Practical Cryptographic Civil GPS Signal Authentication

Slides:



Advertisements
Similar presentations
Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.
Advertisements

Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Protecting Civil GPS Receivers
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Information Security of Embedded Systems : Public Key Cryptosystems, Communication Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer.
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Chapter 10: Authentication Guide to Computer Network Security.
Digital signature in automatic analyses for confidentiality against active adversaries Ilja Tšahhirov, Peeter Laud.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Lecture 2: Introduction to Cryptography
Digital Signature Tahani aljehani. Where Does This Fit.
Intro to Cryptography Lesson Introduction
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Assessing the Civil GPS Spoofing Threat
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 12.
Security of Digital Signatures
Cryptography: an overview
Cryptography: an overview
Cryptographic Hash Function
Cryptography And Network Security
Introduction Used for communication to verify
DHCP Starvation Attack and its Detection
Encryption
Introduction to security goals and usage of cryptographic algorithms
Digital signatures.
Presented by: Dr. Munam Ali Shah
Dhanushiya. R I YEAR BSc COMPUTER TECHNOLOGY.  Error is a condition when the output information does not match with the input information. During transmission,
NET 311 Information Security
Channel Spoofer: Defeating Channel Variability and Unpredictability
Counter-UAV Challenges: Is GNSS Spoofing Effective?
Digital Certificate Based Security Payment for QR Code Applications
Cryptography Lecture 10.
Asymmetric Cryptography
The Application of Elliptic Curves Cryptography in Embedded Systems
Data Integrity: Applications of Cryptographic Hash Functions
Cryptography: an overview
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
Privacy Preservation and Protection Scheme over ALARM on Geographical routing B. Muthusenthil, S. Murugavalli Results The PPS is geographical routing protocol,
Lecture 6: Digital Signature
60 MINUTES REMAINING.
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
Chapter -8 Digital Signatures
Digital Signatures Reference: Pfleeger , Charles P., Security in Computing, 2nd Edition, Prentice Hall, /7/2019 Ref: Pfleeger96, Ch.4.
Hashing Hash are the auxiliary values that are used in cryptography.
Cryptography Lecture 9.
Todd Humphreys | Aerospace Engineering
One-way Hash Function Network Security.
Hash Function Requirements
Chapter 8 roadmap 8.1 What is network security?
Digital Signature Standard (DSS)
TDR authentication requirements
Security in Wide Area Networks
How to Use Charm Crypto Lib
Presentation transcript:

Practical Cryptographic Civil GPS Signal Authentication Kyle Wesson, Mark Rothlisberger, and Todd Humphreys Presentation at ION 2011| September 23, 2011

What does it take to authenticate a GNSS Signal? Code Timing Authentication Code Origin Authentication

Specially-Weighted Correlations

Operational Definition of GNSS Signal Authentication GNSS signal is declared authentic if: Logical output S has remained low Logical output H1 has remained low, and Output PD has remained above an acceptable threshold

What qualities should cryptographic civil GPS signal authentication have? Effective: they make it difficult for a spoofer to carry off a successful spoofing attack Practical: they are likely to be implemented and adopted by the GPS community

A strategy that meets these requirements: Navigation Message Authentication (NMA): Forms by making the navigation message periodically unpredictable Applies public-key cryptographic digital signature and verification techniques

CNAV Message

Signing the CNAV Message Delivers ECDSA signature every five minutes per channel Delivers 476 unpredictable navigation message bits Offset scheme could lower time-between-authentications

Hypothesis Testing on Security Code

Probability of Detection under Challenging Scenario

Our Recent Work http://radionavlab.ae.utexas.edu/publications