14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.

Slides:



Advertisements
Similar presentations
GPS Security in the Military Past, Present, and Future.
Advertisements

FAA’s Plan for the Future Use of GPS Briefed By: Kanwaljit S. Sandhoo (MITRE/CAASD) 8th European CGSIC/IISC Meeting, Prague December 2-3, 1999.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Europe’s Quest for Satellite Navigation: The Structure of EGNOS and Galileo Dominic De Mello April 24, 2006.
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Certificateless encryption and its infrastructures Dr. Alexander W. Dent Information Security Group Royal Holloway, University of London.
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
GPS - Global Positioning System Presented By Brindha Narayanan.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
GPS and other GNSS signals GPS signals and receiver technology MM10 Darius Plausinaitis
Information Security of Embedded Systems : Algorithms and Measures Prof. Dr. Holger Schlingloff Institut für Informatik und Fraunhofer FIRST.
Absolute Receiver Autonomous Integrity Monitoring (ARAIM)
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
Applied Cryptography for Network Security
Dr Alejandra Flores-Mosri Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the.
GPSS (Global Positioning Satellite System). 2 What is GPSS 24 satellites operating in a low-earth orbit, each transmitting a direct-sequence signal with.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Aviation Considerations for Multi-Constellation GNSS Leo Eldredge, GNSS Group Federal Aviation Administration (FAA) December 2008 Federal Aviation Administration.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
Security Considerations for Wireless Sensor Networks Prabal Dutta (614) Security Considerations for Wireless Sensor Networks.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ENC-GNSS 2006 – Manchester, UK Civil GPS Interface Committee International Sub-Committee May 7, 2006 John E. Augustine Acting Director, Office of Navigation.
Development of Global navigation satellite system (GNSS) Receiver
GLONASS Government Policy, Status and Modernization
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
GLONASS Government Policy, Status and Modernization
Cryptography and Network Security (CS435)
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
GNSS Receiver - Software Radio Concept František Vejražka Czech Technical University in Prague Faculty of Electrical Engineering.
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Protecting GPS Transportation Infrastructure – Action Plan Status Report 43rd CGSIC Meeting Washington, DC March 10, 2004  CDR Peter Keane U.S. Department.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
Tripp Corbin, CFM, GISP CEO eGIS Associates, Inc. Relationships Matter.
© GMV, 2010 Propiedad de GMV Todos los derechos reservados EUROPEAN GNSS EGNOS AND GALILEO. CHARACTERISTICS AND ADVANTAGES OF BRUSSELS. OCTOBER 1 st, 2010.
Cryptography, Authentication and Digital Signatures
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
U.S. Space-Based PNT International Cooperation Civil Global Positioning System (GPS) Service Interface Committee Savannah, Georgia September 15-16, 2008.
Karlstad University IP security Ge Zhang
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
What is Digital Signature Building confidentiality and trust into networked transactions. Kishankant Yadav
Global Navigation Satellite Systems
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Azam Supervisor : Prof. Raj Jain
Alice Wong, Senior Advisor U.S. Department of State Bureau of Oceans and International Environmental and Scientific Affairs Office of Space and Advanced.
© ИАЦ КВНО ЦНИИмаш Собственность ИАЦ. All rights reserved GLONASS Status and Progress Sergey Revnivykh CGSIC Meeting , Savannah, GA, US.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Munich SATNAV, Munich Satellite Navigation Summit February 21-23, 2006 Michael E. Shaw Director, U.S. National Space-Based PNT Coordination Office.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
Fall 2006CS 395: Computer Security1 Key Management.
CGSIC International Subcommittee Prague, Czech Republic March 14, 2005 Michael E. Shaw Director, Navigation and Spectrum Policy U.S. Department of Transportation.
GPS Denial – Causes and Solutions Neil Gerein. NovAtel Inc. Proprietary Moving, or gathering data, you need to know where you are 2.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Information Security, Theory and Practice.
Security Outline Encryption Algorithms Authentication Protocols
GPS - Global Positioning System
Practical Cryptographic Civil GPS Signal Authentication
Chapter 5 Computer Security
Presentation transcript:

14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems

CGSIC Meeting, Prague, Czech Republic Introduction GPS security issues today GNSS security issues in integration scenarios Need for trust quantification methods for civil uses Levels of security obtainable using proposed signal authentication methods  Level of protection  Performance

CGSIC Meeting, Prague, Czech Republic Qascom Background R&D on trusted locations systems R&D on trusted GNSS receivers  NavSec Consortium Vulnerability assessment of critical infrastructures that rely on GNSS

CGSIC Meeting, Prague, Czech Republic GNSS Security Policy June 2004, US-Europe Agreement on GNSS Cooperation and Security December 8, presidential policy on Space- Based Positioning, Navigation, and Time (PNT) December 10, GPS and GLONASS cooperation GLONASS-M : Russia and India launching and modernizing GLONASS.

