Top Banner
Nathaniel Carson David Bevly | Department of Mechanical Engineering 28 JANUARY 2015 Defending GPS against the Spoofing Threat using Network Based Detection and Successive Interference Cancellation November, 2015 1
35

November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an...

Mar 12, 2018

Download

Documents

lamdang
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Nathaniel Carson

David Bevly | Department of Mechanical Engineering

28 JANUARY 2015

Defending GPS against the Spoofing Threat using Network Based Detection and Successive Interference Cancellation

November, 2015

1

Page 2: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Introduction to GPS and Motivation for Spoofing Prevention

•  GPS Signals Background

•  Spoofing Background – Methods and Effect

•  Advanced Spoofing Technique

•  Detection of an Advanced Spoofing Attack in a Network

•  Mitigation of the Attack

•  Results

•  Conclusions and Future Work

2

Page 3: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Growing dependence on civilian L1 GPS signals in the Financial, Industrial, and Commercial sectors

•  Protecting its integrity is critical

Financial institutions track transactions using a GPS timestamp

Fig. 1: http://www.trimble.com/mappingGIS/juno3.aspx Fig. 2: http://www.pascoedc.com/blog/2012/07/06/from-wall-street-to-florida/ Fig. 3: http://www.truckconvoy.ca/default.asp?contentID=11

Fig. 3

Fig. 2

Algorithms for semi or fully autonomous truck convoying utilize accurate GPS positions

Fig. 1

Many users rely on handheld devices for every day navigation

3

Fig. 1

Page 4: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Each GPS satellite transmits a 1575.42 MHz signal modulated by multiple messages

•  The PRN is a unique satellite identifier 1023 bits long repeated every millisecond

•  The navigation message contains the Z-count, ephemeris, and other critical information - Each navigation bit is 20ms in length [1]

4 Fig. 1: http://what-when-how.com/space-science-and-technology/global-positioning-system-gps-2/

Fig. 1

Page 5: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Mathematically, the signal coming from satellite k is given by [2]:

A = incoming signal amplitude C = C/A code signal D = Navigation signal Δt = Time difference t-τ caused by time delay τ fL1 = L1 carrier basis frequency fd = Doppler shift θ = carrier phase shift γ(t) = noise

•  The form of the signal will be similar when spoofing is present

5

Page 6: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Every receiver performs acquisition to detect GPS signals •  The incoming signal is searched for each PRN by comparing it to a

locally generated replica and looking for a correlation •  The signal will be stretched (Doppler effect) and shifted in time

resulting in a two-dimensional search space •  Acquisition processes are important in understanding suppression

of a spoofed signal [3]

6 Fig. 1: http://what-when-how.com/a-software-defined-gps-and-galileo-receiver/acquisition-gps-and-galileo-receiver-part-1//

Fig. 1

Page 7: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  GPS spoofing is an attack (intentional or unintentional) in which a receiver is deceived into tracking false GPS signals and calculating an errant position solution

•  As described by Christoph Günther the spoofed signal causes the receiver to compute pseudorange [4]:

•  And position state (Spoofer Position):

7

Page 8: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  In the tracking stage, a receiver is somewhat hardened since the correlators will not quickly transition to a new signal

•  However, when a receiver enters or re-enters the acquisition stage, it becomes susceptible to spoofing

True Peak Spoofed Peak

8

Page 9: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  “Simple” spoofing is often easily detectable •  More advanced techniques have been developed which allow an

attacker to hijack a receiver in the tracking stage leaving no evidence of an attack

9

Fig. 1

Fig. 2

•  With knowledge of target position and velocity, the GPS signals present at the target location may be simulated

•  The target receiver’s correlators are lifted off the true signal and begin tracking the false signal [5]

Figure   showing   receiver   correlators   dragged  away  by  a  spoofed  peak.  Green  dots  represent  early   late   and   prompt   correlators   while   the  dashed  line  represents  the  spoofed  signal.  

Page 10: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Authentic signal coming from satellite k is given by:

A = incoming signal amplitude C = C/A code signal D = Navigation signal Δt = Time difference t-τ caused by time delay τ fL1 = L1 carrier basis frequency fd = Doppler shift θ = carrier phase shift γ(t) = noise

•  Spoofed signal simulating satellite q

•  Total signal in the presence of spoofing [4]

10

Page 11: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  GPS is often used in the context of a local network §  Truck Convoying (Ultra Wide Band Radio UWB) §  Cell phone networks §  Cooperative Adaptive Cruise Control Vehicles (LIDAR)

11

•  Spoofing in a network involve many scenarios §  Single vehicle - single spoofer §  Multiple vehicles - single spoofer §  Multiple vehicle - multiple

spoofers

Fig: http://www.kbb.com/car-news/all-the-latest/toyota-previews-new-automated-driver_assist-systems/2000009775/

Fig. 1

Page 12: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Detection Algorithm 1.  Compute RPVs 2.  Establish threshold 3.  Compare to Radar

•  Magnitude comparison •  Vector comparison

4.  If measurement exceeds threshold, next measurement is evaluated

5.  Alert user to spoofing and activate SIC

12

Page 13: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  This detection method is effective on advanced forms of spoofing

•  Operates using existing network information minimizing implementation costs

•  Addresses spoofing threat in all vehicle node configurations §  Single spoofer – single node §  Single spoofer – multiple nodes §  Multiple spoofers – multiple nodes

