733 research outputs found

    Performance assessment of pulse blanking mitigation in presence of multiple Distance Measuring Equipment/Tactical Air Navigation interference on Global Navigation Satellite Systems signals

    Get PDF
    It is known that the Aeronautical Radio Navigation Systems sharing the Global Navigation Satellite Systems (GNSS) frequency band represent a threat to the satellite-based navigation services. Distance Measuring Equipment (DME) and Tactical Air Navigation (TACAN) systems broadcast strong pulsed ranging signals within the Global Positioning System L5 and Galileo E5a frequency bands where the aviation positioning aids services are allocated. This study provides an experimental assessment of the DME/TACAN interference effect on the GNSS receivers performance in scenarios where the presence of several transmitters in view generates radio-frequency interference hard to mitigate by means of the classical solutions. In detail, analysis in terms of the receiver performance will be presented by showing the effect of the non-ideal pulse blanking on the GNSS signal quality. The optimal set-up of the mitigation process, investigated by means of a software simulation, is provided

    Efficient intrusion detection scheme based on SVM

    Get PDF
    The network intrusion detection problem is the focus of current academic research. In this paper, we propose to use Support Vector Machine (SVM) model to identify and detect the network intrusion problem, and simultaneously introduce a new optimization search method, referred to as Improved Harmony Search (IHS) algorithm, to determine the parameters of the SVM model for better classification accuracy. Taking the general mechanism network system of a growing city in China between 2006 and 2012 as the sample, this study divides the mechanism into normal network system and crisis network system according to the harm extent of network intrusion. We consider a crisis network system coupled with two to three normal network systems as paired samples. Experimental results show that SVMs based on IHS have a high prediction accuracy which can perform prediction and classification of network intrusion detection and assist in guarding against network intrusion

    Authentication of GNSS signal by Information-theoretic security

    Get PDF
    In this work a new authentication protocol for global navigation satellite system (GNSS) signals is proposed. The protocol uses artificial noise to confuse the adversary and send an initially hidden verification message. Correctness is based on information-theoretic security and performances are evaluated in terms of secrecy capacityope

    A Low Cost Mass-Market Deployable Security Approach Against GPS Spoofing Attacks

    Get PDF
    The Global Positioning System (GPS) is used ubiquitously for navigation and timing synchronization purposes. Many telecommunication, finance and aviation systems rely heavily on GPS information for routine operations. GPS functions by relying on satellites orbiting the earth in very accurately predictable orbits, which are used as references to identify the positions of objects (receivers). Receivers calculate their positions by receiving GPS signals and calculating their relative distances to each of the satellites. With enough relative distances, the receiver can resolve its position using the method known as trilateration [1]. In this thesis, we underline the vulnerability of this orbiting infrastructure to spoofing attacks, by easily procurable and affordable software defined radios. GPS Signal spoofing is a type of malicious attack, where an attacker generates fake GPS signal with valid GPS properties but false navigational and/or timing information to fool non-suspecting receivers. These signals appear authentic and receivers end up processing the false signal and extracting wrong information. There are two types of GPS services, civilian and military. The military service is encrypted and not vulnerable to such attacks because the pseudorandom codes are not disclosed to the public. However, this service is accessible to authorized military personnel alone. All other commercial and public GPS receivers which form the mass of the population are vulnerable to spoofing attacks. The civilian GPS broadcast band is not encrypted, and this makes it easy for an attacker to recreate the signal that appears valid to GPS receivers. In this thesis we implement a low cost, easy for mass-market application Doppler measurement based spoofing detection approach, utilizing non-specialized off the shelf commercial receivers

    A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System

    Get PDF
    The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general

    A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System

    Get PDF
    The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general

    Performance of Receiver Autonomous Integrity Monitoring (RAIM) for Maritime Operations

    Get PDF
    The use of GNSS in the context of maritime applications has evolved during the past. The International Maritime Organization (IMO) has defined and published requirements for those applications. Comparing the requirements on the one hand specified by ICAO and on the other hand by IMO, significant differences get obvious. A major focus is on the evaluation of the performance of the integrity algorithms. Also concept drivers are discussed

    GNSS Related Threats to Power Grid Applications

    Get PDF
    As power grid environments are moving towards the smart grid vision of the future, the traditional schemes for power grid protection and control are making way for new applications. The advancements in this field have made the requirements for power grid’s time synchronization accuracy and precision considerably more demanding. So far, the signals provided by Global Navigation Satellite Systems have generally addressed the need for highly accurate and stable reference time in power grid applications. These signals however are highly susceptible to tampering as they are being transmitted. Since electrical power transmission and distribution are critical functions for any modern society, the risks and impacts affiliated with satellite-based time synchronization in power grids ought to be examined. This thesis aims to address the matter. The objective is to examine how Global Navigation Satellite Systems are utilized in the power grids, how different attacks would potentially be carried out by employing interference and disturbance to GNSS signals and receivers and how the potential threats can be mitigated. A major part of the research is done through literature review, and the core concepts and different implementations of Global Navigation Satellite Systems are firstly introduced. The literature review also involves the introduction of different power grid components and subsystems, that utilize Global Positioning System for time synchronization. Threat modeling techniques traditionally practiced in software development are applied to power grid components and subsystems to gain insight about the possible threats and their impacts. The threats recognized through this process are evaluated and potential techniques for mitigating the most notable threats are presented.Sähköverkot ovat siirtymässä kohti tulevaisuuden älykkäitä sähköverkkoja ja perinteiset sähköverkon suojaus- ja ohjausmenetelmät tekevät tilaa uusille sovelluksille. Alan kehitys on tehnyt aikasynkronoinnin tarkkuusvaatimuksista huomattavasti aikaisempaa vaativampia. Tarkka aikareferenssi sähköverkoissa on tähän saakka saavutettu satelliittinavigointijärjestelmien tarjoamien signaalien avulla. Nämä signaalit ovat kuitenkin erittäin alttiita erilaisille hyökkäyksille. Sähkönjakelujärjestelmät ovat kriittinen osa nykyaikaista yhteiskuntaa ja riskejä sekä seuraamuksia, jotka liittyvät satelliittipohjaisten aikasynkronointimenetelmien hyödyntämiseen sähköverkoissa, tulisi tarkastella. Tämä tutkielma pyrkii vastaamaan tähän tarpeeseen. Päämääränä on selvittää, miten satelliittinavigointijärjestelmiä hyödynnetään sähköverkoissa, kuinka erilaisia hyökkäyksiä voidaan toteuttaa satelliittisignaaleja häiritsemällä ja satelliittisignaalivastaanottimia harhauttamalla ja kuinka näiden muodostamia uhkia voidaan lieventää. Valtaosa tästä tutkimuksesta on toteutettu kirjallisuuskatselmoinnin pohjalta. Työ kattaa satelliittinavigointijärjestelmien perusteet ja esittelee erilaisia tapoja, kuinka satelliittisignaaleja hyödynnetään sähköverkoissa erityisesti aikasynkronoinnin näkökulmasta. Työssä hyödynnettiin perinteisesti ohjelmistokehityksessä käytettyjä uhkamallinnusmenetelmiä mahdollisten uhkien ja seurausten analysointiin. Lopputuloksena esitellään riskiarviot uhkamallinnuksen pohjalta tunnistetuista uhkista, sekä esitellään erilaisia menettelytapoja uhkien lieventämiseksi

    Architecture and Information Requirements to Assess and Predict Flight Safety Risks During Highly Autonomous Urban Flight Operations

    Get PDF
    As aviation adopts new and increasingly complex operational paradigms, vehicle types, and technologies to broaden airspace capability and efficiency, maintaining a safe system will require recognition and timely mitigation of new safety issues as they emerge and before significant consequences occur. A shift toward a more predictive risk mitigation capability becomes critical to meet this challenge. In-time safety assurance comprises monitoring, assessment, and mitigation functions that proactively reduce risk in complex operational environments where the interplay of hazards may not be known (and therefore not accounted for) during design. These functions can also help to understand and predict emergent effects caused by the increased use of automation or autonomous functions that may exhibit unexpected non-deterministic behaviors. The envisioned monitoring and assessment functions can look for precursors, anomalies, and trends (PATs) by applying model-based and data-driven methods. Outputs would then drive downstream mitigation(s) if needed to reduce risk. These mitigations may be accomplished using traditional design revision processes or via operational (and sometimes automated) mechanisms. The latter refers to the in-time aspect of the system concept. This report comprises architecture and information requirements and considerations toward enabling such a capability within the domain of low altitude highly autonomous urban flight operations. This domain may span, for example, public-use surveillance missions flown by small unmanned aircraft (e.g., infrastructure inspection, facility management, emergency response, law enforcement, and/or security) to transportation missions flown by larger aircraft that may carry passengers or deliver products. Caveat: Any stated requirements in this report should be considered initial requirements that are intended to drive research and development (R&D). These initial requirements are likely to evolve based on R&D findings, refinement of operational concepts, industry advances, and new industry or regulatory policies or standards related to safety assurance
    corecore