Robust GPS-Based Timing for Phasor Measurement Units
|
|
- Jonas Small
- 5 years ago
- Views:
Transcription
1 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T 1
2 How to Make GPS-based Timing Robust? TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 2
3 Facts about GPS GPS provides timing for many applications, such as PMUs GPS civil signals are unencrypted Only GPS military signals are encrypted Civil users (e.g. PMUs) do not have access to the military codes GPS civil signal structures are completely open GPS civil signal definition is published in its Interface Control Documents (ICD) GPS received signals are extremely weak GPS satellites are 20,200 km (12,550 miles) away GPS is operational Satellites in orbits Signals being broadcast Billions of GPS receivers in use TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 3
4 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 4
5 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 5
6 Cooperative Authentication: Architecture Our proposed approach: cooperat ive aut hent icat ion I got my location. Can you guys check if I was spoofed? Cross-check receiver #1 Cross-check receiver #2 Your snippet matches mine. You are not spoofed! A snippet of baseband GNSS signal A high correlation! You are good, bro. User receiver It doesn t match mine. You might be spoofed. Cross-check receiver #N Merits: network and geographical redundancy 5 / 20 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 6
7 Pair-wise Checking: Cross-correlation of P(Y) Code Lo et al., 2009 Psiaki, Humphreys et al., 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 7
8 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 8
9 Pairwise Check TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 9
10 Pairwise Check Ideal Results Pair-wise Check Ideal Results Not Spoofed Spoofed Pair-wise Check In-phase Baseband Correlation (C/A) 40 ms 40 Correlation peaks Quadraturephase Baseband Correlation (P(Y)) Single Correlation peak No Correlation peak Spoofer cannot generate TRUSTWORTHY CYBER INFRASTRUCTURE FOR FOR THE POWER THE POWER GRID GRID TCIPG.ORG TCIPG.ORG 24 10
11 Modeling Pairwise Check P(Y) codes don t match TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 11
12 Experiments with Different Scenarios 3000km San Francisco CA and Champaign IL, static 22km Rantoul IL, moving at ~45 mph and Champaign IL, static TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 12
13 Experiments: San Francisco & UIUC Everitt Lab GPS Front End Receiver SiGe Sampler 2 bit quantization Bandwidth: 2.72MHz Low cost, off the shelf Antenna Novatel Antenna GPS Front End Receiver SiGe Sampler 2 bit quantization Bandwidth: 2.72MHz TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 13
14 Pairwise Results for Different Separations 3000km separation 22km separation Almost no Residual Correlation Some Residual Correlation Near ideal Correlation Could detect spoofing Could detect spoofing TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 14
15 SNR Affects Pair-wise Check Performance TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 15
16 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 16
17 Modeling Unreliable Cross-Check Receivers TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 17
18 Authentication Performance, Theoretical Results Pair-wise false alarm rate Pair-wise missed detection rate Probability of being spoofed by a different spoofer Probability of being spoofed by the same spoofer Authentication performance improves exponentially with increasing number of cross-check receivers. P SS causes twice as great performance deterioration as P SD does. Choose a cross-check receiver far from the user receiver. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 18
19 Receiver Operating Characteristic (ROC) Curves TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 19
20 Performance of Cooperative Authentication Assume 20% of the cross-check receivers are spoofed (an extremely challenging assumption) Probability of missed detection (P MD = 1 - P D ) 10 0 P MD = P SS = 0, P SD = 0 P SS = 0.02, P SD = 0.18 P SS = 0.1, P SD = 0.1 P SS = 0.18, P SD = Number of cross-check receivers (N) Probability of missed detection Probability of false alarm (P FA ) P SS = 0, P SD = 0 P SS = 0.02, P SD = 0.18 P SS = 0.1, P SD = 0.1 P SS = 0.18, P SD = 0.02 P FA = Number of cross-check receivers (N) Probability of false alarm Robustness grows exponentially with the number of cross-check receivers A small number of unreliable cross-check receivers are on par with a reliable cross-check receiver. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 20
21 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 21
22 Approach: Position-Information-Aided (P.I.A.) Vector Tracking Approach: Vector tracking Reduces the search space Aided by the true position Kalman filtering Recursively predict and update the errors Narrowband loop filter TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 22
