Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.

Slides:



Advertisements
Similar presentations
Spread Spectrum Chapter 7. Spread Spectrum Input is fed into a channel encoder Produces analog signal with narrow bandwidth Signal is further modulated.
Advertisements

1 Security in Wireless Protocols Bluetooth, , ZigBee.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.
Sri Lanka Institute of Information Technology
STRIDE Introduction Increasing use for PNT applications:  Positioning  Navigation  Timing.
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
National Space-Based Positioning, Navigation, and Timing (PNT) Federal Advisory Board DHS Challenges & Opportunities Captain Curtis Dubay, P.E. Department.
Raphael Frank 20 October 2007 Authentication & Intrusion Prevention for Multi-Link Wireless Networks.
Spectrum Sensing Based on Cyclostationarity In the name of Allah Spectrum Sensing Based on Cyclostationarity Presented by: Eniseh Berenjkoub Summer 2009.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Security.
Secure Routing in Sensor Networks: Attacks and Countermeasures First IEEE International Workshop on Sensor Network Protocols and Applications 5/11/2003.
GPS - Global Positioning System Presented By Brindha Narayanan.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Wireless Sensor Network Security Anuj Nagar CS 590.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
Lecture 4 Cryptographic Tools (cont) modified from slides of Lawrie Brown.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
THE COMPANY ACORDE is a telecommunications company aimed at the design and development of products and services at the highest level of technology present.
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Development of Global navigation satellite system (GNSS) Receiver
1 FIPS 140 Validation for a “System-on-a-Chip” September 27, 2005 NIST Physical Testing Workshop.
Extending the Reach of GPS-assisted Femtocell Synchronization and Localization through Tightly- Coupled Opportunistic Navigation Ken Pesyna, Kyle Wesson,
Cryptography and Network Security (CS435)
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
CRITICAL INFRASTRUCTURE & CONTINUITY OF OPERATIONS IN A POST 9/11 WORLD Presented by: Dr. Pamela Collins, EKU/JSC.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
Evaluation of Smart Grid and Civilian UAV Vulnerability to GPS Spoofing Attacks D. P. Shepard, J. A. Bhatti, T. E. Humphreys, The University of Texas at.
Catastrophe Readiness and Response Session 7b 1 Session 7b Critical Infrastructure Drew Bumbak.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Standardized Awareness Authorized Training, Train-the-Trainer Prevention and Deterrence.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Protecting Privacy in WLAN with DoS Resistance using Client Puzzle Team 7 Yanisa Akkarawichai Rohan Shah CSC 774 – Advanced Network Security Prof. Peng.
1 Session 7, Section 2 Critical Infrastructure Drew Bumbak.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Chapter 7 Confidentiality Using Symmetric Encryption.
InfraGard A Government and Private Sector Alliance Information sharing begins with human relationships – people talking with people whom they trust. Information.
SMUCSE 8394 BTS – Communication Technologies. SMUCSE 8394 Objectives To establish and maintain a unifying exchange and sharing framework for different.
Authentication. Goal: Bob wants Alice to “prove” her identity to him Protocol ap1.0: Alice says “I am Alice” Failure scenario?? “I am Alice”
1 Security for distributed wireless sensor nodes Ingrid Verbauwhede Department of Electrical Engineering University of California Los Angeles
Governor’s Office of Homeland Security & Emergency Preparedness LOUISIANA BANKERS ASSOCIATION 2010 Louisiana Emergency Preparedness Coalition Meetings.
Cyber Attacks Threaten: privacy reliability safety resiliency 2.
Azam Supervisor : Prof. Raj Jain
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Homeland Security CJ 355 Unit 6 Professor David R. Thompson.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Spread Spectrum Chapter.
Chapter 7 – Confidentiality Using Symmetric Encryption.
Assessing the Civil GPS Spoofing Threat
GPS Denial – Causes and Solutions Neil Gerein. NovAtel Inc. Proprietary Moving, or gathering data, you need to know where you are 2.
GPS - Global Positioning System
Practical Cryptographic Civil GPS Signal Authentication
MIMOSA Open Meeting Standards-based Critical Infrastructure Risk Management Alan Johnston.
Todd Humphreys | Aerospace Engineering
Adding security to your ICS environment? Fine! But how?!
Presentation transcript:

Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans The University of Texas at Austin NITRD Workshop on “New Clockwork” | October 26, 2012

Sources of Time and Frequency 1 ms 1 μs 1 ns GPSGPSNTPNTP WWVBWWVB *Internet Time Service PTPPTP CsCsRbRb 1 s M. Narins, FAA *Internet Time Service

Critical Infrastructure/Key Resource Sector Uses GPS Timing? YesNo Communications SectorX Emergency Services SectorX Information Technology SectorX Banking & Finance SectorX Healthcare & Public Health SectorX Energy/Electric Power and Oil & Natural Gas SubSectorX Nuclear SectorX Dams SectorX Chemical SectorX Critical ManufacturingX Defense Industrial Base SectorsX Postal & Shipping SectorX Transportation SectorX Government Facilities SectorX Commercial Facilities SectorX National Monuments and Icons SectorX Agriculture and Food Sector X Water and Wastewater Sector X M. Narins, FAA

Can’t trust civil GPS receivers to deliver secure time Can’t defend against a near-zero-delay meaconing attack Can’t verify pending leap second changes in advance Can’t catch a patient time saboteur by comparison with local clocks Can’t distinguish multipath from spoofing on dynamic platform

AttackDescription JammingUnintentionalSolar radio bursts IntentionalDenial of service via RF noise SpoofingMeaconingRecord and playback of entire RF spectrum Security Code Estimation and Replay Estimate security code on-the-fly and playback with estimated value to defeat security enhanced GPS (not publically available) Data Bit ForgeryAlter ephemeris or leap second indicators 1 km

GPS Jammers

University of Texas Spoofing Testbed

GPS Spoofer

The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques

Can’t trust civil GPS receivers to deliver secure time Can’t defend against a near-zero-delay meaconing attack Can’t verify pending leap second changes in advance Can’t catch a patient time saboteur by comparison with local clocks Can’t distinguish multipath from spoofing on dynamic platform Can’t trust other dependent time systems

NTP/PTP Timing Attacks J. Tsang, UBC, LERSSE-TR AttackDescription JammingUnintentionalNetwork failure IntentionalDenial of service (flood network with bogus traffic) SpoofingDelay/ReplayMan-in-the-middle rebroadcast to alter delay estimates MasqueradeAct as false grandmaster Message Modification Modify message content

Hybrid Cyber-Physical Attacks Internet Traffic Network GPS

Can’t trust civil GPS receivers to deliver secure time Can’t defend against a near-zero-delay meaconing attack Can’t verify pending leap second changes in advance Can’t catch a patient time saboteur by comparison with local clocks Can’t distinguish multipath from spoofing on dynamic platform Can’t trust other time systems Can’t make strong guarantees: timing demands a probabilistic security model

Security-Enhanced GNSS Signal Model Security code : – Generalization of binary modulating sequence – Either fully encrypted or contains periodic authentication codes – Unpredictable to would-be spoofer

Attacking Security-Enhanced GNSS Signals 1.Meaconing: Spoofer records and re-broadcasts entire block of RF spectrum containing ensemble of GNSS signals 2.Security Code Estimation and Replay (SCER) Attack: Spoofer estimates unpredictable security code chips from authentic signals on-the-fly

Public-Key Signal Authentication: Receiver Perspective Code Origin Authentication Code Timing Authentication Wesson, K., Rothlisberger, M., and Humphreys, T. E., “Practical Cryptographic Civil GPS Signal Authentication,” NAVIGATION: The Journal of the Institute of Navigation, 59(3): Look at the probablisitic nature of this problem specifically PD H1J H1T H1C and I are like crypto

Security Code Estimation and Replay Detection Inside the Spoofer: Security Code Chip Estimation Inside the Defender: Detection Statistic Based on Specialized Correlations Talk about statistics and probablility and how we need to look at the statistics

Security Code Estimation and Replay Detection: Hypothesis Testing During an Attack Humphreys, T. E., “Detection Strategy for Cryptographic GNSS Anti-Spoofing,” IEEE Transactions on Aerospace and Electronic Systems, to be published.

Operational Definition of GNSS Signal Authentication GNSS signal is declared authentic if since some trusted initialization event: 1.logical output S has remained low, and 2.logical output H 1 has remained low, and 3.output P D has remained above an acceptable threshold

What are essential elements to enable secure time transfer? Ask questions; are there others that I’m missing here?

What are essential elements to enable secure time transfer? LayerDescription Application LevelUser alerts and management Consistency LevelCode verification and validation Estimation LevelSecurity code estimation and replay attack detection Physical LevelJamming detection to detect intentional interference Signal LevelUnpredictable bits or chips embedded in signal

Can’t trust civil GPS receivers to deliver secure time Can’t defend against a near-zero-delay meaconing attack Can’t verify pending leap second changes in advance Can’t catch a patient time saboteur by comparison with local clocks Can’t distinguish multipath from spoofing on dynamic platform Can’t trust other time systems Can’t make strong guarantees: timing demands a probabilistic security model