GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time.

Slides:



Advertisements
Similar presentations
GPS Signal Structure Sources: –GPS Satellite Surveying, Leick –Kristine Larson Lecture Notes 4519/asen4519.html.
Advertisements

Challenges of Practical Civil GNSS Security Todd Humphreys, UT Austin Civil Navigation and Timing Security Splinter Meeting |Portland, Oregon | September.
The leading pioneer in GPS technology Copyright © 2007 NavCom Technology, Inc.Confidential A New Anti-Jamming Method for GNSS Receivers Jerry Knight, Charles.
New ADSL2 Standards Which delivers improved rate and reach performance, advanced diagnostics capabilities, standby modes, and more to broadband designers.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang.
Digital Data Transmission ECE 457 Spring Information Representation Communication systems convert information into a form suitable for transmission.
GPS - Global Positioning System Presented By Brindha Narayanan.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
Distance-decreasing attack in GPS Final Presentation Horacio Arze Prof. Jean-Pierre Hubaux Assistant: Marcin Poturalski January 2009 Security and Cooperation.
The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks Authors: Wenyuan XU, Wade Trappe, Yanyong Zhang and Timothy Wood Wireless.
Frontiers in Radionavigation Dr. Todd E. Humphreys.
Thoughts on GPS Security and Integrity Todd Humphreys, UT Austin Aerospace Dept. DHS Visit to UT Radionavigation Lab | March 10, 2011.
Modern Navigation Thomas Herring
WNCG, UT Austin, 1 April 2011 Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Civilian GPS Spoofing Detection based on.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
Direct Channel Eye Pattern Correction in High Speed Links By Steve Chacko & Ellis Goldberg Furaxa Inc. The engineering metric for physical communication.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Cooperative spectrum sensing in cognitive radio Aminmohammad Roozgard.
Achieving Better Reliability With Software Reliability Engineering Russel D’Souza Russel D’Souza.
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
1 Reading Report 9 Yin Chen 29 Mar 2004 Reference: Multivariate Resource Performance Forecasting in the Network Weather Service, Martin Swany and Rich.
Introduction.
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
Oscar Pozzzobon Technical Director, Qascom ION GNSS 2011, September 23, Portland, US.
Description of the monitoring system experimentation on the freight car pSHIELD Demonstrator Testbed Architecture pSHIELD Final Review Meeting, Bruxelles.
GNSS Receiver - Software Radio Concept František Vejražka Czech Technical University in Prague Faculty of Electrical Engineering.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
ION/GNSS 2011, 23 Sept Mark L. Psiaki Sibley School of Mechanical & Aerospace Engr., Cornell University Developing Defenses Against Jamming & Spoofing.
23-aug-05Intrusion detection system1. 23-aug-05Intrusion detection system2 Overview of intrusion detection system What is intrusion? What is intrusion.
Multiuser Detection (MUD) Combined with array signal processing in current wireless communication environments Wed. 박사 3학기 구 정 회.
An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd Humphreys Presentation.
Riding out the Rough Spots: Scintillation-Robust GNSS Carrier Tracking Dr. Todd E. Humphreys Radionavigation Laboratory University of Texas at Austin.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
A Survey of Spectrum Sensing Algorithm for Cognitive Radio Applications YaGun Wu netlab.
Baseband Demodulation/Detection
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
報告人:林祐沁 學生 指導教授:童曉儒 老師 March 2, Wireless Video Surveillance Server Based on CDMA1x and H.264.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Performance of Digital Communications System
Real-Time Signal-To-Noise Ratio Estimation Techniques for Use in Turbo Decoding Javier Schlömann and Dr. Noneaker.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Characterization of Receiver Response to a Spoofing Attack
Saeed Ur Rehman Supervised by AP Kevin Sowerby Colin Coghill.
Digital Communications Chapeter 3. Baseband Demodulation/Detection Signal Processing Lab.
Improving TCP Performance over Wireless Networks
West Hills College Farm of the Future. West Hills College Farm of the Future Precision Agriculture – Lesson 2 What is GPS? Global Positioning System Operated.
Chapter 2 GPS Crop Science 6 Fall 2004 October 22, 2004.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Secure Civil Navigation and Timing Todd Humphreys | Aerospace Engineering The University of Texas at Austin MITRE | July 20, 2012.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Energy Efficient Source Coding and Modulation for Wireless Applications Yashwanth Prakash Sandeep.K.S.Gupta Arizona State University Tempe, AZ
Assessing the Civil GPS Spoofing Threat
Performance of Digital Communications System
Digital Communications I: Modulation and Coding Course Spring Jeffrey N. Denenberg Lecture 3c: Signal Detection in AWGN.
INTRODUCTION. Electrical and Computer Engineering  Concerned with solving problems of two types:  Production or transmission of power.  Transmission.
Presented by Edith Ngai MPhil Term 3 Presentation
1.) Acquisition Phase Task:
GPS - Global Positioning System
The Global Positioning System and Embedded Receiver Applications
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
Practical Cryptographic Civil GPS Signal Authentication
Seraphim : A Security Architecture for Active Networks
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Basic Concepts of Audio Watermarking
Counter-UAV Challenges: Is GNSS Spoofing Effective?
IEEE Regulatory AHC Power Measurement Method
Denial-of-Service Jammer Detector Training Course Worldsensing
Presentation transcript:

GPS Spoofing Detection System Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin Abstract: A real-time method for detecting GPS spoofing in a narrow-bandwidth civilian GPS receiver is being developed. It is needed in order to detect malicious spoofed signals that seek to deceive a C/A-code civilian GPS receiver regarding its position or time. The ability to detect a spoofing attack is important to the reliability of systems ranging from cell-phone towers, the power grid, and commercial fishing monitors. The spoofing detector mixes and accumulates base-band quadrature channel samples from two receivers, one a secure reference receiver, and the other the defended User Equipment (UE) receiver. The resulting statistic detects the presence or absence of the encrypted P(Y) code that should be present in both signals in the absence of spoofing. Results & Conclusions Narrow-band-filtered P(Y) code useful for spoofing detection 20-25% of P(Y) power suffices to detect spoofing Spoofing detection threshold analysis requires characterization of power loss W-bits semi-codeless detection requires distortion model Codeless & semi-codeless techniques both work Successful codeless detection of real spoofing attack (first ever demonstration) with 1.2 sec detection interval Semi-codeless detection intervals as short as 0.1 sec possible. Needed Efforts Modest UE receiver modifications for after-the-fact detection Significant modifications for real-time detection Establishment of reference station network or intermittent after-the-fact W-bits declassification Challenges Encrypted military P(Y) signal necessitates squaring operations and SNR loss Wide bandwidth of P(Y) code causes 75-80% power loss, further degrading SNR, and significant waveform distortions in narrow-band civilian receiver Bandwidth of communications link from trusted reference receiver to defended UE receiver Constrained real-time signal processing capabilities in low-power UE receiver Figure 1. Spoofing detection receiver architecture. Solutions Use known, tracked civilian C/A code and known relationships between C/A and P(Y) code to guide correlation times and expected signal levels Analyze narrow-band filter power losses and distortion Develop signal detection statistical analysis to design reasonable accumulation intervals Use semi-codeless detection techniques by estimating W anti- spoofing bits in reference receiver and transmitting only those to UE Broadcast spoofing detection data over internet in real-time Codeless Detection Statistical Analysis Normalized detection statistic: Predicted mean and variance absent spoofing: Detection threshold and probability of detection: Figure 2. Hardware & profile of a spoofing attack. Figure 3. Codeless verification of no spoofing. Figure 4. Codeless detection of a spoofing attack. Figure 5. Comparison of 2 semi-codeless detection statistics, case of no spoofing Time (sec) gamma, (Normalized Spoofing Detection Stat) Successful Spoofing Detection for PRN 12 Successful Verification of lack of Spoofing for PRN 02 PRN02 predicted mean value based on C/A code Onset of spoofing attack PRN 02 (unspoofed) detection statistic PRN 12 predicted mean value based on C/A code PRN 12 (spoofed) Detection Statistic PRN 02 Spoofing Detection Threshold, P FA = 0.01%, P detect = % before spoofing event P detect = % after event PRN 12 Spoofing Detection Threshold, P FA = 0.01%, P detect = % before spoofing event P detect = % after event