matthew ahrens* December, 12th, 2014
|
|
- Branden Powell
- 6 years ago
- Views:
Transcription
1 G P S A N D W I R E L E S S S I G N A L J A M M I N G : AT TA C K S A N D D E F E N S E S matthew ahrens* December, 12th, 2014 contents 1 Introduction History of GPS What is the need for security of GPS? How GPS Works Attacks Signal Jamming Signal Spoofing Examples: University of Texas Examples: Carnegie Mellon Defenses Detection Prevention GPS Alternatives Conclusion 10 For Comp116, Intro. to Computer Security, with Prof. Ming Chow * Department of Computer Science, Tufts University, Medford, MA 1
2 introduction 2 1 introduction 1.1 History of GPS GPS, Global Positioning System, is a type of Global Navigation Satellite System 1 that currently consists of 27 satellites that orbit around fixed points on the earth. Originally designed for military use, GPS was not used for commercial and civilian applications until early 1980s.[Glo14] In 2000, the U.S. government disabled the GPS protocol selective availability. This feature was the intentional degradation of quality for specific uses of GPS in some regions. Selective availability was implemented originally as a security measure against malicious use of tracking.[gov14a] The user benefits of turning selective availability off are obvious, higher accuracy for civilian applications. 1.2 What is the need for security of GPS? Government programs are moving forward with three new dedicated civilian layers of GPS signal.[gov14b] They include: L2C: A 1227 MHz signal for civilian needs at military accuracy or better L1C: A 1575 MHz signal for the interoperability of GPS with other GNSS systems for urban use L5: A 1176MHz signal for use on dedicated life safety systems such as transit, commercial aircraft, and emergency transport In analyzing precursory information about these signal bands, security is only mentioned once in protecting the L1C signal translation between US GPS systems and EU systems like Galileo 2 from normal urban noise. There is no mention of even the possibility of malicious attacks. The description of L5 is the most interesting in the scope of security. Added control measures by the Department of Defense are being added. These measures are to 1 Abbv. GNSS 2 Galileo is the European GPS equivalent run by civilians for general use.
3 introduction 3 insure that from the new wave of GPS satellites, to the control stations, communication is robust and redundant.[od14] The definition of what a healthy data set looks like shows a continuous integrated approach by the DoD, the air force, and the USDOT to collaborate for a higher quality of service 3. The bigger question is What about security? Currently there are little to no guarantees that any aspect of the GPS protocol can guarantee correctness at the level of the consuming client. Given the wide variety of GPS client manufacturers, how do you assure quality is maintained in the face of malious attacks, not just common noise and interference. One of the inherit benefits of putting life safety systems on their own band is less interference and higher QoS for these integral systems. But, by signaling them out, it becomes easier for attackers to target critical systems while going undetected since other GPS enabled systems would show no symptoms. Also, unlike their military counterparts, the authentication mechanisms for civilian GPS bands are unencrypted. This leaves them open to vulnerabilities and attacks. In order to understand how these attacks against critical clients would work, we will look at how GPS trasmission and reception works, and how security is more difficult with GPS than other wireless systems. 1.3 How GPS Works Client GPS systems receive signals from a collection of the 27 satellites that fly in medium Earth orbit. Using tuples of signal from any three (but typically for or more for accuracy) satellites the client can use trilateration to find the Latitudinal and Longitudinal intersection around three fixed points, giving a precise location on the Earths surface. The signal data contains a payload of an atomic timestamp, the location of the satellite, and optionally a checksum. Since radio waves travel near the speed of light when ignoring interference, clients use the timestamp to calculate the distance of the satellite. If the checksum is implemented client side, and the current GPS satellite supports it, then the quality that the signal is not malformed due to noise is insured. Checksum can then be thought of as proving the integrity of the signal; however, it does not insure the authenticity of the 3 These agencies are working together on the open standard for this band and the L2C band.
4 attacks 4 signal. Generally, client systems treat any signal that correctly forms to the NMEA 4 standard as being authentic and from an approved source satellite or otherwise. How these client systems tell satellites apart from one another is through their coarse acquisition code 5. This code is a pseudorandom number stream that is unique to that satellite and is public. There is no guarantees on verifying that a signal broadcasted with a specific C/A code originated from that satellite.[nld + 12] GPS is similar to its wireless brethren WiMax 6 In this way where the physical layer is unencrypted and unauthenticated by design.[mb08] 2 attacks There are two major types of attacks that have been commonly used in the past. Signal Jamming is the transmission of noise over the GPS frequency band which acts as a Denial-of-Service 7 attack against the clients. Signal Spoofing is transmitting false data using a satellite s C/A code to cause clients to make incorrect pseudo ranges or other estimates of where the satellite is currently. The threat model is growing as more robust attack services are being made. Building on these two attack vectors, researchers have been able to make attack systems that can affect the control layer 8 that are inexpensive to construct and are hard to find the origin of or trace. 2.1 Signal Jamming Jamming is very simplistic of an attack. Like WiFi, WiMax, and cellular signals such as 3G and 4G, GPS is susceptible to noise and interference. Unlike these signals, the size of the data packet is known and the rhythm in which synchronization data is also known by definition. Blanket jamming attackers, where an attack outputs noise on the GPS frequency band is the 4 National Marine Electronics Associationhttp:// 5 Abbv. C/A code 6 Known as the IEEE standard 7 abbv. DoS 8 The intermediate layer that guarantees communication between satellites and major stations.