23 Scalar Tracking Incoming Signal GPS Front-end Channel 1-N f d, φ NCO Correlator Code and Carrier Discriminators Navigation Processing Position and Time Solutions (x, y, z, t) TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 23
24 Implementation: P.I.A. Vector Tracking Channel 1-N LOS Projection Navigation Prediction Code and Carrier Predictions Position, Velocity, Timing, Code, and Carrier Correction Incoming Signal GPS Front-end NCO f d, φ Correlator Timing Errors Position analysis Known True Position (x, y, z) Code and Carrier Discriminators Kalman Filter: Navigation Prediction Time Solution (t) TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 24
25 Implementation: Kalman Filter Filter States: δx, δv, δt, δt State Transition Matrix Predictions: δx = X (X + V Δt) δv = V V Calculation of receiver clock bias: t = 1 ω F = Δt Δt Δt Δt ω (ρ x x ) X = δx δy δz δv δv δv δt δt 1/var ε Psuedorange Satellite Position Known true position TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 25 14
26 P.I.A. Vector Tracking Improves Accuracy Loop filter bandwidth of 5Hz for both scalar and P.I.A tracking loops. 9 satellites in view Maximum errors: Traditional tracking ~50ns Proposed vector tracking ~15ns No Noise Added TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 26
27 P.I.A. Tracking Increases Noise Tolerance Increased noise leads to loss of lock in scalar tracking. At 4 db of additional noise, the scalar tracking was able to produce navigation bits for 4 satellites. Noise Added 0 db 9 1 db 8 3 db 5 4 db 4 # of Satellites Tracked 1 db Noise Added 4 db Noise Added TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 27
28 P.I.A. Tracking is Robust Against Jamming Scalar tracking fails at 5 db of added noise. P.I.A. Vector Tracking continued to operate up until 9 db of additional noise (5 db more noise tolerance over scalar tracking) Reduces a jammer s effective radius. 5 db Noise Added 9 db Noise Added Scalar tracking fails P.I.A. still tracking Scalar tracking fails P.I.A. still tracking TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 28
29 P.I.A. Tracking Detects Meaconing Meaconing: record and replay legitimate GPS signal. Meaconing attack simulated. P.I.A. Vector Tracking loop fails to converge in the event of a meaconing attack. 200 meter difference in known position and meaconing position. Meaconing attack begins TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 29
30 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 30
31 Conclusions GPS cooperative authentication A modest number of low-reliable cross-check receivers outperform a high-quality reliable receiver. Robustness grows exponentially with the number of cross-check receivers. Position-Information-Aided Vector Robust against jamming (5dB more noise tolerance compared with scalar tracking); Successfully detects meaconing attacks; Improves the accuracy of the timing solutions (15 ns vs 50 ns). TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 31
32 Acknowledgement Prof. Jonathan Makela TCIPG References Daniel Chou, Liang Heng, and Grace Xingxin Gao, Robust GPS-Based Timing for Phasor Measurement Units: A Position-Information-Aided Vector Tracking Approach, ION GNSS+ 2014, Tampa FL, Sep 2014, Best Presentation of the Session Award. Liang Heng, Daniel Chou, and Grace Xingxin Gao, Cooperative GPS Signal Authentication from Unreliable Peers, ION GNSS+ 2014, Tampa FL, Sep 2014, Best Presentation of the Session Award. Liang Heng, Jonathan Makela, Alejandro Dominguez-Garcia, Rakesh Bobba, William Sanders, and Grace Xingxin Gao, Reliable GPS-based Timing for Power System Applications: A multi-layered Multireceiver Approach, the 2014 IEEE Power and Energy Conference at Illinois (IEEE PECI 2014), Champaign, IL, Feb Liang Heng, Daniel B. Work, and Grace Xingxin Gao, Reliability from Unreliable Peers: Cooperative GNSS Authentication, Inside GNSS Magazine, September October Liang Heng, Daniel B. Work, and Grace Xingxin Gao, GNSS Signal Authentication from Cooperative Peers, IEEE Transactions on Intelligent Transportation Systems, submitted. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 32
33 Backup Slides TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 33
34 Multi-layer Countermeasures TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 34
PMU Time Source Security
PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization
More informationAssessing the Civil GPS Spoofing Threat
Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell
More informationSpoofing GNSS Timing Receivers
Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical
More informationBriefing: Navigation Message Authentication for Civil GPS Anti-Spoofing
Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing
More informationSmart Grid Security Illinois
Smart Grid Security Efforts @ Illinois TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Drive the design of an resilient cyber infrastructure electric power which operates through attacks $18.8
More informationGNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY
GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International
More informationMGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?
MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June
More informationTwo-Antenna Differential Carrier Phase
GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase Mark L. Psiaki Sibley School of Mech. & Aero. Engr., Cornell Univ. Brady W. O'Hanlon & Steven P. Powell School of Electrical & Computer
More informationTrustworthy Cyber Infrastructure for the Power Grid (TCIPG)
Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Pete Sauer May 20, 2011 Power Affiliates Program University of Illinois Cornell University Dartmouth College University of California Davis Washington
More informationGPS Spoofing Susceptibility Testing
GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With
More informationThe Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning
The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning R.Murat Demirer R.Murat Demirer( CORS Project) 1 Potential Applications of the Global Positioning
More informationSMART BUILDINGS IN THE SMART GRID
SMART BUILDINGS IN THE SMART GRID JIANGMENG ZHANG TIM YARDLEY UNIVERSITY OF ILLINOIS ARIZONA STATE UNIVERSITY DARTMOUTH COLLEGE WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T
More informationAttack Resilient State Estimation for Vehicular Systems
December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania
More informationAnnual Industry Workshop March 27-29, Session Abstracts
Annual Industry Workshop March 27-29, 2017 Session Abstracts Case Study Presentation: Analyzing the Evolving Ukraine Cyber Attack(s) Presentation by Ben Miller, Dragos, Inc. Q&A Discussion led by Ben Miller,
More informationNimbra - communication platform for the SmartGRID
Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for
More informationPower Affiliates Program Highlights. Pete Sauer
Power Affiliates Program Highlights Pete Sauer 2014 Affiliates Ameren Bitrode CWLP Continental Automotive EMCWA Exelon Flanders Electric G&W Electric MidAmerican M.A. Pai PowerWorld S&C Electric Sargent
More informationReal-Time Model-Free Detection of Low-Quality Synchrophasor Data
Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March
More informationSPREE: A Spoofing Resistant GPS Receiver
SPREE: A Spoofing Resistant GPS Receiver Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun raanjhan@inf.ethz.ch, ohildur@inf.ethz.ch, capkuns@inf.ethz.ch Department of Computer Science ETH Zurich,
More informationEvolution of Control for the Power Grid
Evolution of Control for the Power Grid Anjan Bose Washington State University Pullman, WA, USA PaiFest In Honor of Prof. M. A. Pai Urbana-Champaign, IL October 15, 2015 The Past (before 1960s) Hard
More informationcongestion energy & environment accessibility aging infrastructure
Living with and loving transportation technologies Dan Work Assistant Professor, Civil and Environmental Engineering, Coordinated Science Laboratory, and Electrical and Computer Engineering (courtesy)
More informationMultiple target detection in video using quadratic multi-frame correlation filtering
Multiple target detection in video using quadratic multi-frame correlation filtering Ryan Kerekes Oak Ridge National Laboratory B. V. K. Vijaya Kumar Carnegie Mellon University March 17, 2008 1 Outline
More informationWEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP
WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP San Diego Gas & Electric Subsidiary of Sempra Energy 4100 Full-Time Employees Regulated public utility Providing clean, safe & reliable
More informationComputationally Efficient Direct Position Estimation via Low Duty-Cycling
1 Computationally Efficient Direct Position Estimation via Low Duty-Cycling Yuting Ng and Grace Xingxin Gao University of Illinois at Urbana-Champaign BIOGRAPHIES Yuting Ng is a graduate student in the
More informationCyber Security for Smart Grid Devices
Cyber Security for Smart Grid Devices Annarita Giani Electrical Engineering & Computer Sciences University of California at Berkeley agiani@eecs.berkeley.edu Trustworthy Cyber Infrastructure for the Power
More informationThe Path to a Secure and Resilient Power Grid Infrastructure
The Path to a Secure and Resilient Power Grid Infrastructure Bill Sanders University of Illinois at Urbana-Champaign www.tcipg.org whs@illinois.edu 1 Power Grid Trust Dynamics Span Two Interdependent Infrastructures
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationGNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?
Space Reflecto 2013, Brest, 04 November 2013 GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Mohamed SAHMOUDI 1,2 1 ISAE, University of Toulouse, France 2
More informationExtending InfiniBand Globally
Extending InfiniBand Globally Eric Dube (eric@baymicrosystems.com) com) Senior Product Manager of Systems November 2010 Bay Microsystems Overview About Bay Founded in 2000 to provide high performance networking
More informationIntroduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.
Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:
More informationAn Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation
An Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation Daniel Cody Salmon David M. Bevly Auburn University GPS and Vehicle Dynamics Laboratory 1 Introduction Motivation
More informationWhy Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic
Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Presented by Stephen Friedenthal, IoT Solutions Architect About Cisco Systems, Inc. San Fran Companies want to derive
More informationIntroduction to Networking & NTP
Introduction to Networking & NTP Agenda Basic Network Elements Time Transfer Basics How time is transferred Accuracy limitations Test data review Live demo Typical Time Distribution Strategies Time hierarchies
More informationPosition Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments
Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments Nabil Kbayer; Héctor Ortega; Mohamed Sahmoudi and Cédric Rouch TéSA Lab, ISAE-SUPAERO, CNES, Toulouse University,
More informationReal-World Experience with a Mobile Broadband Network
Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview
More informationGPS Vulnerability Report
GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements
More informationThe Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005
The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you
More informationFosca Giannotti et al,.
