Kyle Wesson, Mark Rothlisberger, and Todd Humphreys

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics.
Probabilistic Secure Time Transfer: Challenges and Opportunities for a Sub-Millisecond World Kyle D. Wesson, Prof. Todd E. Humphreys, Prof. Brian L. Evans.
Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
Protecting Civil GPS Receivers
GPS Spoofing & Implications for Telecom Kyle Wesson The University of Texas at Austin Sprint Synchronization Conference | September 18, 2013.
ION GNSS 2011, September 23 rd, Portland, Oregon Improving Security of GNSS Receivers Felix Kneissl University FAF Munich.
GNSS Security Todd Humphreys | Aerospace Engineering The University of Texas at Austin GPS World Webinar | September 18, 2014.
Secure Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin LAAFB GPS Directorate | December 5, 2012.
Sri Lanka Institute of Information Technology
Digital Signatures and Hash Functions. Digital Signatures.
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Thursday, 3:55pm, room 24 This session will discuss techniques for enhancing the ability of receivers to detect, disregard, and operate through intentional.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
Fifth International Conference on Information
Sec final project A Preposition Secret Sharing Scheme for Message Authentication in Broadcast Networks 王怡君.
14/03/2005 CGSIC Meeting, Prague, Czech Republic Oscar Pozzobon Chris Wullems Prof. Kurt Kubik Security issues in next generation satellite systems.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Signcryption November 22, /11/2004 Signcryption Public Key (PK) Cryptography Discovering Public Key (PK) cryptography has made.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Network Security Essentials Fifth Edition by William Stallings Fifth Edition by William Stallings.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Lecture 2: Message Authentication Anish Arora CSE5473 Introduction to Network Security.
WNCG, UT Austin, 1 April 2011 Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Civilian GPS Spoofing Detection based on.
© Neeraj Suri EU-NSF ICT March 2006 DEWSNet Dependable Embedded Wired/Wireless Networks MUET Jamshoro Computer Security: Principles and Practice Slides.
Chapter 10: Authentication Guide to Computer Network Security.
Security By Design Scott A. Vanstone V.P. Cryptographic Research Research in Motion Distinguished Professor Emeritus University of Waterloo.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
CS 627 Elliptic Curves and Cryptography Paper by: Aleksandar Jurisic, Alfred J. Menezes Published: January 1998 Presented by: Sagar Chivate.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Lossless Watermarking for Image Authentication: A New Framework and an Implementation IEEE TRANSACTIONS ON IMAGE PROCESSING APRIL 2006 C.M.Chen.
Karlstad University IP security Ge Zhang
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
1 Number Theory and Advanced Cryptography 6. Digital Signature Chih-Hung Wang Sept Part I: Introduction to Number Theory Part II: Advanced Cryptography.
Quickest Detection of GPS Spoofing Attack Z. Zhang, M. Trinkle, L. Qian, and H. Li MILCOM 2012 Nadia Adem 10/27/2014.
Lecture 2: Introduction to Cryptography
Elliptic Curve Cryptography
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.
A Power Independent Detection (PID) Method for Ultra Wide Band Impulse Radio Networks Alaeddine EL-FAWAL Joint work with Jean-Yves Le Boudec ICU 2005:
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
Geoencryption Using Loran Di Qiu, Sherman Lo, Per Enge Stanford University Sponsored by FAA Loran Program.
Security Review Q&A Session May 1. Outline  Class 1 Security Overview  Class 2 Security Introduction  Class 3 Advanced Security Constructions  Class.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Assessing the Civil GPS Spoofing Threat
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Security of Digital Signatures
Cryptographic Hash Function
Practical Cryptographic Civil GPS Signal Authentication
Athith Amarnath, graduate Student Database and Security Research Group
QR Code Authentication with Embedded Message Authentication Code
The Application of Elliptic Curves Cryptography in Embedded Systems
IIT Indore © Neminath Hubballi
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security vs. Sequence Length Considerations]
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Hashing Hash are the auxiliary values that are used in cryptography.
An Overview of Security Issues in Sensor Network
Cryptography Lecture 9.
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Todd Humphreys | Aerospace Engineering
How to Use Charm Crypto Lib
Presentation transcript:

A Proposed Navigation Message Authentication Implementation for Civil GPS Anti-Spoofing Kyle Wesson, Mark Rothlisberger, and Todd Humphreys Presentation at ION 2011| September 23, 2011

Our Recent Work http://radionavlab.ae.utexas.edu/publications

Outline Introduction: Civil GPS Anti-Spoofing Security-Enhanced GNSS Signal Authentication Proposed GPS Cryptographic Signal Authentication Strategy Authentication Performance and Experimental Results Conclusions

Types of Civil Anti-Spoofing Cryptographic Navigation Message Authentication Spreading Code Authentication Dual-Receiver Correlation Non-Cryptographic Multi-Antenna Defense Vestigial Signal Defense (VSD) Why navigation message authentication? Offers significant protection against spoofing relative to additional cost and bulk required for implementation Practical and surprisingly effective Suggested by Logan Scott in 2003 Why cryptographic? Does not require additional hardware at receiver Can distinguish authentic from spoofed signal

Part I: Security-Enhanced GNSS Signal Authentication

Security-Enhanced GNSS Signal Model Security code : Generalization of binary modulating sequence Either fully encrypted or contains periodic authentication codes Unpredictable to would be spoofer

Attacking Security-Enhanced GNSS Signals Meaconing: Spoofer records and re-broadcasts entire block of RF spectrum containing ensemble of GNSS signals Security Code Estimation and Replay (SCER) Attack: Spoofer estimates unpredictable security code chips from authentic signals on-the-fly

What does it take to authenticate a GNSS Signal? Code Timing Authentication Code Origin Authentication

Operational Definition: GNSS Signal Authentication GNSS signal is declared authentic if: Logical output S has remained low Logical output H1 has remained low, and Output PD has remained above an acceptable threshold

Part II: Proposed GPS Cryptographic Signal Authentication Strategy

What qualities should cryptographic civil GPS signal authentication have? Effective: they make it difficult for a spoofer to carry off a successful spoofing attack Practical: they are likely to be implemented and adopted by the GPS community

A strategy that meets these requirements: Navigation Message Authentication (NMA): Forms by making the navigation message periodically unpredictable Applies public-key cryptographic digital signature and verification techniques

Public-Key Digital Signatures for GPS Digital signatures allow messages to be signed and then verified: Elliptic Curve Digital Signature Algorithm (ECDSA) is most appropriate for GPS: It’s standardized It’s efficient to verify signatures It has a short signature length (but not too short!)

Where do we put the digital signature? Civil Navigation (CNAV) Message: Flexible and extensible message format Packet-like structure: Every 12 seconds, broadcast 300-bit packet Message type identification field can identify up to 64 messages of which only 15 are defined

CNAV Message

CNAV ECDSA Message

Signing the CNAV Message Delivers ECDSA signature every five minutes per channel Delivers 476 unpredictable navigation message bits Offset scheme could lower time-between-authentications

Part III: Authentication Performance and Experimental Results

Hypothesis Testing on Security Code

Challenging Spoofing Attack Scenario Challenging attack scenario from receiver’s perspective: Spoofer has 3 dB carrier-to-noise ratio advantage over the receiver Received spoofed signals are 1.1 times stronger than the received authentic signals Spoofer has introduce a timing error of 1 microsecond in the receiver False alarm probability for SCER detector is 0.0001

Probability of Detection under Scenario

Conclusions GNSS signal authentication is probabilistic Navigation message authentication is practical and surprisingly effective for civil GPS anti-spoofing CNAV message can be extended to broadcast digital signatures Visit us on the web: http://radionavlab.ae.utexas.edu