5 attacks 5 common and simple version of this attack. This attack comes at a grave risk to attackers, as it is easy to trace a spaming signal and is highly illegal. As signal Jamming is a very disruptive attack to life systems such as police and medical transport, as well as large commercial systems such as transit and airports, the FCC has made it explicitly illegal to buy, sell, market, or operate jamming equipment.[fcc14] The rhythmic nature of GPS allows attackers focusing on jammer attacks to be sneakier than those trying to avoid police radar or disable wifi. Because GPS clients need to sync against a satellites C/A code and then calculate the offset in time to find position, an attacker needs to only spam signals during the time when the code is broadcasted, and not block out every GPS transmission. Secondly, since there is no feedback from GPS clients, a jammer can be very far away from the clients it is attacking and cover a large area easily. For the casual, accidental attack, such as the employee trying to obfuscate his location from his employeer[mat13], a small jammer running off of the auxiliary of a 12 volt battery can disrupt the operation of a service such as an air traffic control tower from a major road more than two-thousand feet away. While this attack is just a crude example that most networks are susceptible too, more insidious attacks that are harder to trace and have more detrimental effects exist. 2.2 Signal Spoofing One of the major problems of GPS clients is that they treat well-formed input as trusted source. This is equivalent to trusting that well-formed text input from a client application does not contain malicious values such as with code injection or cross-site scripting. Traditional spoofing attacks can attack one of two systems that clients take from GPS signal input. They can attack the clock or they can attack the position. Attacking either will induce error in the core functionality of the client, the pseudorange for the satellite will be incorrect. If the time is attacked, then the cycles the client must shift in order to calculate distance will be wrong. The position will simply be referenced to an incorrect value of the position is spoofed. Spoofing the position is
6 attacks 6 easier to detect and correct for, a correct position will overwrite an incorrect one as position history would typically not be kept in the calculation. By attacking the time, though, the client s history of input from the satellite will be off and take many cycles to correct if it gets corrected at all. Simple attacks use GPS simulators, which are commercial devices used to test the performance of GPS receivers. Simulators generate the L1 signal using either default data, or the user can upload the specification of a signal in a standard format, e.g., Spirent uses NMEA. The main purpose of simulators is offline testing. Simulators for a constellation of satellites typically cost several thousand dollars. In 2002 researchers rented a simulator, added an amplifier, and showed that nearby receivers would lock onto the signal.[nld + 12] 2.3 Examples: University of Texas In a more sophisticated attack, researchers from Todd Humphreys lab at University of Texas showed that buy spoofing civilian GPS signals 9, they were able to convince the ship to change course and that it was in vital danger i.e. trick it into thinking its altitude was under sea level.[neu13] The tests showed that this spoofing signal worked from as far as thirty kilometers away. So, while casual users are deterred by aforementioned US laws and penalties for repeat offense in blocking signals where the likelihood of being caught is high one time attackers looking to overtake specific systems for only a few attacks can easily falsify the system, gain control, and be harder to trace. 2.4 Examples: Carnegie Mellon In showing the viability of organized, sophisticated attacks while still being easy and inexpensive, Researchers from Carnegie Mellon sought to make a Phase-coherent Signal Synthesizer to perform stealthy spoofing-like attacks 9 Specifically the L1 band
7 defenses 7 Figure 1: Carnegie Mellon s DSP diagram for the functionality of their Phasecoherent Signal Synthesizer against the civilain GPS band. Using a standard DSP pipeline, they build a robust signal processor and producer for under $2,500 USD which they say is comparible to a high-end laptop and all parts are available to the general public. This device works by receiving legitmate signals broadcasted from GPS satellites and syntheses new GPS signals with the injected payloads in real time. If a target is defined, then the device can account for the delay relaying the signal would add and account for it in the navigation payload, thus cloaking its location of origin which preserves the attacker and makes the signal s authenticity more believable which mitigates defenses. [NLD + 12] These experiments show in great detail how attacking a GPS can have large detrimental affects, and as we sanction out bands it is likely to become attractive to integrate the data from GPS signals such as positioning and atomic time into core systems of other devices. As we embedded GPS into phones, cars, trains, plains, medical transport, and other things where guarantee of delivery and robustness are the assurances we are given, we are leaving ourselves open to a new line of vulnerabilities up the chain. 3 defenses The simpler versions of these attacks can be easily mitaged if client GPS systems become wary of the origins of their signal input. Much like with Web programming, GPS client programmers need to sanitize input. This is harder since it is very simple to see malformed textual input that harbores