Trajectory Pattern Mining Fosca Giannotti et al,. - Presented by Shuo Miao Conference on Knowledge discovery and data mining, 2007 OUTLINE 1. Motivation 2. T-Patterns: definition 3. T-Patterns: the approach(es)
More informationOffloading UAV Navigation Computation to the Cloud Sriramya Ramya Bhamidipati and Grace Xingxin Gao
Offloading UAV Navigation Computation to the Cloud Sriramya Ramya Bhamidipati and Grace Xingxin Gao SCPNT 2016 November 01 2016 UAV Navigation in Urban Areas Challenges Limited battery life Restricted
More informationSleep/Wake Aware Local Monitoring (SLAM)
Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and
More informationTrusted Intermediaries
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationLocation Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks
Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More informationGeometric Approach to Position Determination in Space: Advantages and Limitations
Geometric Approach to Position Determination in Space: Advantages and Limitations OSU Dorota Grejner-Brzezinska and Tae-Suk Bae Department of Civil and Environmental Engineering and Geodetic Science The
More informationBILL SANDERS CYBERSECURITY & PRIVACY FOR THE SMART GRID: CHALLENGES AND OPPORTUNITIES FEBRUARY 10, 2015
CYBERSECURITY & PRIVACY FOR THE SMART GRID: CHALLENGES AND OPPORTUNITIES FEBRUARY 10, 2015 BILL SANDERS GUIRR: CROSS-SECTOR IMPACT OF THE SMART GRID NATIONAL ACADEMY OF SCIENCES UNIVERSITY OF ILLINOIS
More informationWake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems
Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems Hadi Wassaf David Burnham Frank Wang Communication, Navigation, Surveillance (CNS) and Traffic Management Systems
More informationGPS SPOOFING: NO LONGER A FISH STORY
SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and
More informationSampling Large Graphs for Anticipatory Analysis
Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015
More informationAHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.
AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria juergen.seybold@tca.at
More informationDmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices
Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the
More informationAERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET
AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET Author: Tianyin Zhang and Nur Jaber Advisor: Dr. Richard Dean Morgan State University ABSTRACT This paper discusses channel
More informationWHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight
Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly
More informationConfiguring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP, page 1 Licensing Requirements, page 3 Prerequisites for NTP, page 3 Guidelines and Limitations for NTP, page 3 Default Settings for
More informationSpace and Missile Systems Center
Space and Missile Systems Center M-Code Benefits and Availability Capt Travis Mills, SMC/GPEP 29 Apr 15 UNCLASSIFIED/APPROVED FOR PUBLIC RELEASE Report Documentation Page Form Approved OMB No. 0704-0188
More informationTales from the Base Station to the Substation. Delivering Phase ITSF 2013
Tales from the Base Station to the Substation Delivering Phase ITSF 2013 1 Phase delivery in Telecom Networks Telecom LTE networks rely on accurate phase synchronization Efficient and reliable use of spectrum
More informationModeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks
Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationGNSS WRISTWATCH DEVICE FOR NETWORKED OPERATIONS SUPPORTING LOCATION BASED SERVICES
GNSS WRISTWATCH DEVICE FOR NETWORKED OPERATIONS SUPPORTING LOCATION BASED SERVICES Alison Brown, NAVSYS Corporation Peter K. Brown, NAVSYS Ltd. INTRODUCTION The TIDGET/ZigBee wristwatch device was designed
More informationVehicle Trust Management for Connected Vehicles
Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11 DISCLAIMER The contents of this report reflect the views of the
More informationTRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG
FROM SECURITY TO RESILIENCY: OPPORTUNITIES AND CHALLENGES FOR THE SMART GRID S CYBER INFRASTRUCTURE APRIL 20, 2015 BILL SANDERS UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY
More informationCoding for the Network: Scalable and Multiple description coding Marco Cagnazzo
Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo Overview Examples and motivations Scalable coding for network transmission Techniques for multiple description coding 2 27/05/2013
More informationNeuro-fuzzy admission control in mobile communications systems
University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University
More informationCIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries
CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011
Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationTiming in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015
Timing in Cyber Physical Systems Marc Weiss, Ph.D. mweiss@nist.gov NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems: