Characterization of Receiver Response to a Spoofing Attack Daniel Shepard Honors Thesis Symposium 4/21/2011.

Slides:



Advertisements
Similar presentations
It is very difficult to measure the small change in volume of the mercury. If the mercury had the shape of a sphere, the change in diameter would be very.
Advertisements

Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented.
STRIDE Introduction Increasing use for PNT applications:  Positioning  Navigation  Timing.
Learning Objectives Static and Dynamic Characteristics of Signals
ADCP Compass Calibrations
The facts about GPS/GSM Jamming. Jamming and Stolen Vehicle Recovery Any radio based system is susceptible to attack through jamming but GPS and GSM are.
4.2 Digital Transmission Pulse Modulation (Part 2.1)
Details for Today: DATE:3 rd February 2005 BY:Mark Cresswell FOLLOWED BY:Assignment 2 briefing Evaluation of Model Performance 69EG3137 – Impacts & Models.
Spectrum analyser basics Spectrum analyser basics 1.
2/23/ R. Munden - Fairfield University.  Define angle modulation and describe the two categories  Explain a basic capacitor microphone FM generator.
1 Stochastic Event Capture Using Mobile Sensors Subject to a Quality Metric Nabhendra Bisnik, Alhussein A. Abouzeid, and Volkan Isler Rensselaer Polytechnic.
An “optimal” controller in Soft Walls is one which always pushes away from the no-fly zone. To blend the control in gradually, we would like to increase.
1 Energy-Efficient localization for networks of underwater drifters Diba Mirza Curt Schurgers Department of Electrical and Computer Engineering.
PERFORMANCE OF THE DELPHI REFRACTOMETER IN MONITORING THE RICH RADIATORS A. Filippas 1, E. Fokitis 1, S. Maltezos 1, K. Patrinos 1, and M. Davenport 2.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
Characterization of Receiver Response to a Spoofing Attack Daniel Shepard DHS visit to UT Radionavigation Lab 3/10/2011.
Ch 3.9: Forced Vibrations We continue the discussion of the last section, and now consider the presence of a periodic external force:
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Chapter 3: Sound Wave Intensity of Periodic Sound Waves
Lens ALens B Avg. Angular Resolution Best Angular Resolution (deg) Worst Angular Resolution (deg) Image Surface Area (mm 2 )
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
October, 2002 Infrasonic Signal Detection Using The Hough Transform D. J. Brown, B.L.N. Kennett, C. Tarlowski Research School of Earth Sciences, Australian.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Synchrophasor: Implementation,Testing & Operational Experience
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
Namaste Project 3.4 GHz Interference Study Preliminary document - Work in Progress updated The intent of this study is to collect data which may.
Cascade and Ratio Control
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks D. P. Shepard, J. A. Bhatti, T. E. Humphreys, The University of Texas at.
SMART SENSORS FOR A SMARTER GRID BY KAILASH.K AND LAKSHMI NARAYAN.N.
Event Management & ITIL V3
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Riding out the Rough Spots: Scintillation-Robust GNSS Carrier Tracking Dr. Todd E. Humphreys Radionavigation Laboratory University of Texas at Austin.
10. Satellite Communication & Radar Sensors
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William Arbaugh (UCLA, IBM, U. Maryland) MobiHoc 2005 Toward Resilient Security in Wireless Sensor Networks.
Prison Solutions: RF Jamming Active & Reactive RF Jamming to combat Contraband Cellular Phones in Prisons and Government Facilities.
Chapter 17 Sound Waves: part two HW 2 (problems): 17.22, 17.35, 17.48, 17.58, 17.64, 34.4, 34.7, Due Friday, Sept. 11.
J1879 Robustness Validation Hand Book A Joint SAE, ZVEI, JSAE, AEC Automotive Electronics Robustness Validation Plan The current qualification and verification.
ISU Science Center : Phase 3 : Dec Speedometer Station This station matches two areas of study into one cohesive system. Current will be induced.
11/25/2015 Wireless Sensor Networks COE 499 Localization Tarek Sheltami KFUPM CCSE COE 1.
Characterization of Receiver Response to a Spoofing Attack
Electromagnetic spectrum
AM RECEPTION Introduction
Minimum Risk Manoeuvres (MRM)
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
Some quick news about X-Box1 data processing for BD location.
Detection, Classification and Tracking in Distributed Sensor Networks D. Li, K. Wong, Y. Hu and A. M. Sayeed Dept. of Electrical & Computer Engineering.
Chapter 5 Electromagnetic Waves. 1. Introduction: Maxwell’s equations  Electricity and magnetism were originally thought to be unrelated  in 1865, James.
Jan Low Energy 10 Hz Operation in DRFS (Fukuda) (Fukuda) 1 Low Energy 10Hz Operation in DRFS S. Fukuda KEK.
11. FM Receiver Circuits. FM Reception RF Amplifiers Limiters
Assessing the Civil GPS Spoofing Threat
Secure positioning in Wireless Networks Srdjan Capkun, Jean-Pierre Hubaux IEEE Journal on Selected area in Communication Jeon, Seung.
High precision phase monitoring Alexandra Andersson, CERN Jonathan Sladen, CERN This work is supported by the Commission of the European Communities under.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Chapter 19 Alternating Current Circuits and Electromagnetic Waves.
The Working Theory of an RC Coupled Amplifier in Electronics.
FUNCTION GENERATOR.
ESS Timing System Plans Timo Korhonen Chief Engineer, Integrated Control System Division Nov.27, 2014.
BNL-SLAC-Annecy TeleConference
Classical blocking test (e.g. EN )
Microsemi Corporation
Counter-UAV Challenges: Is GNSS Spoofing Effective?
Packaging Dynamics Lecture 5: Fatigue, Test Acceleration and Product Fragility presented by David Shires Editor-in-Chief, Packaging Technology & Science.
Accelerator Physics G. A. Krafft, A. Bogacz, and H. Sayed
Sound, Decibels, Doppler Effect
Presentation transcript:

Characterization of Receiver Response to a Spoofing Attack Daniel Shepard Honors Thesis Symposium 4/21/2011

What is Civil GPS Spoofing?  The structure of the civil GPS signal is well known, and the signal can be readily reproduced  A spoofer seeks to alter a target receiver’s Position-Velocity-Time (PVT) solution by transmitting fictitious GPS signals  A typical spoofing attack involves: 1) alignment, 2) increase power, 3) carry receiver off

GPS Dependency Begets Vulnerability Banking and Finance Communications Energy Transportation From Dane Egli, IDA

Research Questions to Assess Critical Infrastructure Vulnerability  How aggressively can receiver dynamics be manipulated by a spoofing attack?  Would a jamming-power-to-noise-power (J/N) type jamming detector trigger on a spoofing attack?

Would a J/N-type jamming detector trigger on a spoofing attack?  Power ratio (η): Ratio of spoofing signal power to authentic signal power  A power ratio above 3 would cause input power to exceed 95% of natural variation  J/N-type jamming detector would trigger  What power ratio is required for reliable spoofing? P spoof P auth

How Aggressively can Receivers be Manipulated?  We would like to know:  How quickly could a timing or position bias be introduced?  Critical infrastructure reliant on GPS often requires certain accuracy in position/time  What kinds of oscillations could a spoofer cause in a receiver’s position and timing?  Spurious synchrophasor oscillations as low as 0.1 Hz could damage power grid  How different are receiver responses to spoofing?  One defense strategy: choose receivers that are difficult to manipulate v t a  Approach: Determine velocity at which a receiver can be spoofed over a range of accelerations

How Aggressively can Receivers be Manipulated? (cont.)  These are some potential shapes for the acceleration-velocity curves  Green: represents the region where a spoofer can operate without being detected  Red represents the region where a spoofer might be unsuccessful

Tested Receivers 1. Science receiver: CASES receiver developed by UT Radionavigation Lab in collaboration with Cornell University and ASTRA. 2. Telecommunications Network Time Reference Receiver: HP 58503B, commonly used in cell phone base stations. Has a high quality Ovenized Crystal Oscillator (OCXO) steered by the GPS time solution.

Tested Receivers (cont.) 3. Power Grid Time Reference Receiver: SEL-2401, provides time signal for power grid Synchrophasor Measurement Units (SMUs). Has low quality Temperature Controlled Oscillator (TCXO) slaved to the GPS time solution. 4. Name brand receiver: Trimble Juno SB.

Procedure  Power Ratio  Spoofed Velocity and Acceleration 1. Power Adv. = x dB 2. Attempt Carry- off 3. Check for Success (Remove Authentic Signal) 4. Measure the Power 1 m/s SV1512 C/N Acceleration = a m/s 2 2. Velocity = v m/s3. Check for Success (watch for alarms) 4. Iterate until a maximum velocity is found v max found? v t a no yes

Results: Power Ratio  These tests showed that a power ratio of about 1.1 is all that is needed to capture a target receiver with at least 95% confidence  This increase in absolute power received by the target receiver’s front-end is well below the natural variations due to solar activity Implications: 1. A spoofing attack would easily evade detection by a J/N sensor at the RF signal conditioning stage: J/N sensors are necessary, but not sufficient 2. Downstream signal processing is crucial for reliable spoofing detection

Results: Spoofed Velocity and Acceleration  The data points collected for each receiver were fit to an exponential curve of the form:  This curve fit defines the upper bound of a region of the acceleration-velocity plane where a sophisticated spoofer can successfully spoof that particular receiver  These curves can be used to assess the security implications of a spoofing attack

Results: Spoofed Velocity and Acceleration of Science Receiver  Notice the asymptote at 5 m/s 2 acceleration  The maximum speed is only limited by the doppler range of the correlators to around 1300 m/s (4.3 μs/s) Implications: 1. Acceleration limited to 2 m/s 2 due to phase trauma 2. No limitation on velocity up until the receiver is unable to track the signal

 Due to this receiver placing trust in the frequency stability of its oscillator, it cannot be moved very quickly  Maximum achievable speed in time is 2 m/s Results: Spoofed Velocity and Acceleration for Telecommunications Network Time Reference Receiver Implications: 1. Can still be carried 10 μs off in time in around 35 min, which would cause cell network throughput to degrade

 Can be easily manipulated by the spoofer  Corresponding induced phase angle rate is shown for a 60 Hz phasor Results: Spoofed Velocity and Acceleration for Power Grid Time Reference Receiver Implications 1. Can reach a maximum speed of 400 m/s resulting in a phase angle rate of 1.73 o /min 2. Oscillations of even 0.1 Hz are not possible due to the low accelerations

 Most easily manipulated receiver tested to date  Can be accelerated continuously at about 25 m/s 2 until the doppler limit of the correlators is reach at a velocity of about 1300 m/s Results: Spoofed Velocity and Acceleration for Name Brand Receiver Implications 1. Large accelerations and velocities may be possible in many name brand receivers

Summary of Findings  We’ve never met a civil receiver we couldn’t spoof  J/N-type jamming detector won’t catch a spoofer  Large, quick changes in position and timing seem to be impossible, but smooth, slow changes can be quite effective and slowly accelerate to a large velocity in some receivers  It is difficult to cause oscillations in position and timing due to low acceleration capability of the spoofer  Areas of vulnerability exist in CDMA cell phone networks and the power grid