8 defenses 8 malicious code, but GPS signal input must already adhere to a data protocol. Statistical and Differential techniques can be used to mitigate jamming and spoofing, and these techniques fall into the two categories common to most security applications: Detection and Prevention. 3.1 Detection On the client level and more easy to adopt GPS should borrow from some of the approaches of security of Wireless Sensor Networks 10 and use the fact that GPS systems are typically embedded as a stength and not a weakness. Much like Wireless Sensor Networks do periodic history authenitcation using a base station or some other localization [PVC09], GPS systems could network together to verify the authenticity. Several GPS devices could communicate with eachother through some other transmission medium (TCP/IP, RF, etc.) that has its own encryption, authentication, or other handshaking. They can then share notes and compare signals received for a given satellite s C/A code. If a device has a significant amount of signal history that does not agree with the results of its correspondence, it: Has detected an attack Can begin defending, reporting, or otherwise trying to mitigate that attack If communication to networked devices is unavailable or dangerous i.e. behind enemy lines or in other time of crisis then the quality of the data signal should be scrutinized in real time by its frequency, its offset, and its predictability. Given the current location, and the basic acceleration reading of any cheap sensor, a device should be able to predict its next location with some small margin of error. By doing online calculation of where it thinks the satelite should be given some assumed valid past data, if an attacker tries to inject into the system, it could easily be noticed as an outlier. This fails though, as attacks such as the ones researched by Carnegie Mellon become more sophisticated and minimize difference. This also fails if the 10 abbv. WSNs
9 defenses 9 area is already compromised by fake signals, but is still better than trusting the input as valid by default. 3.2 Prevention 3.3 GPS Alternatives At a systemic level, the best way to detect (and prevent) jammers and spoofers would be to add encryption to the C/A code much like the military GPS signals already have. Other prevention measures that do not include detection first must mean that data is supplemented from other positioning sources Local Positioning Systems Specifically in the cases of urban and suburban GPS security of transit and medical systems, there is an abundance of freely broadcasted data that can be used to prevent attacks from succeeding. A GPS client now is typically a full stack application with access to an OS, hardrive, and other nicities that allow it to interact with a broader array of sensors. Similar to how the accelerometer detection would work online, the GPS client could take in BSSID data hardware mac addresses of nearby wifi (and 3G/4G cell towers) and associate it with some location either by supervised input or GPS automation if the data at that time is assumed to be valid. The client could then do a localized 2D trilateration inbetween GPS signals to confirm within some strong confidence that the GPS data is accurate. The assumptions made here are that: Wifi routers are not likely to change position Wifi routers are not likely to appear / disappear In these cases, where any given household or corporate office in a densly populated area is producing and consuming broadcasted wifi signal, not only can locally positioning based off of wifi routers help authenticate validity of position, but also can provide faster and more accurate positioning than processing GPS data alone. The major drawback to this is that clients
10 conclusion 10 would need to collect data beforehand / offline before being able to use this feature, but two ways to overcompensate for that are (1) to trust GPS data is valid the first time in an area and collect data at that step or (2) communicate with other networked devices and share data in order to not recompute / store rundundant information where you would also need to trust the validity of that data. Many major carriers and mapping providers e.g. Google, Apple already do this and it is proven effective in general at providing reliable, valid data through mixed mode validation. 4 conclusion As GPS evolves into more specific, life critical applications both on the system side and the client side, we as developers need to think about how to mitigate the risks and potential for attacks by not blindly trusting the input just because it is well-formed. As we have seen, even though a signal can conform the standard set by NMEA and adhere to the robustness of the three new Civil bands for GPS, research has shone that GPS is one of the most suseptible wireless data protocols out there for civilians due to lack of encryption, authentication, and the increasing ability to stealthily jam and spoof signals. We have presented some mitigation and detection techniques that we hope to see in future commericial standards that take advantage of the fact that GPSes being embedded in smarter systems should be more resilliant, not more compromisable. references [FCC14] The FCC. Jammer Enforcement fcc encyclopedia, [Glo14] Mio Global. History of gps, [Gov14a] U.S. Government. Gps, [Gov14b] U.S. Government. New Civil Signals modernization, 2014.
11 references 11 [Mat13] Chris Matuszczyk. Truck driver has gps jammer, accidentally jams newark airport, [MB08] Siddharth Maru and Timothy X Brown. Denial of service vulnerabilities in the protocol. In Proceedings of the 4th Annual International Conference on Wireless Internet, WICON 08, pages 37:1 37:9, ICST, Brussels, Belgium, Belgium, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). [Neu13] Peter G. Neumann. Risks to the public. SIGSOFT Softw. Eng. Notes, 38(6):21 28, November [NLD + 12] Tyler Nighswander, Brent Ledvina, Jonathan Diamond, Robert Brumley, and David Brumley. Gps software attacks. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 12, pages , New York, NY, USA, ACM. [od14] Department of Defense. Dod announces start of civil navigation message broadcasting, [PVC09] Josep Paradells, Jordi Vilaseca, and Jordi Casademont. Improving security applications using indoor location systems on wireless sensor networks. In Proceedings of the International Conference on Advances in Computing, Communication and Control, ICAC3 09, pages , New York, NY, USA, ACM.
Mobile Security Fall 2015
Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become
More informationJamming and Spoofing of GNSS Signals An Underestimated Risk?!
Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Alexander Rügamer Dirk Kowalewski Fraunhofer IIS NavXperience GmbH Fraunhofer IIS 1 Source: http://securityaffairs.co/wordpress/wpcontent/uploads/2012/02/spoofing.jpg
More informationSurviving and Operating Through GPS Denial and Deception Attack. Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems
Surviving and Operating Through GPS Denial and Deception Attack Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems How GPS Works GPS Satellite sends exact time (~3 nanoseconds)
More informationSecurity of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques
Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques Global Navigation Satellite Systems (GNSS) Umbrella term for navigation
More informationRESPONSE TO THE HOUSE OF COMMONS TRANSPORT SELECT COMMITTEE INQUIRY INTO GALILEO. Memorandum submitted by The Royal Academy of Engineering
RESPONSE TO THE HOUSE OF COMMONS TRANSPORT SELECT COMMITTEE INQUIRY INTO GALILEO Memorandum submitted by The Royal Academy of Engineering September 2004 Executive Summary The Royal Academy of Engineering
More informationAssessing the likelihood of GNSS spoofing attacks on RPAS
Assessing the likelihood of GNSS spoofing attacks on RPAS Mike Maarse UvA/NLR 30-06-2016 Mike Maarse (UvA/NLR) RP2 Presentation 30-06-2016 1 / 25 Introduction Motivation/relevance Growing number of RPAS
More informationExtreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society
Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society Fredrik Marsten Eklöf FOI, Informationssystem fredrik.eklof@foi.se, 0709-277426 Global Navigation
More informationThe Next Generation of Secure Position, Navigation and Timing Technology
Navigation and Timing Technology November 2017 Contents Executive Summary 2 GPS on the Battlefield 2 Vulnerabilities of GPS 2 Staying Ahead of the Threat 3 Innovating For More Resilient PNT 3 Innovative,
More informationBasics of Satellite Navigation an Elementary Introduction Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University of Technology, Austria
Basics of Satellite Navigation an Elementary Introduction Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University of Technology, Austria CONCEPT OF GPS Prof. Dr. Bernhard Hofmann-Wellenhof Graz, University
More informationImplementation and Performance Evaluation of a Fast Relocation Method in a GPS/SINS/CSAC Integrated Navigation System Hardware Prototype
This article has been accepted and published on J-STAGE in advance of copyediting. Content is final as presented. Implementation and Performance Evaluation of a Fast Relocation Method in a GPS/SINS/CSAC
More informationEvaluating OTDOA Technology for VoLTE E911 Indoors
Evaluating OTDOA Technology for VoLTE E911 Indoors Introduction As mobile device usage becomes more and more ubiquitous, there is an increasing need for location accuracy, especially in the event of an
More informationTime Firewall: Securing the GNSS receivers against Spoofing/Jamming. Shemi Prazot AccuBeat
Time Firewall: Securing the GNSS receivers against Spoofing/Jamming Shemi Prazot AccuBeat 1 The need The GNSS systems are widely used for both navigation and timing in civilian infrastructures and military
More informationA Review of Vulnerabilities of ADS-B
A Review of Vulnerabilities of ADS-B S. Sudha Rani 1, R. Hemalatha 2 Post Graduate Student, Dept. of ECE, Osmania University, 1 Asst. Professor, Dept. of ECE, Osmania University 2 Email: ssrani.me.ou@gmail.com
More informationS a t e l l i t e T i m e a n d L o c a t i o n. N o v e m b e r John Fischer VP Advanced R&D
STL - S a t e l l i t e T i m e a n d L o c a t i o n N o v e m b e r 2 0 1 7 John Fischer VP Advanced R&D jfischer@orolia.com 11/28/201 1 7 WHY AUGMENT GNSS? Recent UK Study Economic Input to UK of a
More informationHOW TO RECEIVE UTC AND HOW TO PROVE ACCURACY
HOW TO RECEIVE UTC AND HOW TO PROVE ACCURACY Marc Weiss, Ph.D. Independent Consultant to Booz Allen Hamilton Weiss_Marc@ne.bah.com Innovation center, Washington, D.C. JANUARY 23, 2018 HOW DO YOU GET UTC
More informationCARRIER PHASE VS. CODE PHASE
DIFFERENTIAL CORRECTION Code phase processing- GPS measurements based on the pseudo random code (C/A or P) as opposed to the carrier of that code. (1-5 meter accuracy) Carrier phase processing- GPS measurements
More informationExperience with Radio Navigation Satellite Service (RNSS)
Experience with Radio Navigation Satellite Service (RNSS) International Satellite Communication Symposium International Telecommunication Union (ITU) Geneva, 13-14 June 2016 MITOME, Takahiro Co-Chair of
More informationGLOBAL POSITIONING SYSTEMS
GLOBAL POSITIONING SYSTEMS GPS & GIS Fall 2017 Global Positioning Systems GPS is a general term for the navigation system consisting of 24-32 satellites orbiting the Earth, broadcasting data that allows
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationPower Utilities Mitigating GPS Vulnerabilities and Protecting Power Utility Network Timing
Mitigating GPS Vulnerabilities and Protecting Power Utility Network Timing Introduction The Global Positioning System (GPS) is ubiquitous as a source of precise timing for utility data networks and power
More informationTACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014
TACOT Project Trusted multi Application receiver for Trucks Bordeaux, 4 June 2014 Agenda TACOT Context & Solution Technical developments Test & Validation results Conclusions GNSS ease our lives GNSS is
More informationGALILEO Research and Development Activities. Second Call. Area 3. Statement of Work
GALILEO Research and Development Activities Second Call Area 3 Innovation by Small and Medium Enterprises Statement of Work Rue du Luxembourg, 3 B 1000 Brussels Tel +32 2 507 80 00 Fax +32 2 507 80 01
More informationChallenges and Solutions for GPS Receiver Test
Challenges and Solutions for GPS Receiver Test Presenter: Mirin Lew January 28, 2010 Agenda GPS technology concepts GPS and GNSS overview Assisted GPS (A-GPS) Basic tests required for GPS receiver verification
More informationThe GLOBAL POSITIONING SYSTEM James R. Clynch February 2006
The GLOBAL POSITIONING SYSTEM James R. Clynch February 2006 I. Introduction What is GPS The Global Positioning System, or GPS, is a satellite based navigation system developed by the United States Defense
More informationProceedings of Al-Azhar Engineering 7 th International Conference Cairo, April 7-10, 2003.
