receiver that is unaware of the WAWA scheme, the embedded watermark effectively acts as a source of structured, low-power noise that is uncorrelated with the local PRN code replica. This inevitably leads to a reduction in the correlation peak power, an effect quantified as Correlation Loss (CL). Our theoretical model for this loss is a direct function of the authentication energy ratio, α :
CL WAWA = 10 log 10 ( 1 α ) ( dB )
This model highlights a key design advantage of WAWA. As shown in Figure 14, for an equivalent portion of signal energy allocated to authentication, the resulting correlation loss is inherently lower than that of a Chimera-like SCA scheme, which modifies the signal in the time domain.
To confirm the accuracy of this theoretical model, we performed a series of baseband-level simulations. First, a qualitative view of the effect is provided in Figure 15, which visually demonstrates how the normalized correlation peak amplitude attenuates as more energy is allocated to the watermark via an increasing α .
Next, to achieve a rigorous quantitative validation, a Monte Carlo simulation was performed to test the precise accuracy of Equation (20). The results, presented in Figure 16, reveal an excellent agreement between the simulated data points and the theoretical curve. This validation is crucial, as it confirms that α is not merely a theoretical concept but a reliable and predictable engineering parameter for controlling the scheme’s impact.

3.3.2. Impact on Code Tracking Precision

With the correlation loss model now rigorously validated, we can quantitatively project its operational consequences for a legacy receiver. The most critical of these is the degradation of code tracking precision in the Delay-Locked Loop (DLL), as this directly affects the accuracy of pseudorange measurements. The DLL’s performance is fundamentally governed by the effective Carrier-to-Noise density ratio, ( C / N 0 ) eff , which is directly reduced by the correlation loss
( C / N 0 ) eff = ( C / N 0 ) · ( 1 α )
The relationship between this effective C / N 0 and the resulting tracking error is captured in the standard model for DLL thermal noise jitter. The standard deviation of the error, σ DLL , can be approximated as
σ DLL c · B L d 1 2 ( C / N 0 ) eff 1 + 1 T i n t ( C / N 0 ) eff ( meters )
where c is the speed of light, B L is the loop noise bandwidth, d is the early-late correlator spacing (in chips), and T i n t is the coherent integration time.
By substituting our validated expression for ( C / N 0 ) eff into this formula, we can generate a precise theoretical prediction of the impact of α on pseudorange precision. Figure 17 plots this relationship for a set of typical receiver parameters ( B L = 1 Hz, d = 0.5 chips, T i n t = 4 ms). The resulting performance curves illustrate a clear and manageable trade-off. For instance, at a typical C / N 0 of 45 dB-Hz, even a relatively high energy allocation of α = 0.1 (a −0.46 dB correlation loss) results in a precision degradation of only a few decimeters. This analysis provides a robust framework for system designers to make informed decisions, balancing the required level of authentication robustness against the acceptable impact on legacy receiver performance.

4. Discussion

The results presented in the previous section demonstrate that the WAWA scheme offers a unique set of capabilities that directly address the primary limitations of existing GNSS authentication methods. This section interprets these findings in the broader context of GNSS security, comparing WAWA’s performance trade-offs against the established NMA and SCA paradigms.

4.1. Immediacy of Verification and Its Implications

The most significant advantage of WAWA is its ability to provide immediate authentication. As shown in Figure 10 and Figure 11, this immediacy is achieved without compromising performance under typical operating conditions. The slow path can achieve a BER comparable to the uncoded bits of OSNMA, while the fast path offers exceptionally high detection reliability. This capability directly resolves the chief operational drawback of TESLA-based NMA schemes: the inherent verification latency of tens of seconds.
This elimination of delay has profound implications for time-critical applications. For autonomous vehicles, drones, or critical infrastructure timing, a 30-second window of uncertainty is a significant security risk. An attacker could inject false information during this period, causing immediate and potentially catastrophic effects before the data can be invalidated. WAWA closes this window of vulnerability. The dual-path framework further enhances this flexibility. The slow path guarantees a baseline autonomous capability for any receiver, while the fast path provides a near real-time, high-robustness solution for connected systems, where low latency is the highest priority.

