275 research outputs found
Recommended from our members
GNSS Signal Authentication via Power and Distortion Monitoring
We propose a simple low-cost technique that enables
civil Global Positioning System (GPS) receivers and other civil
global navigation satellite system (GNSS) receivers to reliably
detect carry-off spoofing and jamming. The technique, which
we call the Power-Distortion detector, classifies received signals
as interference-free, multipath-afflicted, spoofed, or jammed
according to observations of received power and correlatio
n
function distortion. It does not depend on external hardware or
a network connection and can be readily implemented on many
receivers via a firmware update. Crucially, the detector can with
high probability distinguish low-power spoofing from ordinary
multipath. In testing against over 25 high-quality empirical data
sets yielding over 900,000 separate detection tests, the detector
correctly alarms on all malicious spoofing or jamming attack
s
while maintaining a
<0.5% single-channel false alarm rate.Aerospace Engineering and Engineering Mechanic
Recommended from our members
The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques
A battery of recorded spoofing scenarios has been compiled
for evaluating civil Global Positioning System (GPS) signal
authentication techniques. The battery can be considered
the data component of an evolving standard meant to
define the notion of spoof resistance for commercial GPS
receivers. The setup used to record the scenarios is described.
A detailed description of each scenario reveals
readily detectable anomalies that spoofing detectors could target to improve GPS securityAerospace Engineering and Engineering Mechanic
Recommended from our members
A Testbed for Developing and Evaluating GNSS Signal Authentication Techniques
An experimental testbed has been created for developing
and evaluating Global Navigation Satellite System (GNSS)
signal authentication techniques. The testbed advances the state
of the art in GNSS signal authentication by subjecting candidate
techniques to the strongest publicly-acknowledged GNSS spoofing
attacks. The testbed consists of a real-time phase-coherent GNSS
signal simulator that acts as spoofer, a real-time softwaredefined
GNSS receiver that plays the role of defender, and
post-processing versions of both the spoofer and defender. Two
recently-proposed authentication techniques are analytically and
experimentally evaluated: (1) a defense based on anomalous
received power in a GNSS band, and (2) a cryptographic
defense against estimation-and-replay-type spoofing attacks. The
evaluation reveals weaknesses in both techniques; nonetheless,
both significantly complicate a successful GNSS spoofing attackAerospace Engineering and Engineering Mechanic
Recommended from our members
Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer
A portable civilian GPS spoofer is implemented on a digital
signal processor and used to characterize spoofing effects and develop defenses against civilian spoofing. This
work is intended to equip GNSS users and receiver manufacturers
with authentication methods that are effective
against unsophisticated spoofing attacks. The work also
serves to refine the civilian spoofing threat assessment
by demonstrating the challenges involved in mounting a
spoofing attack.Aerospace Engineering and Engineering Mechanic
Radio Frequency Interference Impact Assessment on Global Navigation Satellite Systems
The Institute for the Protection and Security of the Citizen of the EC Joint Research Centre (IPSC-JRC) has been mandated to perform a study on the Radio Frequency (RF) threat against telecommunications and ICT control systems. This study is divided into two parts. The rst part concerns the assessment of high energy radio frequency (HERF) threats, where the focus is on the generation of electromagnetic pulses (EMP), the development of corresponding devices and the possible impact on ICT and power distribution systems. The second part of the study concerns radio frequency interference (RFI) with regard to global navigation satellite systems (GNSS). This document contributes to the second part and contains a detailed literature study disclosing the weaknesses of GNSS systems. Whereas the HERF analysis only concerns intentional interference issues, this study on GNSS also takes into account unintentional interference, enlarging the spectrum of plausible interference scenarios.JRC.DG.G.6-Security technology assessmen
GNSS Vulnerabilities and Existing Solutions:A Review of the Literature
This literature review paper focuses on existing vulnerabilities associated with global navigation satellite systems (GNSSs). With respect to the civilian/non encrypted GNSSs, they are employed for proving positioning, navigation and timing (PNT) solutions across a wide range of industries. Some of these include electric power grids, stock exchange systems, cellular communications, agriculture, unmanned aerial systems and intelligent transportation systems. In this survey paper, physical degradations, existing threats and solutions adopted in academia and industry are presented. In regards to GNSS threats, jamming and spoofing attacks as well as detection techniques adopted in the literature are surveyed and summarized. Also discussed are multipath propagation in GNSS and non line-of-sight (NLoS) detection techniques. The review also identifies and discusses open research areas and techniques which can be investigated for the purpose of enhancing the robustness of GNSS
Recommended from our members
A comprehensive proposal for securing terrestrial radionavigation systems
The security of terrestrial radionavigation systems (TRNS) has not yet been addressed in the literature. This proposal builds on what is known about securing global navigation satellite systems (GNSS) to address this gap, re-evaluating proposals for GNSS security in light of the distinctive properties of TRNS. TRNS of the type envisioned in this paper are currently in their infancy, unburdened by considerations of backwards compatibility: security for TRNS is a clean slate. This thesis argues that waveform- or signal-level security measures are irrelevant for TRNS, preventing neither spoofing nor unauthorized use of the service. Thus, only security measures which modify navigation message bits merit consideration. This thesis proposes orthogonal mechanisms combining navigation message encryption (NME) and navigation message authentication (NMA), constructed from standard cryptography primitives and specialized to TRNS: message encryption allows providers to offer tiered access to navigation parameters on a bit-by-bit basis, and message authentication disperses the bits of a message authentication code across all data packets, posing an additional challenge to spoofers. This cryptographic proposal, however, is still vulnerable to certain types of replay threats. This thesis addresses this gap by augmenting TRNS with autonomous signal-situational-awareness (SSA) capability, allowing TRNS operators to detect spoofing and meaconing attacks. Two signal authentication techniques for SSA are developed to detect a weak spoofing signal in the presence of static and dynamic multipath. This thesis also proposes enhancements to these signal authentication techniques. These enhancements exploit the synergy from combining information across multiple epochs, or over multiple monitoring beacons, to further lower the spoofer detection threshold. Both techniques with their enhancements are shown to be effective in simulations of the varied operating environments that a generic TRNS will encounter. With both proposed cryptographic NME+NMA scheme and autonomous SSA in place, TRNS gains a defensive capability that GNSS cannot easily match: a comprehensive defense against most man-in-the-middle attacks on position, navigation and timing services.Aerospace Engineerin
- …