GPS Spoofing & Implications for Telecom Kyle Wesson The University of Texas at Austin Sprint Synchronization Conference | September 18, 2013.

Slides:



Advertisements
Similar presentations
International Civil Aviation Organization
Advertisements

Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.
GPS Theory and applications
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Protecting Civil GPS Receivers
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.
STRIDE Introduction Increasing use for PNT applications:  Positioning  Navigation  Timing.
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
Global Navigation Satellite Systems Research efforts in Luleå Staffan Backén, LTU Dr. Dennis M. Akos, LTU.
Workshop EGNOS KRAKÓW GNSS RECEIVER TESTING TECHNIQUES IN A LABORATORY ENVIRONMENT Institute of Radar Technology Military University of Technology.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
A SINGLE FREQUENCY GPS SOFTWARE RECEIVER
GPS and other GNSS signals GPS signals and receiver technology MM10 Darius Plausinaitis
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Absolute Receiver Autonomous Integrity Monitoring (ARAIM)
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
UAV Integration: Privacy and Security Hurdles Todd Humphreys | Aerospace Engineering The University of Texas at Austin Royal Institute of Navigation UAV.
1 Lecture 9: Diversity Chapter 7 – Equalization, Diversity, and Coding.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
EE 570: Location and Navigation: Theory & Practice The Global Positioning System (GPS) Thursday 11 April 2013 NMT EE 570: Location and Navigation: Theory.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard DHS visit to UT Radionavigation Lab 3/10/2011.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Modern Navigation Thomas Herring
Aviation Considerations for Multi-Constellation GNSS Leo Eldredge, GNSS Group Federal Aviation Administration (FAA) December 2008 Federal Aviation Administration.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
How Global Positioning Devices (GPS) work
For 3-G Systems Tara Larzelere EE 497A Semester Project.
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
SVY 207: Lecture 4 GPS Description and Signal Structure
1 SMART ANTENNAS FOR WIRELESS COMMUNICATIONS JACK H. WINTERS AT&T Labs - Research Red Bank, NJ September 9, 1999.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
10/7/ Innovative Solutions International Satellite Navigation Division ION NTM 01 Capabilities of the WAAS and EGNOS For Time Transfer SBAS, an Alternate.
GPS: Global Positioning System  The Geographer’s best friend!  You can say with confidence… “I’m not lost!, I’m never lost!”* *Of course, where everybody.
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks D. P. Shepard, J. A. Bhatti, T. E. Humphreys, The University of Texas at.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Riding out the Rough Spots: Scintillation-Robust GNSS Carrier Tracking Dr. Todd E. Humphreys Radionavigation Laboratory University of Texas at Austin.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
West Hills College Farm of the Future. West Hills College Farm of the Future GLONASS Russia’s global satellite navigation system 24 satellites in three.
By Andrew Y.T. Kudowor, Ph.D. Lecture Presented at San Jacinto College.
CRGIS Global Positioning Systems The Basics CRGIS National Park Service.
GPS: Everything you wanted to know, but were afraid to ask Andria Bilich National Geodetic Survey.
Characterization of Receiver Response to a Spoofing Attack
Global Positioning System Overview
Azam Supervisor : Prof. Raj Jain
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
EE 495 Modern Navigation Systems
Future Directions in GNSS Research Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | November 15, 2012.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
MDO4000C Series vs. Regular Scope FFTs Competitive Fact Sheet Benefits: ~20dB better dynamic range than a scope FFT RF support.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard Honors Thesis Symposium 4/21/2011.
Geoencryption Using Loran Di Qiu, Sherman Lo, Per Enge Stanford University Sponsored by FAA Loran Program.
Assessing the Civil GPS Spoofing Threat
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
The Global Positioning System
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
EE 495 Modern Navigation Systems
Agenda Item 6 GNSS Development Status and Future Work Eric Chatre, EC/ESA Rapporteur Technical WG, GNSS Panel Thank you… Good morning… I am ... and.
Practical Cryptographic Civil GPS Signal Authentication
Counter-UAV Challenges: Is GNSS Spoofing Effective?
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
GNSS Vulnerabilities Mitigation for Timing Applications
Todd Humphreys | Aerospace Engineering
International Civil Aviation Organization
Presentation transcript:

GPS Spoofing & Implications for Telecom Kyle Wesson The University of Texas at Austin Sprint Synchronization Conference | September 18, 2013

Talk Overview Civil GPS Spoofing Vulnerability Anti-Spoofing Techniques – Cryptographic: Navigation Message Authentication – Non-Cryptographic: “Sandwich” Defense Securing and Testing 2

Civil GPS is Vulnerable to Spoofing An open GPS standard makes GPS popular but also vulnerable to spoofing 3 [HumLed&08]

University of Texas Spoofing Testbed 4

Inside a Spoofing Attack 5

Civil GPS Spoofing A discrete spoofing attack typically involves four phases: 1)Alignment of the authentic and spoofed GPS signals at the target receiver 2)Increase the power of the spoofed signals above the authentic 3)Move the spoofed signals slowly away from the authentic signals 4)Once the spoofed and authentic signals no longer interfere, the spoofer has complete control of the target receiver’s PVT solution Spoofer-imposed dynamics are limited only by the bandwidth of the target receiver’s tracking loops and it’s quality indicators No receiver we’ve tested has ever successfully defended against this type of attack 6 D.P. Shepard and T.E. Humphreys, “Characterization of Receiver Response to Spoofing Attacks,” Proceedings of ION GNSS, Portland, Oregon, 2011.

Internet or LAN Receive AntennaExternal Reference Clock Control Computer GPS Spoofer UAV coordinates from tracking system Transmit Antenna Spoofed Signals as a “Virtual Tractor Beam” Target UAV Spoofing a UAV (2012) 7

Surprises (1/2) Receiver Autonomous Integrity Monitoring (RAIM) was helpful for spoofing: we couldn’t spoof all signals seen by unmanned aerial vehicle (UAV) due to our reference antenna placement, but the Hornet Mini’s uBlox receiver rejected observables from authentic signals, presumably via RAIM Overwhelming power is required for clean capture: A gradual takeover leads to large ( m) multipath- type errors as the authentic and counterfeit signals interact The UAV’s heavy reliance on altimeter for vertical position was easily overcome by a large vertical GPS velocity 8

Surprises (2/2) Not possible even to station keep with a captured UAV based on visual position estimates: GPS capture breaks flight controller’s feedback loop; now spoofer must play the role formerly assumed by GPS. Implication: An accurate radar or LIDAR system would be required for fine “control” of UAV via spoofing Compensating for all system and geometric delays to achieve meter-level alignment is challenging but quite possible 9

Spoofing a Super Yacht (2013) 10

Telecom Network Vulnerabilities 11 In 35 minutes, spoofer can shift time 10 μs, which would disrupt CDMA2000 call hand-off Standard Timing (Air) Frequency (Transport / Air) CDMA2000± 3 – 10 µs± 16 ppb / ± 50 ppb GSM–± 16 ppb / ± 50 ppb LTE (FDD)–± 16 ppb / ± 50 ppb LTE (TDD)± 1.5 µs± 16 ppb / ± 50 ppb TD-SCDMA± 1.5 µs± 16 ppb / ± 50 ppb

Misconceptions about Timing Security (1/2) “Holdover” capability of GPS-disciplined oscillator (GPSDO) protects against spoofing – Holdover will not be triggered by a sophisticated spoofing attack The reference oscillator’s drift rate is the upper limit of speed at which a GPSDO can be spoofed (e.g., 1 us per day) – Drift rate only matters if GPSDO is configured to alarm on a mismatch between GPS rate and internal clock rate – Even then, spoofer can push GPS timing at about 5x the calibrated clock drift rate because of need to keep false alarm rate low 12