4.2. Bandwidth as a Key Enabler for Stronger Cryptography

The bandwidth analysis in Figure 13 highlights the fundamental enabler of WAWA’s architecture: the creation of a high-throughput physical layer channel. This high bandwidth is what makes it feasible to transmit a complete public-key signature in a timely manner—a task that is simply impossible with OSNMA’s fixed 20 bps data rate. By moving authentication from the slow navigation message bits to the much faster physical layer symbols, WAWA unlocks the ability to use more robust cryptographic primitives without incurring unacceptable latency.
Furthermore, the tunable parameter N b p s y m introduces a valuable degree of freedom for system designers. As shown by the relationship in Equation 13, a designer can choose to decrease N b p s y m (lowering the bandwidth) to significantly boost the robustness ( S N R b i t ) of the slow path for receivers in weak signal environments. This adaptability allows the system to be optimized for different use cases and channel conditions, a flexibility not available in fixed-rate schemes like OSNMA.

4.3. Resource Efficiency: Overcoming the Memory Barrier

Beyond its temporal advantages, WAWA’s most significant practical contribution is its profound resource efficiency, a distinction highlighted in Table 2.
This stands in stark contrast to SCA schemes like Chimera. WAWA’s symbol-level, real-time processing architecture fundamentally obviates the need for the megabyte-scale memory buffers essential for SCA’s delayed verification. This high memory and power overhead has historically been a prohibitive barrier for integrating strong cryptographic authentication into the vast market of resource-constrained devices, such as IoT sensors. WAWA dismantles this barrier, making high-security authentication practical for a much broader class of receivers.
These advantages, however, are balanced by a clear set of design trade-offs. Unlike the non-intrusive NMA approach, WAWA introduces a controlled correlation loss for legacy receivers. Yet, as quantified in Figure 14 and validated in Section 3.3, this impact is not only tunable via the power allocation parameter α but is also demonstrably less severe than that of SCA for an equivalent authentication energy. This provides system designers with a transparent, predictable mechanism to balance authentication robustness against backward compatibility. Furthermore, while the DWT and PKC operations introduce a moderate computational overhead compared to NMA, this is a modest demand for modern embedded processors. It represents a justifiable engineering trade-off for the immense security gains of eliminating verification latency and time-synchronization vulnerabilities.
The choice of key system parameters involves a multi-dimensional trade-off. For instance, increasing the DWT decomposition level allows for finer spectral placement of the watermark but increases computational complexity. Increasing N b p s y m boosts bandwidth but reduces the per-bit energy for the slow path (as shown in Equation (13)), requiring a higher C / N 0 or α . The optimal parameter set depends on the target application scenario. For example, a UAV operating in an open-sky environment, which prioritizes high bandwidth, would favor a larger value for N b p s y m .Conversely, a receiver in an urban canyon, requiring maximum robustness against weak signal conditions, would benefit from decreasing N b p s y m while simultaneously increasing α to boost the per-bit SNR.

4.4. Security Considerations, Limitations, and Future Work

From a security perspective, WAWA’s reliance on public-key digital signatures provides strong protection against forgery, as creating a valid signature without the private key is computationally infeasible under standard cryptographic assumptions. An adversary aware of the scheme might attempt a watermark-aware attack, such as selective removal of the targeted DWT sub-band. However, this is challenging without causing significant distortion to the legacy signal components. Timed replay attacks are fundamentally mitigated because WAWA’s immediate verification closes the window of vulnerability exploited in TESLA-based systems. The management of public keys ( K p u b ) is a critical component of the system’s root of trust. WAWA’s architecture is compatible with established Public Key Infrastructure (PKI) models, such as that proposed in TrustCNAV, where keys are managed through a trusted out-of-band channel or periodic broadcasts. For the fast path, the trusted external channel must be independently secured (e.g., via TLS/SSL) to prevent Man-in-the-Middle (MITM) attacks. Furthermore, looking toward future threats, the rise in quantum computing poses a long-term risk to classical cryptography. While a full transition to Post-Quantum Cryptography (PQC) is beyond the scope of this paper, it is noteworthy that the high-bandwidth channel created by WAWA is inherently more adaptable to the larger signature sizes typical of PQC schemes. This flexibility represents a significant advantage for the long-term viability of the architecture.
Despite its advantages, it is important to acknowledge the scheme’s limitations. The primary trade-off is the introduction of a controllable correlation loss, which, as analyzed in Section 3.3, affects the performance of legacy receivers. Our analysis was also primarily conducted under AWGN channel conditions. The performance of WAWA in complex multipath and fading environments, while hypothesized to degrade gracefully along with the host signal, requires further investigation and is a critical area for future research. Finally, the practical deployment of WAWA would necessitate modifications to the GNSS space and ground segments for watermark embedding and synchronization. This represents a significant long-term challenge that requires coordination with international standardization bodies, positioning WAWA as a next-generation authentication concept rather than an immediate overlay system.

