Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.
ATN/GNSS Seminar Varadero, Cuba 6 to 9 May 2002 GNSS spectrum and signal vulnerability issues Presentation 5.2 by V. Iatsouk, GNSS Panel Secretary ANB/ICAO.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Protecting Civil GPS Receivers
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
Distributed Detection of Node Replication Attacks in Sensor Networks Bryan Parno, Adrian Perrig Virgil Gligor Carnegie Mellon UniversityUniversity of Maryland.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.
STRIDE Introduction Increasing use for PNT applications:  Positioning  Navigation  Timing.
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
Collaboration FST-ULCO 1. Context and objective of the work  Water level : ECEF Localization of the water surface in order to get a referenced water.
An “optimal” controller in Soft Walls is one which always pushes away from the no-fly zone. To blend the control in gradually, we would like to increase.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
Mini-Project 2006 Secure positioning in vehicular networks based on map sharing with radars Mini-Project IC-29 Self-Organized Wireless and Sensor Networks.
Workshop EGNOS KRAKÓW GNSS RECEIVER TESTING TECHNIQUES IN A LABORATORY ENVIRONMENT Institute of Radar Technology Military University of Technology.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Wireless Sensor Network Security Anuj Nagar CS 590.
Per R. Bodin Global Posision System GPS. Per R. Bodin Litt historie 1960: nasA & DoD are Interested in developing a satellite based position system with.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard DHS visit to UT Radionavigation Lab 3/10/2011.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
WNCG, UT Austin, 1 April 2011 Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Civilian GPS Spoofing Detection based on.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
How Global Positioning Devices (GPS) work
STEGANOGRPAHY [APPLICATION – I]
Pg 1 of 12 AGI GPS Signal Simulation & Visualization Oct 11, 2005 Curtis Hay Spirent Federal Systems.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
SVY 207: Lecture 4 GPS Description and Signal Structure
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks D. P. Shepard, J. A. Bhatti, T. E. Humphreys, The University of Texas at.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Riding out the Rough Spots: Scintillation-Robust GNSS Carrier Tracking Dr. Todd E. Humphreys Radionavigation Laboratory University of Texas at Austin.
Computer Science and Engineering 1 Information Assurance Research Department of Computer Science and Engineering University of South Carolina, Columbia.
By Andrew Y.T. Kudowor, Ph.D. Lecture Presented at San Jacinto College.
Airborne Reception Analysis of 406 Emergency Locator Beacon.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Securing Wireless Medical Implants Shyamnath Gollakota Haitham Hassanieh Benjamin Ransford Dina Katabi Kevin Fu.
Quickest Detection of GPS Spoofing Attack Z. Zhang, M. Trinkle, L. Qian, and H. Li MILCOM 2012 Nadia Adem 10/27/2014.
GPS: Everything you wanted to know, but were afraid to ask Andria Bilich National Geodetic Survey.
Characterization of Receiver Response to a Spoofing Attack
Qinghan Xiao, Cam Boulet and Thomas Gibbons Second International Conference on Availability, Reliability and Security, 2007 Speaker : 黃韋綸 RFID Security.
Ad Hoc Network.
Azam Supervisor : Prof. Raj Jain
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
Future Directions in GNSS Research Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | November 15, 2012.
Analyzing the Effect of Interference in GNSS Scintillation Monitoring Rodrigo Romero Politecnico di Torino 11th European Space.
Considerations for a European Global System Enrico Saggese Senior Vice-President for Space Activities Coordination.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard Honors Thesis Symposium 4/21/2011.
ON REQUEST MATERIAL TRACKING SYSTEM IN INDUSTRIES Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
PROPRIETARY —Do not distribute Presented to: Date: OPTIMIZING DATA LINK PERFORMANCE FOR UNMANNED SYSTEM PAYLOADS C4 Robot Platforms & Sensors Exposition.
Assessing the Civil GPS Spoofing Threat
GPS Denial – Causes and Solutions Neil Gerein. NovAtel Inc. Proprietary Moving, or gathering data, you need to know where you are 2.
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
GPS, GNSS, and Space Weather A Look Into the Future Paul Kintner and Brady O’Hanlon Cornell University Todd Humphreys UT-Austin
Security Vulnerability and Countermeasures of Frequency Offset Correction in a Systems Hanif Rahbari, Marwan Krunz, and Loukas Lazos Department of.
Jamming for good: a fresh approach to authentic communication in WSNs
Practical Cryptographic Civil GPS Signal Authentication
Counter-UAV Challenges: Is GNSS Spoofing Effective?
Information Theoretical Analysis of Digital Watermarking
Todd Humphreys | Aerospace Engineering
Presentation transcript:

Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September 23, 2010

Emerging Threat: Civil GPS Spoofing

Civil GPS Spoofing Testbed at UT Austin  Data bit latency defense  Phase trauma monitoring  Dual-frequency tracking SpooferDefender

Video Demonstration of Spoofing Attack (not embedded; see posted video)

Thoughts on the Way Forward for Civil GNSS Authentication  More signals means more inherent security, but probably insufficient  Some civil cryptographic authentication scheme is likely required  “Signal definition inertia is enormous” – Tom Stansell  Navigation message authentication (NMA) appears to be best, practical option (advocated by Logan Scott in 2003, others since)  Goal of cryptographic authentication: force adversary to use directional antennas in a replay attack  Preliminary evaluation of NMA for L2C suggests optimism, but strategy is not water-tight  Cryptography is the easy part

Hard Part: Defend Against Security Code Replay Attack >500 MHz FPGAs enable near-zero-delay replay attack Soft W-bit Estimation Hard W-bit Estimation

Effect on Target Receiver C/No Soft W-bit Estimation Hard W-bit Estimation

Spoofing Detection as a Hypothesis Testing Problem (Soft W Estimation) Spoofing detection depends critically on good estimates of nominal (C/No)s and (C/No)r

Final Observations  Must defend against following spoofing strategy: (1) soften up target with low-grade jamming, (2) begin soft- estimate replay attack, (3) transition to hard-estimate replay attack  A J/N meter is indispensable in spoofing detection to eliminate the possibility that the receiver’s estimate of its own nominal C/No (in the absence of spoofing) has been altered  Solar radio bursts, unintentional/intentional jamming will tend to trigger spoofing alarms  Spoofing detection is challenging for dynamic platforms because of the volatility in the nominal C/No