Top Banner
Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O’ Hanlon, Paul Kintner, Cornell University Paul Montgomery, Novariant
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Assessing Spoofing Threat

Assessing the

Civil GPS Spoofing ThreatTodd Humphreys, Jahshan Bhatti, University of Texas at Austin

Brent Ledvina, Virginia Tech/Coherent Navigation

Mark Psiaki, Brady O’ Hanlon, Paul Kintner, Cornell University

Paul Montgomery, Novariant

Page 2: Assessing Spoofing Threat

Spoofing Threat Overview

“As GPS further penetrates into the civil infrastructure, it becomes a tempting target that could be exploited by individuals, groups, or countries hostile to the U.S.” -- 2001 DOT Volpe Report

•“There also is no open information on ... the expected capabilities of spoofing systems made from commercial components.”•“Information on the capabilities, limitations, and operational procedures [of spoofers] would help identify vulnerable areas and detection strategies.” -- 2001 DOT Volpe Report

Logan Scott, “Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation

Systems,” ION GNSS 2003.

“A gathering threat …” -- Logan Scott, “Location Assurance,” GPS World, July 2007

“Signal definition intertia is enormous.” -- T. Stansell, “Location Assurance Commentary,” GPS World, July 2007

December 2009: Civilian GPS receivers as vulnerable as ever.

September 2008: Humphreys, Ledvina et al. present work on civil spoofer.

Page 3: Assessing Spoofing Threat

GPS: Dependency Begets Vulnerability

Banking and Finance

Communications

Energy

Transportation

From Dane Egli, IDA

Banking and Finance

Communications

Energy

Transportation

From Dane Egli, IDA

Banking and Finance

Communications

Energy

Transportation

From Dane Egli, IDA

Page 4: Assessing Spoofing Threat

Monitor the relative GPS signal strength

Monitor satellite identification codes and the

number of satellite signals received

Check the time intervals

Do a time comparison (look at code phase jitter)

Perform a sanity check (compare with IMU)

Monitor the absolute GPS signal strength Warner and Johnston, “GPS Spoofing Countermeasures,” 2003

http:/www.homelandsecurity.org/bulletin/Dual%20Benefit/warner_gps_spoofing.html

Employ two antennas; check relative phase against known satellite directions

Cryptographic methods:

Encrypt navigation data bits

Spreading code authentication

Suggested by Dept.of HomelandSecurity

Other Suggested Techniques

Suggested Spoofing Countermeasures

To accurately assess the spoofing threat and to design effective practical countermeasures, we concluded that it was necessary to go through the exercise of building a civilian GPS spoofer

Page 5: Assessing Spoofing Threat

Goals

Assess the spoofing threat:

Build a civilian GPS spoofer

Q: How hard is it to mount a spoofing attack?

Q: How easy is it to detect a spoofing attack?

Investigate spoofing countermeasures:

Stand-alone receiver-based defenses

More exotic defenses

Page 6: Assessing Spoofing Threat

Spoofing Threat Continuum

Simplistic Intermediate Sophisticated

Commercial signalsimulator

Portable software radio

Coordinated attack bymultiple phase-locked spoofers

Page 7: Assessing Spoofing Threat

The Most Likely Threat:

A Portable Receiver-Spoofer

The portable receiver-spoofer architecture simplifies a spoofing attack

Page 8: Assessing Spoofing Threat

Receiver-Spoofer Architecture

GP2015

RF Front End

Software

Correlators

Texas Instruments DSP

Tracking

Loops, Data

Decoding,

Observables

Calculations

sign

mag

clk

FFT-based

Acquisition

Spoofer

Module

D/A,

Mixing,

Amplification

sign clk

Cornell “GRID” Software-Defined GPS Receiver

Page 9: Assessing Spoofing Threat

Signal Correlation Techniques (1/2)

Page 10: Assessing Spoofing Threat

Signal Correlation Techniques (2/2)

Page 11: Assessing Spoofing Threat

Details of Receiver-Spoofer

Page 12: Assessing Spoofing Threat

Receiver-Spoofer Hardware – DSP Box

GRID: Dual-Frequency Software-Defined GPS Receiver

All digital signal processing implemented in C++

on a high-end DSP

Marginal computational demands:

Tracking: ~1.2% of DSP per channel

Spoofing: ~4% of DSP per channel

Page 13: Assessing Spoofing Threat

Spoofer RF Transmission Hardware

Page 14: Assessing Spoofing Threat

Full capability:

12 L1 C/A & 10 L2C tracking channels

10 L1 C/A simulation channels

1 Hz navigation solution

Acquisition in background

Full Receiver-Spoofer

Page 15: Assessing Spoofing Threat

Spoofing Attack Demonstration (offline)

Page 16: Assessing Spoofing Threat

Spoofing Attack Demonstration

(real-time, over-the-air)

Page 17: Assessing Spoofing Threat

Hard to retransmit data bits

with < 1ms latency

Jam first, then spoof

Jam-then-spoof attack may

raise alarm

Predict data bits

Hard to predict data bits

during protected words and at

ephemeris update boundaries

Arbitrarily populate

protected words, continue

across ephemeris boundary

with old data

No stand-alone

countermeasure – must

appeal to data bit aiding

Data bit latency defense

Countermeasures (1/5)

Page 18: Assessing Spoofing Threat

Hard to conceal telltale peak

in autocorrelation function

Masquerade as multipath

Limits perturbation to < 1 chip

Suppress authentic peak

Requires phase alignment for

each signal at target antenna

Vestigial signal defense

Countermeasures (2/5)

Page 19: Assessing Spoofing Threat

2/11/09 19Proprietary

Countermeasures (3/5) Multi-antenna defense

Page 20: Assessing Spoofing Threat

The GPS Assimilator modernizes and makes existing GPS equipment

resistant to jamming and spoofing without requiring hardware or

software changes to the equipment

Countermeasures (4/5) Assimilative defense

Page 21: Assessing Spoofing Threat

Countermeasures (5/5)

Cryptographic defense based on estimation of W-bits

GPS

transmitter

UE receiver w/semi-

codeless processing

High-gain

ground-based

antenna array

Public key

encryptor Secure

uplink

GEO “bent-

pipe”

broadcast

transceiver

UE receiver for truth W-

bit data

Integrate-

and-dump

register

Public key

decryptor

Spoofing

detector

L1 C/A

& P(Y)

Wtrue

Wtrue

West

User

Equipment

New Infrastructure

Page 22: Assessing Spoofing Threat

Findings (1/2)

Bad news:

It’s straighforward to mount an intermediate-level spoofing

attack

Good news:

It’s hard to mount a sophisticated spoofing attack, and

there appear to be inexpensive defenses against lesser

attacks

Bad news:

There is no defense short of embedding cryptographic

signatures in the spreading codes that will defeat a

sophisticated spoofing attack

Page 23: Assessing Spoofing Threat

Findings (2/2)

Good news:

With the addition of each new modernized GNSS signal,

the cost of mounting a spoofing attack rises markedly

Bad news:

FPGAs or faster DSPs would make multi-signal attacks

possible

More bad news:

There will remain many single-frequency L1 C/A code

receivers in critical applications in the years ahead

Page 24: Assessing Spoofing Threat

Are We Safe Yet?

No. There is much much work to be done:

Characterization of spoofing signatures in full RF

attack

Development and testing of more effective

countermeasures, including stand-alone

countermeasures and and network-based

cryptographic countermeasures

Encourage commercial receiver manufacturers to

adopt spoofing countermeasures