Proceedings of Al-Azhar Engineering 7 th International Conference Cairo, April 7-10, 2003. MODERNIZATION PLAN OF GPS IN 21 st CENTURY AND ITS IMPACTS ON SURVEYING APPLICATIONS G. M. Dawod Survey Research
More informationGSS8000. Highlights of the GSS8000 series. Multiple Signals Combined. Comprehensive Modelling. Unmatched Pedigree and Support
GSS8000 SERIES GSS8000 Highlights of the GSS8000 series The GSS8000 series has been designed to meet all the demanding requirements of research and development teams involved in satellite navigation and
More informationEngr 1202 ECE. Clean Room Project
Engr 1202 ECE Clean Room Project Dilbert the engineer gets special recognition September 2005 2014 Version does not even have my name! AC vs. DC Circuits DC and AC devices in everyday life DC Devices
More informationSpectrum Management. Justin Taylor ATS systems
Spectrum Management Justin Taylor ATS systems What Is Spectrum Management Spectrum management refers to the process of regulating the RF spectrum, either for an entire country or at a particular location
More informationDEFINING THE FUTURE OF SATELLITE SURVEYING WITH TRIMBLE R-TRACK TECHNOLOGY
DEFINING THE FUTURE OF SATELLITE SURVEYING WITH TRIMBLE R-TRACK TECHNOLOGY EDMOND NORSE, GNSS PORTFOLIO MANAGER, TRIMBLE SURVEY DIVISION WESTMINSTER, CO USA ABSTRACT In September 2003 Trimble introduced
More informationIntroduction. Global Positioning System. GPS - Intro. Space Segment. GPS - Intro. Space Segment - Contd..
Introduction Global Positioning System Prof. D. Nagesh Kumar Dept. of Civil Engg., IISc, Bangalore 560 012, India URL: http://www.civil.iisc.ernet.in/~nagesh GPS is funded and controlled by U. S. Department
More informationDYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS
DYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS Alison K. Brown (NAVSYS Corporation, Colorado Springs, Colorado, USA, abrown@navsys.com); Nigel Thompson (NAVSYS Corporation, Colorado
More informationLocation Discovery in Sensor Network
Location Discovery in Sensor Network Pin Nie Telecommunications Software and Multimedia Laboratory Helsinki University of Technology niepin@cc.hut.fi Abstract One established trend in electronics is micromation.
More informationGlobal Navigation Satellite System (GNSS) GPS Serves Over 400 Million Users Today. GPS is used throughout our society
Global avigation Satellite System (GSS) For freshmen at CKU AA December 10th, 2009 by Shau-Shiun Jan ICA & IAA, CKU Global avigation Satellite System (GSS) GSS (Global Positioning System, GPS) Basics Today
More informationNext Generation Positioning Infrastructure
Next Generation Positioning Infrastructure The GNSS Network in the 21 st Century Joel VAN CRANENBROECK & Partners Beyond East & West GeoSensing Community 1 INFRASTRUCTURE "The installations that form the
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationDeveloping a GNSS resiliency framework for timing receivers. By Guy Buesnel and Adam Price Spirent Communications, October 2017
Developing a GNSS resiliency framework for timing receivers By Guy Buesnel and Adam Price, October 2017 Overview of Spirent Positioning and Timing Mobile Devices Military Applications Commercial Air Travel
More informationDimov Stojče Ilčev. CNS Systems
Stratospheric Platform Systems (SPS) Presentation by: Dimov Stojče Ilčev Durban University of Technology (DUT) Space Science Centre (SSC) CNS Systems August 2011 SPS for Mobile CNS Applications Stratospheric
More informationWorking Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]
Radiocommunication Study Groups Source: Subject: Document 5B/TEMP/376 Draft new Recommendation ITU-R M.[500kHz] Document 17 November 2011 English only Working Party 5B DRAFT NEW RECOMMENDATION ITU-R M.[500KHZ]
More informationEnsuring Robust Precision Time: Hardened GNSS, Multiband, and Atomic Clocks. Lee Cosart WSTS 2018
Power Matters. Ensuring Robust Precision Time: Hardened GNSS, Multiband, and Atomic Clocks Lee Cosart lee.cosart@microsemi.com WSTS 2018 Outline Introduction The Challenge Time requirements increasingly
More informationJamming Wireless Networks: Attack and Defense Strategies
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models
More informationWireless systems. includes issues of
Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization
More informationQuartz Lock Loop (QLL) For Robust GNSS Operation in High Vibration Environments