5. Conclusions

This paper confronted the defining limitations of the two dominant paradigms in GNSS signal authentication. Navigation Message Authentication (NMA), epitomized by TESLA-based protocols, is fundamentally hampered by high verification latency and a critical security vulnerability tied to time synchronization. Conversely, Spreading Code Authentication (SCA) schemes impose prohibitive memory buffering requirements on receivers, restricting their use in the vast and growing market of low-cost, resource-constrained devices.
To resolve this impasse, we have proposed, designed, and analyzed WAWA, a novel Wavelet Analysis-based Watermarking Authentication architecture. WAWA’s core innovation is its strategic use of the wavelet domain to create a high-capacity channel within the physical signal layer, enabling the transmission of a complete public-key signature. This design systematically dismantles the shortcomings of previous approaches. It achieves immediate, symbol-level verification, which completely eliminates the latency and time-synchronization risks of TESLA. Simultaneously, its real-time, symbol-by-symbol processing obviates the need for the large memory buffers that have hindered the practicality of SCA.
Our performance analysis confirms that WAWA provides robust authentication performance while giving system designers direct control over the trade-off between security and backward compatibility via a single power allocation parameter. The dual-path verification framework further enhances its flexibility, offering a high-performance solution for network-assisted receivers while maintaining full capability for standalone devices.
In comparison to existing schemes, WAWA establishes a new and highly practical paradigm for GNSS authentication. It decisively resolves the critical issues of immediacy, security, and resource efficiency that have long constrained the field. By uniquely combining these attributes, WAWA provides a robust and forward-looking framework for guaranteeing the integrity of PNT sensor data. It thereby enables a new class of secure, distributed applications, from city-scale IoT deployments to fully autonomous systems that depend on trustworthy authentication performed efficiently at the network edge.

Author Contributions

Conceptualization, G.S. and X.T. (Xinyu Tang); methodology, X.T. (Xinyu Tang); software, X.T. (Xinyu Tang) and H.L.; validation, X.T. (Xinyu Tang), X.T. (Xiaomei Tang) and Y.W.; formal analysis, X.T. (Xinyu Tang); investigation, X.T. (Xinyu Tang); resources, G.S.; data curation, H.L.; writing—original draft preparation, X.T. (Xinyu Tang); writing—review and editing, X.T. (Xiaomei Tang) and G.S.; visualization, Y.W.; supervision, G.S.; project administration, G.S.; funding acquisition, G.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number U20A20193, and the National Natural Science Foundation of China grant number 62531025.

Data Availability Statement

The data presented in this study are available in the article. The study did not generate new publicly achievable datasets.

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which helped to improve the quality of this paper.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
BERBit Error Rate
DLLDelay-Locked Loop
DWTDiscrete Wavelet Transform
GNSSGlobal Navigation Satellite System
IDWTInverse Discrete Wavelet Transform
NMANavigation Message Authentication
OSNMAOpen Service Navigation Message Authentication
SCASpreading Code Authentication
SNRSignal-to-Noise Ratio
TESLATimed Efficient Stream Loss-tolerant Authentication
PNTPositioning, Navigation, and Timing
PKCPublic Key Cryptography
PKIPublic Key Infrastructure
WAWAWavelet Analysis based Watermarking Authentication

References

  1. Dovis, F.; Ruotsalainen, L.; Toledo-Moreo, R.; Kassas, Z.Z.M.; Gikas, V. Recent Advancement on the Use of Global Navigation Satellite System-Based Positioning for Intelligent Transport Systems [Guest Editorial]. IEEE Intell. Transp. Syst. Mag. 2020, 12, 6–9. [Google Scholar] [CrossRef]
  2. Zhang, Z.; Xiao, G.; Nie, Z.; Ferreira, V.; Casula, G. High-Precision and High-Reliability Positioning, Navigation, and Timing: Opportunities and Challenges. Remote Sens. 2024, 16, 4403. [Google Scholar] [CrossRef]
  3. Jin, S.; Camps, A.; Jia, Y.; Wang, F.; Martin-Neira, M.; Huang, F.; Yan, Q.; Zhang, S.; Li, Z.; Edokossi, K.; et al. Remote Sensing and Its Applications Using GNSS Reflected Signals: Advances and Prospects. Satell. Navig. 2024, 5, 19. [Google Scholar] [CrossRef]
  4. Meng, L.; Yang, L.; Yang, W.; Zhang, L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022, 14, 4826. [Google Scholar] [CrossRef]
  5. Radoš, K.; Brkić, M.; Begušić, D. Recent Advances on Jamming and Spoofing Detection in GNSS. Sensors 2024, 24, 4210. [Google Scholar] [CrossRef]
  6. Psiaki, M.; Humphreys, T. GNSS Spoofing and Detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
  7. Fernández-Hernández, I.; Châtre, E.; Dalla Chiara, A.; Da Broi, G.; Pozzobon, O.; Fidalgo, J.; Odriozola, M.; Moreno, G.; Sturaro, S.; Caparra, G.; et al. Impact Analysis of SBAS Authentication. Navigation 2018, 65, 517–532. [Google Scholar] [CrossRef]
  8. UK Government. The Economic Impact on the UK of a Disruption to GNSS: Executive Summary. Technical Report, Cabinet Office; 2017. Available online: https://www.gov.uk/government/publications/the-economic-impact-on-the-uk-of-a-disruption-to-gnss (accessed on 24 October 2025).
  9. Wang, L.; Chen, L.; Li, B.; Liu, Z.; Li, Z.; Lu, Z. Development Status and Challenges of Anti-Spoofing Technology of GNSS/INS Integrated Navigation. Front. Phys. 2024, 12, 1425084. [Google Scholar] [CrossRef]
  10. Esswein, M.C.; Psiaki, M.L. Classification of Authentic and Spoofed GNSS Signals Using a Calibrated Antenna Array. Navigation 2025, 72. [Google Scholar] [CrossRef]
  11. Wesson, K.D.; Gross, J.N.; Humphreys, T.E.; Evans, B.L. GNSS Signal Authentication via Power and Distortion Monitoring. IEEE Trans. Aerosp. Electron. Syst. 2017, 54, 739–754. [Google Scholar] [CrossRef]
  12. Wu, Z.; Zhang, Y.; Yang, Y.; Liang, C.; Liu, R. Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey. IEEE Access 2020, 8, 165444–165496. [Google Scholar] [CrossRef]
  13. Gallardo, F.; Pérez-Yuste, A.; Konovaltsev, A. Satellite Fingerprinting Methods for GNSS Spoofing Detection. Sensors 2024, 24, 7698. [Google Scholar] [CrossRef]
  14. Chen, X.; Luo, R.; Liu, T.; Yuan, H.; Wu, H. Satellite Navigation Signal Authentication in GNSS: A Survey on Technology Evolution, Status, and Perspective for BDS. Remote Sens. 2023, 15, 1462. [Google Scholar] [CrossRef]
  15. Fernández-Hernández, I.; Rijmen, V.; Seco-Granados, G.; Simon, J.; Rodríguez, I.; Calle, J.D. A Navigation Message Authentication Proposal for the Galileo Open Service. Navigation 2016, 63, 85–102. [Google Scholar] [CrossRef]
  16. Perrig, A.; Canetti, R.; Tygar, J.D.; Song, D. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes Tech. Newsl. 2002, 5, 2–13. [Google Scholar]
  17. Hammarberg, T.; García, J.M.V.; Alanko, J.N.; Bhuiyan, M.Z.H. An Experimental Performance Assessment of Galileo OSNMA. Sensors 2024, 24, 404. [Google Scholar] [CrossRef]
  18. Anderson, J.; Lo, S.; Walter, T. Time Synchronization for TESLA-based GNSS-enabled Systems. In Proceedings of the 35th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2022), Denver, CO, USA, 19–23 September 2022; pp. 3408–3417. [Google Scholar] [CrossRef]
  19. Wang, H.; Zhang, Y.; Zhu, X.; He, J.; Zhao, S.; Shen, Y.; Jiang, X. Practical Spoofing Attacks on Galileo Open Service Navigation Message Authentication. arXiv 2025, arXiv:2501.09246. [Google Scholar] [CrossRef]
  20. Wang, H.; Zhang, Y.; Shen, Y.; Zhu, J.; Chen, Y.; Jiang, X. Novel Replay Attacks against Galileo Open Service Navigation Message Authentication. In Proceedings of the International Technical Meeting of the Satellite Division of The Instituteof Navigation (ION GNSS+ 2023), Denver, CO, USA, 11–15 September 2023; pp. 3897–3907. [Google Scholar] [CrossRef]
  21. Ardizzon, F.; Crosara, L.; Tomasin, S.; Laurenti, N. On the Limits of Cross-Authentication Checks for GNSS Signals. IEEE Trans. Inf. Forensics Secur. 2024, 19, 4480–4493. [Google Scholar] [CrossRef]
  22. Anderson, J.; Carroll, K.; DeVilbiss, N.; Gillis, J.; Hinks, J.; O’Hanlon, B.; Rushanan, J.; Scott, L. Chips-Message Robust Authentication (Chimera) for GPS Civilian Signals. Navig. J. Inst. Navig. 2017, 2017, 2388–2416. [Google Scholar]
  23. So, H.; Gunawardena, S.; Hebert, J. Required Memory Analysis of a GPS Receiver for Implementing CHIMERA SCA. In Proceedings of the 2023 IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, CA, USA, 24–27 April 2023; pp. 905–910. [Google Scholar] [CrossRef]
  24. Nicola, M.; Motella, B.; Gamba, M.T. The Chimera Solution: Performance Assessment. In Proceedings of the 2020 European Navigation Conference (ENC), Dresden, Germany, 23–24 November 2020; pp. 1–10. [Google Scholar] [CrossRef]
  25. Wu, Z.; Bai, Y.; Zhang, Y.; Liu, L.; Yue, M. TrustCNAV: Certificateless Aggregate Authentication of Civil Navigation Messages in GNSS. Comput. Secur. 2024, 148, 104172. [Google Scholar] [CrossRef]
  26. Liu, H.; Mo, Y.; Yan, J.; Xie, L.; Johansson, K.H. An Online Approach to Physical Watermark Design. IEEE Trans. Autom. Control 2020, 65, 3895–3902. [Google Scholar] [CrossRef]
Figure 1. The fundamental Positioning, Navigation, and Timing (PNT) services provided by GNSS and their key applications in modern society.
Figure 1. The fundamental Positioning, Navigation, and Timing (PNT) services provided by GNSS and their key applications in modern society.
Sensors 25 06615 g001
Figure 2. Asimplified illustration of a GNSS spoofing attack, where a malicious attacker generates spoofing signals to mislead a target receiver.
Figure 2. Asimplified illustration of a GNSS spoofing attack, where a malicious attacker generates spoofing signals to mislead a target receiver.
Sensors 25 06615 g002
Figure 3. A simplified framework for traditional GNSS Direct Sequence Spread Spectrum (DSSS) signal modulation and demodulation. The waveforms are illustrative, representing the digital nature of the baseband signal and its modulated form at the RF stage.
Figure 3. A simplified framework for traditional GNSS Direct Sequence Spread Spectrum (DSSS) signal modulation and demodulation. The waveforms are illustrative, representing the digital nature of the baseband signal and its modulated form at the RF stage.
Sensors 25 06615 g003
Figure 4. The fundamental workflow of a PKC digital signature scheme.
Figure 4. The fundamental workflow of a PKC digital signature scheme.
Sensors 25 06615 g004
Figure 5. Conceptual representation of DWT as a multi-resolution analysis in the frequency domain. An l-level decomposition partitions the original signal’s spectrum into one low-frequency approximation sub-band ( A l ) and l high-frequency detail sub-bands ( D 1 to D l ), each with a specific bandwidth.
Figure 5. Conceptual representation of DWT as a multi-resolution analysis in the frequency domain. An l-level decomposition partitions the original signal’s spectrum into one low-frequency approximation sub-band ( A l ) and l high-frequency detail sub-bands ( D 1 to D l ), each with a specific bandwidth.
