26, April 2016

ESA Open Invitation To Tender

Open Date: 18/04/2016

Closing Date: 14/06/2016 13:00:00

Status: ISSUED
Reference Nr.: 16.1ET.04
Prog. Ref.: TRP
Budget Ref.: E/0901-01 – TRP
Tender Type: C
Price Range: 200-500 KEURO
Products: Satellites & Probes / System Engineering Software / System Modelling & Simulation / Modelling tools (Model development, Non real-time execution, Code generation, …)
Techology Domains: RF Systems, Payloads and Technologies / Radio Navigation Systems/Subsystems / Navigation System Tools
Establishment: ESTEC
Directorate: Directorate of Technical & Quality Manag
Department: Electrical Engineering Department
Division: RF Payload Systems Division
Contract Officer: Anze Singer
Industrial Policy Measure: N/A – Not apply
Last Update Date: 26/04/2016
Update Reason: Loaded a new Clarification (English version)

In the long term evolution of GNSS, it is expected that new signals and innovative signal designs will be conceived to support the next-generation of GNSS applications. These future GNSS signals will require innovative protection mechanisms to enable the business models of value-added services from multiple service providers, ensuring the protection of service revenues. Controlling access to GNSS signals and value-added data would typically be achieved through the use of two general techniques: – Spreading code encryption: where access to the signal is restricted to authorized users with the correct code generation parameters (keys). These users are able to generate the replica code in order to de-spread the signal. The security principle is based on the notion that the signal arrives below thermal noise, and therefore without the correct replica code, acquisition of the signal is intractable. – Navigation data encryption: where portions of the navigation message containing value-added service data can be restricted to authorized users using data encryption. Signal access control mechanisms based on the spreading code encryption paradigm have one significant drawback: all authorized users have common code generation parameters. In other words, the cryptonet for access to a given GNSS signal would be the entire set of authorized users that can generate the correct replica code for that signal. A major challenge in developing suitable key management schemes are the complexities associated with supporting the needs of a wide range of applications, with vastly different mission requirements, further complicated by a bandwidth, constrained environment and a range of different risk profiles for security of the code generation parameters. For this reason, tools to objectively evaluate their performance are essential to the design of robust and resilient protection mechanisms for future GNSS signals. The aim of this activity is broaden the pool of innovative key management concepts and techniques scheme to be used for future systems (benefiting also from ideas coming from non GNSS context e.g. 3GPP, SATCOM), to support their evaluation through the development of simulation tools that allow all aspects of key management including key establishment, distribution, revocation and exclusion to be simulated on a semi-analytic platform. The platform would allow to evaluate key figures of merit, such as signal acquisition time, availability, continuity, key revocation performance, and security metrics including effects of a potential compromise in terms of duration and exposure.

If you wish to access the documents related to the Invitation to Tender, you have to log in to the ESA Portal.