CGSIC Meeting, Prague, Czech Republic Civil GNSS Security Today Non Intentional Integrity monitoring systems Intentional Jamming Spoofing Jamming detection / mitigation / localization techniques Signal authentication techniques

CGSIC Meeting, Prague, Czech Republic Future Civil GNSS Security Issues Complexity of Integration with different signals and different security mechanisms (e.g. GPS + Galileo SoL) Difficult for GPS user to quantify the total trust Need for security metrics

CGSIC Meeting, Prague, Czech Republic Security Metrics What security level is needed? what security level can be achieved? Non intentional Integrity monitoring systems Intentional Jamming Spoofing Jamming detection / Mitigation / localization techniques Signal Authentication Techniques

CGSIC Meeting, Prague, Czech Republic Integrity / Authenticity Performance Requirements for Critical Application Time-to-alarm for SoL Integrity (non-intentional effects) Time-to-alarm for malicious attacks? (Spoofing) 3 levels of security for GNSS: No Security Level 1: NMA (Navigation Message Authentication) Level 2: SCE (Spreading Code Encryption)

CGSIC Meeting, Prague, Czech Republic Level 1: NMA (Navigation Message Authentication)  Certified receiver is able to authenticate verify integrity of NAV messages using signature.  Authentication NAV messages are created on the ground and transmitted to the satellites for broadcast. What is NMA?  A Navigation Authentication Message include a digital signature authenticating the other navigation messages (ephemeris, almanac data, etc) Source: The Galilei Project: GALILEO Design Consolidation, 2003

CGSIC Meeting, Prague, Czech Republic Level 1: NMA (Navigation Message Authentication) What does NMA protect against?  Protects against navigation message spoofing Authenticates navigation messages (ephemeris, almanac data, etc) from satellites preventing a spoofer from generating navigation messages  Significantly increases complexity of spoofing Messages could be theoretically acquired by a receiver and replayed over a simulated signal in order to spoof the Galileo signal - would require functionality not commonly found in commercial signal simulators, and would require operation to be performed within very small time window Attack cost vs Attack outcome

CGSIC Meeting, Prague, Czech Republic Level 1: NMA (Navigation Message Authentication) Performance of NMA  Time-to-alarm of authentication/integrity failure? Depending on signal data rates and ANM repetition rate GPS L2C – 25bps  Minimum Authentication time = 1,6 minutes with cert obtained in 5,6 minutes*  More realistic scenario = approx 5 minutes, longer cert collection time Galileo E1-L1-E2 – 125bps / E5a – 25bps / E5b – 125bps  Potentially better performance (unknown NAV message structure / only projected data rates) NMA performance characteristics may be outside time-to- alarm requirements Suitable for dangerous goods tracking, but not for time- critical applications * Based on ECCDSA 160bit / CNAV message structure (ICD-GPS-200C) with 48 second frame message sequencing

CGSIC Meeting, Prague, Czech Republic Level 2: SCE (Spreading Code Encryption) What is SCE?  CDMA code is kept secret and can only be derived using a symmetric key  Symmetric keys can be distributed using PKI and asymmetric encryption techniques  GPS P(Y) code uses declassified black keying infrastructure for key distribution

CGSIC Meeting, Prague, Czech Republic Level 2: SCE (Spreading Code Encryption) What does it protect against?  Protects against signal spoofing and navigation data spoofing  Users without key are denied access; Spoofed signal acquisition is virtually impossible as CDMA code is unknown to an attacker  Time-to-alarm requirements of are easily met for both intentional and non-intentional integrity failures

CGSIC Meeting, Prague, Czech Republic Level 2: SCE (Spreading Code Encryption) Proposed usage in Galileo  Commercial Service (CS)  Public Regulated Service (PRS)  Implementation is unknown – expected to be similar to US black-key infrastructure

CGSIC Meeting, Prague, Czech Republic Conclusions Current civil GNSS security do not prevent spoofing There is a need for signal authentication to prevent malicious attacks such as spoofing  It appears as though L2C will not provide NMA or SCE  Galileo proposals for SoL indicate NMA may be included  NMA alone may not provide the required performance for SoL time-to-alarm  CS and SoL provide different quality of service guarantees Civil signal authentication is a challenge for next generation satellite systems Need for metrics to quantify security of complex integrated systems

Oscar Pozzobon Chris Wullems Questions?