Quickest Detection of GPS Spoofing Attack Z. Zhang, M. Trinkle, L. Qian, and H. Li MILCOM 2012 Nadia Adem 10/27/2014.

Slides:



Advertisements
Similar presentations
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 A framework for.
Advertisements

Detection Chia-Hsin Cheng. Wireless Access Tech. Lab. CCU Wireless Access Tech. Lab. 2 Outlines Detection Theory Simple Binary Hypothesis Tests Bayes.
Detection Theory Chapter 12 Model Change Detection Xiang Gao January 18, 2011.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Lecture XXIII.  In general there are two kinds of hypotheses: one concerns the form of the probability distribution (i.e. is the random variable normally.
Learning Algorithm Evaluation
10 / 31 Outline Perception workshop groups Signal detection theory Scheduling meetings.
CHAPTER 21 Inferential Statistical Analysis. Understanding probability The idea of probability is central to inferential statistics. It means the chance.
Selectivity, Sensitivity, Signal to Noise, Detection Limit
Chap 9: Testing Hypotheses & Assessing Goodness of Fit Section 9.1: INTRODUCTION In section 8.2, we fitted a Poisson dist’n to counts. This chapter will.
Quickest Detection and Its Allications Zhu Han Department of Electrical and Computer Engineering University of Houston, Houston, TX, USA.
ROC Statistics for the Lazy Machine Learner in All of Us Bradley Malin Lecture for COS Lab School of Computer Science Carnegie Mellon University 9/22/2005.
1 Mobility-assisted Spatiotemporal Detection in Wireless Sensor Networks Guoliang Xing 1 ; JianpingWang 1 ; Ke Shen 3 ; Qingfeng Huang 2 ; Xiaohua Jia.
Multi-criteria Design of X-bar control chart Zhaojun (Steven) Li IND E 516 Homework 1.
Sequential analysis: balancing the tradeoff between detection accuracy and detection delay XuanLong Nguyen Radlab, 11/06/06.
© sebastian thrun, CMU, The KDD Lab Intro: Outcome Analysis Sebastian Thrun Carnegie Mellon University
Statistical Decision Theory, Bayes Classifier
Location Estimation in Sensor Networks Moshe Mishali.
© Vipin Kumar CSci 8980 Fall CSci 8980: Data Mining (Fall 2002) Vipin Kumar Army High Performance Computing Research Center Department of Computer.
Introduction to Signal Detection
Contraband Detection and Retesting. The Inspection Problem A sensor is a device used to attempt to determine some truth about an object; we will assume.
Performance Analysis of Energy Detector in Relay Based Cognitive Radio Networks Saman Atapattu Chintha Tellambura Hai Jiang.
LAD: Location Anomaly Detection for Wireless Sensor Networks Wenliang (Kevin) Du (Syracuse Univ.) Lei Fang (Syracuse Univ.) Peng Ning (North Carolina State.
E&CE 418: Tutorial-6 Instructor: Prof. Xuemin (Sherman) Shen
Fast and Robust Worm Detection Algorithm Tian Bu Aiyou Chen Scott Vander Wiel Thomas Woo bearhsu.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
Multiantenna-Assisted Spectrum Sensing for Cognitive Radio
Data Selection In Ad-Hoc Wireless Sensor Networks Olawoye Oyeyele 11/24/2003.
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
Hypothesis Testing.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
Information Quality Aware Routing in Event-Driven Sensor Networks Hwee-Xian TAN 1, Mun Choon CHAN 1, Wendong XIAO 2, Peng-Yong KONG 2 and Chen-Khong THAM.
Sequential Detection Overview & Open Problems George V. Moustakides, University of Patras, GREECE.
Link Reconstruction from Partial Information Gong Xiaofeng, Li Kun & C. H. Lai
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
POWER CONTROL IN COGNITIVE RADIO SYSTEMS BASED ON SPECTRUM SENSING SIDE INFORMATION Karama Hamdi, Wei Zhang, and Khaled Ben Letaief The Hong Kong University.
Performance of Energy Detection: A Complementary AUC Approach
REVISED CONTEXTUAL LRT FOR VOICE ACTIVITY DETECTION Javier Ram’ırez, Jos’e C. Segura and J.M. G’orriz Dept. of Signal Theory Networking and Communications.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Gregory Gurevich and Albert Vexler The Department of Industrial Engineering and Management, SCE- Shamoon College of Engineering, Beer-Sheva 84100, Israel.
Baseband Demodulation/Detection
Lecture notes for Stat 231: Pattern Recognition and Machine Learning 3. Bayes Decision Theory: Part II. Prof. A.L. Yuille Stat 231. Fall 2004.
School of Biomedical Engineering, Science and Health Systems APPLICATION OF WAVELET BASED FUSION TECHNIQUES TO PHYSIOLOGICAL MONITORING Han C. Ryoo, Leonid.
Detection, Classification and Tracking in a Distributed Wireless Sensor Network Presenter: Hui Cao.
4th Annual INFORMS Revenue Management and Pricing Section Conference, June 2004 An Asymptotically-Optimal Dynamic Admission Policy for a Revenue Management.
On optimal quantization rules for some sequential decision problems by X. Nguyen, M. Wainwright & M. Jordan Discussion led by Qi An ECE, Duke University.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
1 Statistics and Image Quality Evaluation III Oleh Tretiak Medical Imaging Systems Fall, 2002.
Bayesian Decision Theory Basic Concepts Discriminant Functions The Normal Density ROC Curves.
L. Xiao, L. Greenstein, N. Mandayam, W. Trappe WINLAB, Dept. ECE, Rutgers University CISS 2008 This work is supported in part.
Spectrum Sensing In Cognitive Radio Networks
EE 551/451, Fall, 2006 Communication Systems Zhu Han Department of Electrical and Computer Engineering Class 15 Oct. 10 th, 2006.
Chapter 7 Statistical Issues in Research Planning and Evaluation.
Chapter ?? 7 Statistical Issues in Research Planning and Evaluation C H A P T E R.
Ashish Rauniyar, Soo Young Shin IT Convergence Engineering
Jane W. S. Liu Institute of Information Science, Academia Sinica Fusion of Human Sensor Data and Physical Sensor Data.
Lecture 1.31 Criteria for optimal reception of radio signals.
Detection theory 1. Definition of the problematic
MobiCom’13 Jie Xiong and Kyle Jamieson University College London
Phd Proposal Investigation of Primary User Emulation Attack in Cognitive Radio Networks Chao Chen Department of Electrical & Computer Engineering Stevens.
Optimal Learning in the Laboratory Sciences
LECTURE 05: THRESHOLD DECODING
Probabilistic forecasts
LECTURE 05: THRESHOLD DECODING
Boosting Signal-to-Noise in Complex Biology: Prior Knowledge Is Power
Roc curves By Vittoria Cozza, matr
Information Theoretical Analysis of Digital Watermarking
Optimization under Uncertainty
Presentation transcript:

Quickest Detection of GPS Spoofing Attack Z. Zhang, M. Trinkle, L. Qian, and H. Li MILCOM 2012 Nadia Adem 10/27/2014

Global Positioning System

GPS spoofing attacks

GPS Spoofing

Detecting GPS Spoofer

Outline  Contributions  Anti-spoofing system  Experiment setup  Problem formulation  Detection techniques  Performance evaluation  Summary

Contributions  Simple hardware installation  Probabilistic-based detection

Anti-spoofing System

Experiment Setup Photo of the lab. and devices Lab. setup diagram

Probabilistic Detection  Samples of signal to noise power ratios - the two antennas  Distribution of standard deviation of the difference

Experiment Result Estimated PDF

Problem Formulation and Constraints  Minimize worst case delay  False alarm below a certain threshold

Hypothesis Testing  Let the signal be y(t), model be h(t) Hypothesis testing: H0: y(t) = n(t) (no signal) H1: y(t) = h(t) + n(t) (signal)  The optimal decision is given by the Likelihood ratio test (Nieman-Pearson Theorem), g is a threshold. Select H1 if L(y) = log(P(y|H1)/P(y|H0)) > g; otherwise select H0.

Signal detection paradigm

Receiver operating characteristic (ROC) curve Tradeoff between false alarm and detection probability

Cusum test (Page, 1966) gngn b Stopping time N This test minimizes the worst-average detection delay (in an asymptotic sense)

Performance Evaluation

My Comments  Probabilistic knowledge about attacker  Space Diversity

Summary  GPS spoofing threat  Proposed anti-sp0oing system  Detection schemes  Effectiveness of the proposed schem