Quartz Lock Loop (QLL) For Robust GNSS Operation in High Vibration Environments A Topcon white paper written by Doug Langen Topcon Positioning Systems, Inc. 7400 National Drive Livermore, CA 94550 USA
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationTracking New Signals from Space GPS Modernization and Trimble R-Track Technology
Tracking New Signals from Space GPS Modernization and Trimble R-Track Technology Edmond T. Norse Trimble Integrated Surveying Group, Westminster, Colorado U.S. TRIMBLE 2 Tracking New Signals from Space
More informationApplying Defence-in-depth to counter RF interferences over GNSS
Applying Defence-in-depth to counter RF interferences over GNSS IET 5th Oct. 2011 Xavier Bertinchamps - GSA Objective of this presentation Understand Jamming threat on GNSS Propose a comprehensive strategy
More informationGalileo Aktueller Stand der Entwicklung
Galileo Aktueller Stand der Entwicklung Is there a positive perspective for Galileo? Dr. Philipp Berglez TeleConsult Austria GmbH GSV-Forum Galileo das europäische Satellitennavigationssystem eine neue
More informationGet in Sync and Stay that Way
Get in Sync and Stay that Way CHOOSING THE RIGHT FREQUENCY FOR YOUR WIRELESS TIMEKEEPING SOLUTION Prepared by Primex Wireless 965 Wells Street Lake Geneva, WI 53147 U.S. 800-537-0464 Canada 800-330-1459
More informationEntity Tracking and Surveillance using the Modified Biometric System, GPS-3
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 9 (2013), pp. 1115-1120 Research India Publications http://www.ripublication.com/aeee.htm Entity Tracking and Surveillance
More informationPrinciples of. Principles of GPS 9/12/2011
Principles of GPS How the Global Positioning System works is, conceptually, really very simple The GPS system is based on a distance measuring (satellite ranging) system That means that we find our position
More informationWhat is a GPS How does GPS work? GPS Segments GPS P osition Position Position Accuracy Accuracy Accuracy GPS A pplications Applications Applications
What is GPS? What is a GPS How does GPS work? GPS Segments GPS Position Accuracy GPS Applications What is GPS? The Global Positioning System (GPS) is a precise worldwide radio-navigation system, and consists
More informationProposal # xxxxxxxxxxxx. Intercept Jammer. Date:
Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products
More informationWhite Paper. GPS Jamming. Increasing system resilience to counteract intentional and unintentional GPS signal interferences
White Paper GPS Jamming Increasing system resilience to counteract intentional and unintentional GPS signal interferences Mark Hendrick, Engineering Program Manager 07/2011 1474-002 RevA White Paper GPS
More informationCanadian Coast Guard Review to Implement a Resilient Position, Navigation and Timing Solution for Canada. Mariners Workshop January 31 st, 2018
Canadian Coast Guard Review to Implement a Resilient Position, Navigation and Timing Solution for Canada Mariners Workshop January 31 st, 2018 Outline Overview of GNSS use in the marine sector CCG Activities
More informationUsing GPS in Embedded Applications Pascal Stang Stanford University - EE281 November 28, 2000
Using GPS in Embedded Applications Pascal Stang Stanford University - EE281 INTRODUCTION Brief history of GPS Transit System NavStar (what we now call GPS) Started development in 1973 First four satellites
More informationGPS Modernization and Program Update
GPS Modernization and Program Update GPS Update to ION Southern California Chapter 22 Feb 2011 Colonel Bernie Gruber Director Global Positioning Systems Directorate Contents Current Constellation Modernization
More informationRECOMMENDATION ITU-R BS
Rec. ITU-R BS.1350-1 1 RECOMMENDATION ITU-R BS.1350-1 SYSTEMS REQUIREMENTS FOR MULTIPLEXING (FM) SOUND BROADCASTING WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY FOR STATIONARY
More informationThe Effect of Radio Frequency Interference on GNSS Signals and Mitigation Techniques Presented by Dr. Tarek Attia
International Conference and Exhibition Melaha2016 GNSS WAY Ahead 25-27 April2016, Cairo, Egypt The Effect of Radio Frequency Interference on GNSS Signals and Mitigation Techniques Presented by Dr. Tarek
More informationELECTRONIC BULLETIN For information only
International Civil Aviation Organization ELECTRONIC BULLETIN For information only EB 2011/56 AN 7/5 21 November 2011 INTERFERENCE TO GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) SIGNALS 1. Aviation operations
More informationWhere Next for GNSS?
Where Next for GNSS? Professor Terry Moore Professor of Satellite Navigation Nottingham The University of Nottingham Where Next for GNSS Back to the Future? Professor Terry Moore Professor of Satellite
More informationGPS Global Positioning System
GPS Global Positioning System 10.04.2012 1 Agenda What is GPS? Basic consept History GPS receivers How they work Comunication Message format Satellite frequencies Sources of GPS signal errors 10.04.2012
More informationMHz. Figure 1: spectrum plot of the L1 band without interference with the GPS L1C/A central frequency indicated
White paper Internet or Positioning? Abstract Centimetre-level RTK or PPP positioning requires high quality GNSS measurements. By virtue of their low power however, GNSS signals are prone to interference
More informationGNSS Jamming: A Short Survival Guide
GNSS Jamming: A Short Survival Guide Daniele Borio 15-16 November 2016 International Technical Symposium on Navigation and Timing (ITSN 2016) The European Commission s science and knowledge service 1 Joint
More informationINVESTIGATION OVER JAMMING IN THE ASPECT OF THE CONSTRUCTION OF THE GNSS RECEIVER
INVESTIGATION OVER JAMMING IN THE ASPECT OF THE CONSTRUCTION OF THE GNSS RECEIVER Andrzej Felski 1), Aleksander Nowak 2), Marta Gortad 3) 1) Polish Naval Academy, Gdynia, Poland, a.felski@amw.gdynia.pl
More informationCivil GPS Systems and Potential Vulnerabilities
Civil GPS Systems and Potential Vulnerabilities Major David Hoey, 746 th Test Squadron Paul Benshoof, 746 th Test Squadron Distribution A: Approved for public release; distribution unlimited. AAC/PA 09-01-05-348
More informationThe Importance of Bit Depth in GNSS Record and Playback Testing
The Importance of Bit Depth in GNSS Record and Playback Testing Why bit depth quantisation matters when recording real-world signals for playback in the lab Record and Playback Testing: Why Bit Depth Matters
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationThe Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR
The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR Professor Gérard Lachapelle & Dr. Ali Broumandan PLAN Group, University of Calgary PLAN.geomatics.ucalgary.ca IGAW 2016-GNSS
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationLecture-1 CHAPTER 2 INTRODUCTION TO GPS
Lecture-1 CHAPTER 2 INTRODUCTION TO GPS 2.1 History of GPS GPS is a global navigation satellite system (GNSS). It is the commonly used acronym of NAVSTAR (NAVigation System with Time And Ranging) GPS (Global
More informationWhy (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System
Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix
More informationPrimer on GPS Operations
MP Rugged Wireless Modem Primer on GPS Operations 2130313 Rev 1.0 Cover illustration by Emma Jantz-Lee (age 11). An Introduction to GPS This primer is intended to provide the foundation for understanding
More informationIntroduction GNSS RF interference. Jan-Joris van Es (NLR) January 2018
Introduction GNSS RF interference Jan-Joris van Es (NLR) January 2018 Contents Introduction Definition of RF Interference Types of RF interference Mitigation introduction GNSS RF interference, January
More informationRF Management in SonicOS 4.0 Enhanced
RF Management in SonicOS 4.0 Enhanced Document Scope This document describes how to plan, design, implement, and maintain the RF Management feature in SonicWALL SonicOS 4.0 Enhanced. This document contains
More informationGNSS RFI/Spoofing: Detection, Localization, & Mitigation
GNSS RFI/Spoofing: Detection, Localization, & Mitigation Stanford's 2012 PNT Challenges and Opportunities Symposium 14 - November - 2012 Dennis M. Akos University of Colorado/Stanford University with contributions
More informationA Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing
LAUR-03-2384 The Journal of Security Administration 25, 19-28 (2002). A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing Jon S. Warner, Ph.D. and Roger G. Johnston,
More informationGalileo System and Signal Evolution
Galileo System and Signal Evolution Stefan Wallner GNSS/Galileo Evolutions Programme ITSNT, 15/11/2017 HOW TO DESIGN A GNSS SYSTEM FOR THE YEAR 2040 15/11/2017 Slide 2 Navigation Exponential Evolution
More informationGPS/QZSS Signal Authentication Concept
GPS/QZSS Signal Authentication Concept Dinesh Manandhar, Koichi Chino, Ryosuke Shibasaki The University of Tokyo Satoshi Kogure, Jiro Yamashita, Hiroaki Tateshita Japan Aerospace Exploration Agency (JAXA)
More informationReport of the Working Group B: Enhancement of Global Navigation Satellite Systems (GNSS) Services Performance
Report of the Working Group B: Enhancement of Global Navigation Satellite Systems (GNSS) Services Performance 1. The Working Group on Enhancement of Global Navigation Satellite Systems (GNSS) Service Performance
More informationFuture Dual Systems for Landing. The DGNSS PALS opportunity Marco Donfrancesco Intelligence & Cyber EW Sales & Mktg
Future Dual Systems for Landing. The DGNSS PALS opportunity Marco Donfrancesco Intelligence & Cyber EW Sales & Mktg SG-175 DGNSS PALS study The study shall provide technical advice on the data link capabilities
More informationGPS Interference Detection & Mitigation
GPS Interference Detection & Mitigation GAARDIAN GNSS AVAILABILITY ACCURACY RELIABILITY and INTEGRITY ASSESSMENT for TIMING and NAVIGATION A Technology Strategy Board funded collaboration Charles Curry,
More informationUpdate on GPS L1C Signal Modernization. Tom Stansell Aerospace Consultant GPS Wing
Update on GPS L1C Signal Modernization Tom Stansell Aerospace Consultant GPS Wing Glossary BOC = Binary Offset Carrier modulation C/A = GPS Coarse/Acquisition code dbw = 10 x log(signal Power/1 Watt) E1
More informationEuropean GNSS: Galileo and EGNOS for next generation Road Charging
European GNSS: Galileo and EGNOS for next generation Road Charging 20 th October 2014 Gian Gherardo Calini European GNSS Agency (GSA) GNSS have made a huge impact in our society it is key in Road transportation
More informationGPS Adjacent Band Compatibility Assessment
GPS Adjacent Band Compatibility Assessment Space-Based PNT Advisory Board Meeting May 18, 2016 EXCOM Co-Chair Letter to NTIA... without affecting existing and evolving uses of space-based PNT services
More informationGLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) ECE 2526E Tuesday, 24 April 2018
GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) ECE 2526E Tuesday, 24 April 2018 MAJOR GLOBAL NAVIGATION SATELLITE SYSTEMS (GNSS) Global Navigation Satellite System (GNSS) includes: 1. Global Position System
More informationMaking Military PNT Systems Resilient Against Threats: Recent Advances
Making Military PNT Systems Resilient Against Threats: Recent Advances Spectracom White Paper By John Fischer, VP, Advanced R&D and Hendrik van Edig, Documentation Engineer Oct. 2017 Executive Summary
More informationFieldGenius Technical Notes GPS Terminology
FieldGenius Technical Notes GPS Terminology Almanac A set of Keplerian orbital parameters which allow the satellite positions to be predicted into the future. Ambiguity An integer value of the number of
More informationPublic or Private (2)
// Public or Private () CCST90 Mar, 0 Dr. Hayden Kwok-Hay So Department of Electrical and Electronic Engineering The Making of Google Street View Google Street View Systematically capture photos of the
More informationGNSS Technologies. GNSS Acquisition Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey
GNSS Acquisition 25.1.2016 Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey Content GNSS signal background Binary phase shift keying (BPSK) modulation Binary offset carrier
More informationGNSS for UAV Navigation. Sandy Kennedy Nov.15, 2016 ITSNT
GNSS for UAV Navigation Sandy Kennedy Nov.15, 2016 ITSNT Sounds Easy Enough Probably clear open sky conditions?» Maybe not on take off and landing Straight and level flight?» Not a valid assumption for
More informationWhat s new in satellite navigation for road. Fiammetta Diani, Deputy Head Market Development Department European GNSS Agency
What s new in satellite navigation for road Fiammetta Diani, Deputy Head Market Development Department European GNSS Agency May 2017 Why location (and satellite navigation) matters? 2 Galileo is the Satellite
More information(In)security of smart transportation at sea
Application Security: internet, mobile ed oltre (In)security of smart transportation at sea Dr. Marco Balduzzi Venezia, 3 ottobre 2014 (In)security of smart transportation at sea - DR. MARCO BALDUZZI 3.10.2014
More informationGNSS VULNERABILITY AND CRITICAL INFRASTRUCTURE
GNSS VULNERABILITY AND CRITICAL INFRASTRUCTURE NNF CONFERENCE 24 MAY 2012 Brynjar Hansen Senior adviser Norwegian Space Centre Lars Giske Senior adviser Norwegian Space Centre MULTI GNSS EXTERNAL COOPERATION
More informationKing AbdulAziz University. Faculty of Environmental Design. Geomatics Department. Mobile GIS GEOM 427. Lecture 3
King AbdulAziz University Faculty of Environmental Design Geomatics Department Mobile GIS GEOM 427 Lecture 3 Ahmed Baik, Ph.D. Email: abaik@kau.edu.sa Eng. Fisal Basheeh Email: fbasaheeh@kau.edu.sa GNSS
More informationHeidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I con
Heidi Robinson Today, I m going to talk to you about resiliency. Resiliency is not a term that is easily defined nor is it easily achievable. As I continue to talk to you today, I will introduce some more
More informationWireless technologies Test systems
Wireless technologies Test systems 8 Test systems for V2X communications Future automated vehicles will be wirelessly networked with their environment and will therefore be able to preventively respond
More informationMethod, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing
Method, algorithm and implementation of vehicles GNSS information protection with help of anti-jamming and anti-spoofing Larisa Dobryakova 1, Lukasz Lemieszewski 2 and Evgeny Ochin 3 1 West Pomeranian
More informationSoftware Defined Radio. Listening to the Bleeps and Bloops around you
Software Defined Radio Listening to the Bleeps and Bloops around you Software Defined Radio in a nutshell Like a FM radio, but can receive a wider radio spectrum range Quick Peek at Radio Frequencies
More informationLocalization: Algorithms and System
Localization: Algorithms and System Applications of Location Information Location aware information services e.g., E911, location-based search, target advertisement, tour guide, inventory management, traffic
More information