Misconceptions about Timing Security (2/2) Timing errors only become a problem at the level of seconds, or maybe milliseconds. – Microseconds matter in comm, finance, and energy sectors Cross-checking against an atomic clock affords foolproof timing security – Rubidium clock with stability of can be pushed off by about 100 ns per day PTP/NTP are a potential solution to GPS spoofing problem – These are getting better, but, due to network asymmetry, they still not accurate enough for most demanding applications non-dedicated networks 13

Recommendations Require navigation systems for UAVs above 18 lbs to be certified “spoof-resistant” Require navigation and timing systems in critical infrastructure to be certified “spoof- resistant” “Spoof resistant” defined by ability to withstand or detect civil GPS spoofing in a battery of tests performed in a spoofing testbed (e.g., Texas Spoofing Battery) 14 Humphreys’ testimony to House Committee on Homeland Security, July 19, 2012

ANTI-SPOOFING 15

Spoofing Defenses Cryptographic Non-Cryptographic Stand-Alone Networked J/N Sensing (Ward, Scott, Calgary) SSSC or NMA on WAAS (Scott, UT) Single-Antenna Spatial Correlation (Cornell, Calgary) SSSC on L1C (Scott) Correlation Anomaly Defense (TENCAP, Ledvina, Torino, UT) Sensor Diversity Defense (DARPA, BAE, UT) NMA on L2C, L5, or L1C (MITRE, Scott, UT) P(Y) Cross-Correlation (Stanford, Cornell) Multi-Element Antenna Defense (Keys, Montgomery, DLR, Stanford) 16

CRYPTOGRAPHIC ANTI-SPOOFING Anti-Spoofing 17

Security-Enhanced GPS Signal Model Security code : – Generalization of binary modulating sequence – Either fully encrypted or contains periodic authentication codes – Unpredictable prior to broadcast 18

Attacking Security-Enhanced GPS Signals 1.Record and Playback (Meaconing): record and re-broadcast RF spectrum 2.Security Code Estimation and Replay (SCER) Attack: estimate security code on-the-fly without additional noise 19 re-broadcast with delay and amplitude security code estimate

How to authenticate a GPS signal? 20 [WesRot&12] Code Origin Authentication Code Timing Authentication Metrics Standard Receiver

Declaring a Signal Authentic From time of verifiable non-spoofing event: 1.Logical remained low 2.Logical remained low 3. remains above acceptable threshold 21

Embedding the Signature Civil Navigation (CNAV) Message – Flexible & extensible Packet-like structure: – 300 bits in 12 sec – Message Type ID field can identify up to 64 messages of which only 15 are defined 22

NON-CRYPTOGRAPHIC ANTI-SPOOFING Anti-Spoofing 23

Spoofing Requirement and Difficulty Q: What is a requirement of a successful spoofing attack? A: Spoofed signal power greater than authentic signal power Q: What is a difficulty of a successful spoofing attack? A: Suppressing authentic signals while remaining below J/N sensor detector 24

“Sandwich” Defense Constrain spoofer between 1.total in-band received power detector & 2.cross-correlation function distortion monitor Features – Use multiple correlator taps (RAKE-like) – Check multipath signatures across channels – Real-time, software defense 25

Spoofed Signal Distortions 26

Clean vs. Spoofed Scenarios Nominal Power and Minimal Distortions Additional Power and Large Distortions 27

SECURING AND TESTING So what is there to do? 28

Options for Secure ns-Accurate Timing (1/2) Obtain required permissions to purchase SAASM- equipped GPSDO – Lots of paperwork, special handling – Expensive – Fairly secure against spoofing – Not secure against replay attack Wait for GPS Directorate to insert digital signatures into modernized GPS signals – They’re making progress! (The University of Texas is helping.) – Not so strong as SAASM for timing security, but quite effective – Eventually inexpensive, but will require new GPSRO 29

Options for Secure ns-Accurate Timing (2/2) Cross-check GPS timing against redundant high-quality (e.g., atomic) clocks – Self-contained – Expensive – Absolutely secure to within about 5x the drift rate of ensemble “All Signals” Approach: Develop a GPSDO that pulls in signals from GPS + Glonass + Galileo and rigorously cross-checks these – None on market yet (so far as I’m aware) – Potentially inexpensive: uBlox LEA-7 runs ~$50 – Spoofer’s job gets much harder with each new signal PTP/NTP over a dedicated network 30

The Texas Spoofing Test Battery (TEXBAT) 6 high-fidelity recordings of live spoofing attacks 20-MHz bandwidth 16-bit quantization Each recording ~7 min. long; ~40 GB Can be replayed into any GNSS receiver 31

The University of Texas Radionavigation Lab and National Instruments jointly offer the Texas Spoofing Test Battery Request: The Dynamic Matched-Power Position PushThe Dynamic Overpowered Time PushThe Static Matched-Power Position PushThe Static Matched-Power Time PushThe Static Overpowered Time PushThe Static Switch 32

Observations on Defenses Crypto defenses not a panacea: Ineffective against near-zero-delay meaconing (entire band record and playback) attacks. Non-crypto defenses not so elegant mathematically, but can be quite effective. Best shield: a coupled crypto-non-crypto defense. When implemented properly, navigation message authentication (NMA) authenticates not only the data message but also the underlying signal. It is surprisingly effective. 33

THANK YOU web: 34

Radionavigation 35 GPS GNSS Radionavigation Systems GPS GNSS Radionavigation Systems

GPS Errors & Accuracy Ephemeris errors in r i :2 m Transmitter clock errors:2 m Residual Ionospheric delay:4 m * Tropospheric delay:0.5 m Multipath (reflected signals):1 m # Receiver noise:0.5 m Multiplicative effect of geometry (GDOP) Typical accuracy: 10 m/axis, 30 nsec in time, 0.01 m/sec velocity * for single-frequency receiver w/model corrections, error > 15 m possible in unusual ionospheric conditions, low elevation # error > 15 m possible in strong multipath environments 36

37

Smart Grid Vulnerabilities Operational system in Mexico on the Chicoasen-Angostura transmission line – Automated PMU-based control – Connects large hydroelectric generators to large loads – Two 400-kV lines and a 115-kV line Large phase angle offsets (>10 ○ ) induced in minutes – Protects against generator instability during double fault by shutting down generators Spoofing attack can cause PMUs to violate IEEE C Standard 38 [SheHum&12]

Navigation signal authentication is hard. Nothing is foolproof. There are no guarantees. But simple measures can vastly decrease the probability of a successful attack. Probability is the language of anti- spoofing. Symmetric-key systems (e.g., SAASM) offer short time to authenticate but require key management and tamper-proof hardware: more costly, less convenient. SAASM and M-code will never be a solution for a wide swath of applications (e.g., civil aviation, low-cost location and time authentication). Observations on Defenses (1/3) 39

Asymmetric-key (public-private key) systems have an unavoidable delay (e.g., 40 seconds between authentication of any signal) but delay can be accepted in many applications; also, for non-complicit spoofing there is no need to tamper-proof the receiver: cheaper, more convenient. Proof of location (proving to you where I am) is emerging as a vital security feature. It’s not easy: non-crypto approaches require elaborate tamper proofing; crypto approaches require high-rate security code. Beware black-market vendors with high-gain antennas who will sell an authenticated location. Observations on Defenses (2/3) 40

Crypto defenses not a panacea: Ineffective against near-zero-delay meaconing (entire band record and playback) attacks. Non-crypto defenses not so elegant mathematically, but can be quite effective. Best shield: a coupled crypto-non-crypto defense. When implemented properly, navigation message authentication (NMA) authenticates not only the data message but also the underlying signal. It is surprisingly effective. Observations on Defenses (3/3) 41

TEXBAT Recording Setup 42

Scenario 2: Static Overpowered Time Push 43

GNSS Signal Processing Basics 44

GNSS Signal Processing Basics 45

GNSS Receiver Block Diagram 46