Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.

Slides:



Advertisements
Similar presentations
Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.
Advertisements

Digital FX Correlator Nimish Sane Center for Solar-Terrestrial Research New Jersey Institute of Technology, Newark, NJ EOVSA Technical Design Meeting.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Protecting Civil GPS Receivers
GPS Spoofing & Implications for Telecom Kyle Wesson The University of Texas at Austin Sprint Synchronization Conference | September 18, 2013.
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
STRIDE Introduction Increasing use for PNT applications:  Positioning  Navigation  Timing.
Imbedded SSR Mode-S Logic Control Unit University of Stellenbosch Department of Electrical & Electronic Engineering K. Gastrow 4 December 2009.
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
Volkan Cevher, Marco F. Duarte, and Richard G. Baraniuk European Signal Processing Conference 2008.
Distributed Systems Fall 2010 Time and synchronization.
Global Navigation Satellite Systems Research efforts in Luleå Staffan Backén, LTU Dr. Dennis M. Akos, LTU.
Workshop EGNOS KRAKÓW GNSS RECEIVER TESTING TECHNIQUES IN A LABORATORY ENVIRONMENT Institute of Radar Technology Military University of Technology.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
A SINGLE FREQUENCY GPS SOFTWARE RECEIVER
GPS and other GNSS signals GPS signals and receiver technology MM10 Darius Plausinaitis
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
UAV Integration: Privacy and Security Hurdles Todd Humphreys | Aerospace Engineering The University of Texas at Austin Royal Institute of Navigation UAV.
Autonomous Control of Scalextric Slot Car on User-Defined Track Siddharth Kamath Souma Mondal Dhaval Patel School of Electrical and Computer Engineering.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
EE 570: Location and Navigation: Theory & Practice The Global Positioning System (GPS) Thursday 11 April 2013 NMT EE 570: Location and Navigation: Theory.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard DHS visit to UT Radionavigation Lab 3/10/2011.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
WNCG, UT Austin, 1 April 2011 Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Civilian GPS Spoofing Detection based on.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
How Global Positioning Devices (GPS) work
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
SVY 207: Lecture 4 GPS Description and Signal Structure
Extending the Reach of GPS-assisted Femtocell Synchronization and Localization through Tightly- Coupled Opportunistic Navigation Ken Pesyna, Kyle Wesson,
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Improving the Security of GNSS Receivers Portland, Oregon | September 23, 2011.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
Imaging results from monostatic and bistatic radar observations of the Moon made at a wavelength of 68 cm (440.2 MHz) with the Millstone MISA radar transceiving.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Modern Navigation Thomas Herring MW 11:00-12:30 Room A
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks D. P. Shepard, J. A. Bhatti, T. E. Humphreys, The University of Texas at.
Network Computing Laboratory Radio Interferometric Geolocation Miklos Maroti, Peter Volgesi, Sebestyen Dora Branislav Kusy, Gyorgy Balogh, Andras Nadas.
1 UCR Hardware Security Primitives with focus on PUFs Slide credit: Srini Devedas and others.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Riding out the Rough Spots: Scintillation-Robust GNSS Carrier Tracking Dr. Todd E. Humphreys Radionavigation Laboratory University of Texas at Austin.
Location Estimation in Ad-Hoc Networks with Directional Antennas N. Malhotra M. Krasniewski C. Yang S. Bagchi W. Chappell 5th IEEE International Conference.
Possible Testing Solutions and Associated Costs
GPS: Everything you wanted to know, but were afraid to ask Andria Bilich National Geodetic Survey.
Characterization of Receiver Response to a Spoofing Attack
Lecture 25: Implementation Complicating factors Control design without a model Implementation of control algorithms ME 431, Lecture 25.
Tightly-Coupled Opportunistic Navigation for Deep Urban and Indoor Positioning Ken Pesyna, Zak Kassas, Jahshan Bhatti, and Todd Humphreys Presentation.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
EE 495 Modern Navigation Systems
Future Directions in GNSS Research Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | November 15, 2012.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard Honors Thesis Symposium 4/21/2011.
Geoencryption Using Loran Di Qiu, Sherman Lo, Per Enge Stanford University Sponsored by FAA Loran Program.
Assessing the Civil GPS Spoofing Threat
Network Layer Lecture Network Layer Design Issues.
Location-Sensing and Location Systems 1. A positioning system provides the means to determine location and leaves it to the user device to calculate its.
Physical Layer Authentication for Mobile Terminals over MIMO Fading Wiretap Channels. Mahendra Kumar Shukla(2011-DC-07) December.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
Teng Wei and Xinyu Zhang
EE 495 Modern Navigation Systems
Practical Cryptographic Civil GPS Signal Authentication
Counter-UAV Challenges: Is GNSS Spoofing Effective?
Distributed Sensing, Control, and Uncertainty
Performance requirements update
Todd Humphreys | Aerospace Engineering
Presentation transcript:

Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012

University of Texas Radionavigation Lab graduate students Jahshan Bhatti, Kyle Wesson, Ken Pesyna, Zak Kassas, and Daniel Shepard Mark Psiaki, Brady O’Hanlon, Ryan Mitch (Cornell) Acknowledgements

GPS Jammers

University of Texas Emitter-Localization Network (Coherent Navigation and University of Texas) Fixed EMLOC Sensor Mobile EMLOC Sensor CSR ARL MBL

GPS Spoofer

University of Texas Spoofing Testbed

Internet or LAN Receive AntennaExternal Reference Clock Control Computer GPS Spoofer UAV coordinates from tracking system Transmit Antenna Spoofed Signals as a “Virtual Tractor Beam” Target UAV Commandeering a UAV via GPS Spoofing

UAV Video

RAIM was helpful for spoofing: we couldn’t spoof all signals seen by UAV due to our reference antenna placement, but the Hornet Mini’s uBlox receiver rejected observables from authentic signals, presumably via RAIM. Overwhelming power is required for clean capture: A matched-power takeover leads to large ( m) multipath-type errors as the authentic and counterfeit signals interact. The UAV’s heavy reliance on altimeter for vertical position was easily overcome by a large vertical GPS velocity. Observations (1/2)

GPS capture breaks flight controller’s feedback loop; now spoofer must play the role formerly assumed by GPS. Implication: Fine control of UAV requires accurate radar or LIDAR UAV tracking system. Seamless capture (no code or carrier phase unlock) requires target position knowledge to within ~50 m and velocity knowledge better than ~2 m/s. This is quite challenging for small UAV targets at long stand- off ranges (e.g., several km). Compensating for all system and geometric delays to achieve meter-level alignment is challenging but quite possible. Observations (2/2)

Require navigation systems for UAVs above 18 lbs to be certified “spoof-resistant” Require navigation and timing systems in critical infrastructure to be certified “spoof- resistant” “Spoof resistant” defined by ability to withstand or detect civil GPS spoofing in a battery of tests performed in a spoofing testbed (e.g., TEXBAT) Recommendations From testimony to House Committee on Homeland Security, July 19, 2012

Spoofing Defenses Cryptographic Non-Cryptographic Stand-Alone Networked J/N Sensing (Ward, Scott, Calgary) SSSC or NMA on WAAS (Scott, UT) Single-Antenna Spatial Correlation (Cornell, Calgary) SSSC on L1C (Scott) Correlation Anomaly Defense (TENCAP, Ledvina, Torino, UT) Sensor Diversity Defense (DARPA, BAE, UT) NMA on L2C, L5, or L1C (MITRE, Scott, UT) P(Y) Cross-Correlation (Stanford, Cornell) Multi-Element Antenna Defense (Keys, Montgomery, DLR, Stanford)

Navigation signal authentication is hard. Nothing is foolproof. There are no guarantees. But simple measures can vastly decrease the probability of a successful attack. Probability is the language of anti- spoofing. Symmetric-key systems (e.g., SAASM) offer short time to authenticate but require key management and tamper-proof hardware: more costly, less convenient. SAASM and M-code will never be a solution for a wide swath of applications (e.g., civil aviation, low-cost location and time authentication). Observations on Defenses (1/3)

Asymmetric-key (public-private key) systems have an unavoidable delay (e.g., 40 seconds between authentication of any signal) but delay can be accepted in many applications; also, for non-complicit spoofing there is no need to tamper-proof the receiver: cheaper, more convenient. Proof of location (proving to you where I am) is emerging as a vital security feature. It’s not easy: non-crypto approaches require elaborate tamper proofing; crypto approaches require high-rate security code. Beware black-market vendors with high-gain antennas who will sell an authenticated location. Observations on Defenses (2/3)

Crypto defenses not a panacea: Ineffective against near-zero-delay replay (entire band record and playback) attacks. Non-crypto defenses not so elegant mathematically, but can be quite effective. Observations on Defenses (3/3)

Cornell Moving-Antenna Spoofing Detection Range & direction of 1-D antenna phase center articulation motion Cantilevered beam String to initiate damped oscillations Cantilevered beam base attachment point Articulating GPS patch antenna Non-spoofed carrier-phase oscillation diversity Spoofed carrier-phase oscillation uniformity Antenna oscillation induces carrier-phase oscillation Successful spoofing detection hypothesis test at WSMR Reliable detection achievable with 1/4-wave oscillations (< 5 cm p-p)  Not spoofedSpoofed  Detection statistic for an actual spoofing attack

Crypto defenses not a panacea: Ineffective against near-zero-delay meaconing (entire band record and playback) attacks. Non-crypto defenses not so elegant mathematically, but can be quite effective. Best shield: a coupled crypto-non-crypto defense. When implemented properly, navigation message authentication (NMA) authenticates not only the data message but also the underlying signal. It is surprisingly effective. Observations on Defenses (3/3)

Enemy of NMA: Security Code Estimation and Replay Inside the Spoofer: Security Code Chip Estimation Inside the Defender: Detection Statistic Based on Specialized Correlations

NMA-Based Signal Authentication: Receiver Perspective Code Origin Authentication Code Timing Authentication Wesson, K., Rothlisberger, M., and Humphreys, T. E., “Practical Cryptographic Civil GPS Signal Authentication,” NAVIGATION: The Journal of the Institute of Navigation, fall 2012.

Security Code Estimation and Replay Detection: Live Signal Demonstration Humphreys, T. E., “Detection Strategy for Cryptographic GNSS Anti-Spoofing,” IEEE Transactions on Aerospace and Electronic Systems, to be published.

Operational Definition of GNSS Signal Authentication GNSS signal is declared authentic if in the time elapsed since some trusted initialization event: 1.the logical output S has remained low, and 2.the logical output H 1 has remained low, and 3.the output P D has remained above an acceptable threshold

Key Ingredients for Developing and Evaluating GNSS Signal Authentication Techniques: 1.Visibility 2.Testability

The Texas Spoofing Test Battery (TEXBAT) 6 high-fidelity recordings of live spoofing attacks 20-MHz bandwidth 16-bit quantization Each recording ~7 min. long; ~40 GB Can be replayed into any GNSS receiver

TEXBAT Recording Setup

Scenario 2: Static Overpowered Time Push

The University of Texas Radionavigation Lab and National Instruments jointly offer the Texas Spoofing Test Battery Request: The Dynamic Matched-Power Position PushThe Dynamic Overpowered Time PushThe Static Matched-Power Position PushThe Static Matched-Power Time PushThe Static Overpowered Time PushThe Static Switch

radionavlab.ae.utexas.edu