§  As with any detection method, network detection is not totally fool-proof but does allow very reliable fault detection in a network

13

Page 14: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  After detection, regaining the authentic signals becomes the goal •  Successive interference cancellation (SIC) eliminates spoofed signal

in the IF stage •  SIC reduces the noise caused by multiple signals in the L1 band

14

Page 15: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Detection and Suppression Flowchart

Data Shared between Nodes: •  GPS (Position, Velocity, DOP, Health info) •  Ranging information (if sensors are mounted on that node)

15

Page 16: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Data collection with real spoofing data is difficult necessitating the development of a modular simulation to test both aspects of the algorithm

•  Novatel OEMStar used to collect real GPS positions on vehicles

•  Spoofing was added to the resultant trajectories to test detection algorithm

•  RADAR vectors between nodes were simulated

16

Page 17: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Leader-Follower Trajectories

Tree Cover and Multi-Path

17

Page 18: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Detection Algorithm Displays

Spoofing Detected

•  Spoofing was detected 5 seconds after initiation (4 seconds after trajectory alteration)

•  Spoofing threshold shows response to changes in DOP and variances minimizing false alarms

18

Page 19: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  RF data was generated using a Spectracom GNSS simulator •  The signal was down-converted and sampled using Ettus Research

Universal Software Radio Peripheral (USRP™) front ends •  The IF frequency files were combined in software with varying

delay simulating a spoofing scenario •  Data was also generated in Matlab to allow greater precision and

manipulation of signal parameters

19

Page 20: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  The first scenario involves significant separation both spatially and in time – delay of roughly 30µs

20

Page 21: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  The spoofed peak is totally suppressed from the correlation plane •  The authentic peak remains unaffected

Spoofed Peak Suppressed

Authentic Peak

Before Suppression After Suppression

Spoofed Peak

Authentic Peak

21

Page 22: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Position Solution Before SIC Position Solution After SIC

22

Page 23: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  The second scenario involves minimal separation both spatially and in time – delay of roughly 2µs

23

Page 24: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  The spoofed peak is totally suppressed from the correlation plane •  The authentic peak remains unaffected

Spoofed Peak Suppressed

Authentic Peak

Before Suppression After Suppression

Spoofed Peak

Authentic Peak

24

Page 25: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Position Solution Before SIC Position Solution After SIC

25

Page 26: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Position Solution Before SIC Position Solution After SIC

26

Page 27: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Conclusions • Detection algorithm demonstrates ability to rapidly identify spoofing • Spoofing was detected in all tested scenarios • Suppression algorithm eliminated spoofed signal providing cleaned data to the GPS receiver’s acquisition and tracking loops

Future Work • Implement in real time • Add functionality to handle several additional nodes in detection • Decrease time to detection • Implement in-line module for both detection and suppression for use with COTS receivers

27

Page 28: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Thank You!

28

Page 29: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

Humphreys (2012) – “Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle”

Ø  Unmanned helicopter taken down by capturing GPS receiver

Psiaki (2013) – “GNSS Spoofing Detection Using High Frequency Antenna Motion and Carrier Measurements”

Ø  Spoofing Detection using antenna motion correlated to phase measurements Gunther (2014) – “A Survey of Spoofing and Counter-Measures”

Ø  Overview of spoofing methodologies and current prevention technologies

Psiaki, Humphreys (2014) – “GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase”

Ø  Detection of advanced attacks using differential carrier phase Broumandan (2014) – “Spoofing Detection, Classification, and Cancellation Receiver

Architecture for Moving GNSS receiver” Ø  Classification of signals using Doppler characterization Ø  Application of SIC to basic spoofing attacks

29

Page 30: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  As carrier waves align closely in phase, beating patterns emerge •  The waves align successively in-phase then out of phase •  Beating only occurs in the first 1-2 µs shift of the GPS signal •  The PRN prevents beating when the misalignment is larger than 1-2 µs

30 Fig: http://www.pstcc.edu/departments/natural_behavioral_sciences/Web%20Physics/Chapter017.htm

Page 31: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  Beating causes huge variations in the power levels and affects the ability of the tracking loops to estimate signal parameters

31

Page 32: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  The interference patterns are visible in the correlation plane

32

Page 33: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

33

Page 34: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

•  SIC effectively suppressed closely aligned signals •  The effects of interference make SIC more difficult at separation

intervals less than 2µs

2 Chip Separation 1 Chip Separation 1/2 Chip Separation

34

Page 35: November, 2015 Defending GPS against the Spoofing · PDF file• “Simple” spoofing is often easily detectable • More advanced techniques have been developed which allow an attacker

35

1.  P. Misra and P. Enge, “Global Positioning System: Signals, Measurements, and Performance.” Ganga-Jamuna Press, 2011.

2.  D. o. D. GPS NAVSTAR, “Global position system precise positioning service performance standard," Print, 2007.

3.  K. Borre, D. Akos, N. Bertlesen, P. Rinder, and S. H. Jensen, “A Software-Defined GPS and Galileo Receiver: A Single Frequency Approach. Birkhauser, 2007.

4.  C. Gunther, “A survey of spoofing and counter-measures," Navigation, vol. 61, no. 3, pp. 159-177, 2014.

5.  D. Shepard, J. Bhatti, and T. Humphreys, “Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle," GNSS World, The Business and Technology of GNSS, 2014.