Sensors 25 06615 g005
Figure 6. An illustrative time-domain view of a 3-level DWT decomposition on a generic signal. This figure demonstrates the key property leveraged by WAWA: the original signal’s temporal structure is preserved within each decomposed sub-band (A3, D1–D3), enabling a time-series watermark to be embedded in a specific frequency layer.
Figure 6. An illustrative time-domain view of a 3-level DWT decomposition on a generic signal. This figure demonstrates the key property leveraged by WAWA: the original signal’s temporal structure is preserved within each decomposed sub-band (A3, D1–D3), enabling a time-series watermark to be embedded in a specific frequency layer.
Sensors 25 06615 g006
Figure 7. System architecture of the WAWA scheme. The conceptual modules are color-coded: blue for navigation signal processing, green for cryptographic operations (using private key K p r i v and public key K p u b ), and yellow for watermark processing. The flow of data and processing steps from navigation message generation to the final authenticated output is illustrated.
Figure 7. System architecture of the WAWA scheme. The conceptual modules are color-coded: blue for navigation signal processing, green for cryptographic operations (using private key K p r i v and public key K p u b ), and yellow for watermark processing. The flow of data and processing steps from navigation message generation to the final authenticated output is illustrated.
Sensors 25 06615 g007
Figure 8. Transmitter flowchart showing watermark generation and embedding. The process takes the original signal s ( t ) and authentication data ( M , T ) to produce a watermarked signal s w ( t ) using a private key ( K p r i v ) and a spreading code ( C w ).
Figure 8. Transmitter flowchart showing watermark generation and embedding. The process takes the original signal s ( t ) and authentication data ( M , T ) to produce a watermarked signal s w ( t ) using a private key ( K p r i v ) and a spreading code ( C w ).
Sensors 25 06615 g008
Figure 9. Receiver flowchart showing watermark extraction and the dual-path authentication process.
Figure 9. Receiver flowchart showing watermark extraction and the dual-path authentication process.
Sensors 25 06615 g009
Figure 10. Bit Error Rate (BER) performance of the WAWA slow path versus uncoded OSNMA data bits as a function of C / N 0 .
Figure 10. Bit Error Rate (BER) performance of the WAWA slow path versus uncoded OSNMA data bits as a function of C / N 0 .
Sensors 25 06615 g010
Figure 11. Detection probability ( P d ) of the WAWA fast path (for P f a = 10 6 , T a u = 1   s ) versus uncoded OSNMA BER as a function of C / N 0 .
Figure 11. Detection probability ( P d ) of the WAWA fast path (for P f a = 10 6 , T a u = 1   s ) versus uncoded OSNMA BER as a function of C / N 0 .
Sensors 25 06615 g011
Figure 12. Conceptual comparison of the data embedding structures for OSNMA and WAWA within the Galileo E1-B signal timing framework.
Figure 12. Conceptual comparison of the data embedding structures for OSNMA and WAWA within the Galileo E1-B signal timing framework.
Sensors 25 06615 g012
Figure 13. Effective watermark bandwidth comparison for the Galileo E1-B signal: WAWA vs. N b p s y m compared to the fixed rate of OSNMA.
Figure 13. Effective watermark bandwidth comparison for the Galileo E1-B signal: WAWA vs. N b p s y m compared to the fixed rate of OSNMA.
Sensors 25 06615 g013
Figure 14. Correlation loss as a function of the Authentication Energy Ratio ( ρ ) for WAWA and SCA schemes. OSMA has zero correlation loss.
Figure 14. Correlation loss as a function of the Authentication Energy Ratio ( ρ ) for WAWA and SCA schemes. OSMA has zero correlation loss.
Sensors 25 06615 g014
Figure 15. Impact of the authentication energy ratio ( α ) on the normalized correlation peak. The inset provides a zoomed-in view, clearly showing the peak amplitude reduction as more energy is allocated to the watermark.
Figure 15. Impact of the authentication energy ratio ( α ) on the normalized correlation peak. The inset provides a zoomed-in view, clearly showing the peak amplitude reduction as more energy is allocated to the watermark.
Sensors 25 06615 g015
Figure 16. Validation of the theoretical correlation loss model. The red dots represent Monte Carlo simulation results, which align closely with the theoretical prediction (solid blue line).
Figure 16. Validation of the theoretical correlation loss model. The red dots represent Monte Carlo simulation results, which align closely with the theoretical prediction (solid blue line).
Sensors 25 06615 g016
Figure 17. Theoretical impact of the authentication energy ratio ( α ) on DLL code tracking precision. The plot shows the tracking error standard deviation ( σ DLL ) as a function of C / N 0 for various α values.
Figure 17. Theoretical impact of the authentication energy ratio ( α ) on DLL code tracking precision. The plot shows the tracking error standard deviation ( σ DLL ) as a function of C / N 0 for various α values.
Sensors 25 06615 g017
Table 1. Key parameters used in the performance evaluation.
Table 1. Key parameters used in the performance evaluation.
ParameterSymbolValue
Symbol Duration T s y m 4 ms
Signature Length N a u 672 bits
Bits per Symbol N b p s y m 1
False Alarm Probability (Fast Path) P f a 10 6
Authentication Interval (Fast Path) T a u 1 s
Table 2. Qualitative comparison of GNSS authentication schemes: NMA (OSNMA), SCA (Chimera), and the proposed WAWA scheme.
Table 2. Qualitative comparison of GNSS authentication schemes: NMA (OSNMA), SCA (Chimera), and the proposed WAWA scheme.
FeatureOSNMA (NMA Example)Chimera (SCA Example)WAWA (This Work)
Authentication LevelNavigation MessageSpreading Code/Physical LayerNavigation Message via Physical Layer
Typical Verification LatencyHigh ( 30 s)High (waits for NMA key)Immediate (Slow/Fast Path)
Receiver Memory Req.LowVery High (MBs)Low
Receiver Comp. ComplexityLowModerateModerate (DWT)
Correlation LossNoneHigh: 20 log 10 ( 1 D F ) dBModerate: 10 log 10 ( 1 α ) dB
Time Sync. DependencyHigh (Vulnerable)High (via NMA)None
Primary AdvantagesBackward compatibilityChip-level protectionImmediacy, Low Memory, No Sync. Risk
Primary DisadvantagesLatency, Sync. Risk, Low BWHigh Memory, High Corr. LossIntroduces Corr. Loss, PKI Management, Space Segment Mod.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tang, X.; Tang, X.; Lin, H.; Wu, Y.; Sun, G. WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. Sensors 2025, 25, 6615. https://doi.org/10.3390/s25216615

AMA Style

Tang X, Tang X, Lin H, Wu Y, Sun G. WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. Sensors. 2025; 25(21):6615. https://doi.org/10.3390/s25216615

Chicago/Turabian Style

Tang, Xinyu, Xiaomei Tang, Honglei Lin, Yi Wu, and Guangfu Sun. 2025. "WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification" Sensors 25, no. 21: 6615. https://doi.org/10.3390/s25216615

APA Style

Tang, X., Tang, X., Lin, H., Wu, Y., & Sun, G. (2025). WAWA: Wavelet Analysis-Based Watermarking Authentication for GNSS Civil Signal with Immediate Symbol-Level Verification. Sensors, 25(21), 6615. https://doi.org/10.3390/s25216615

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop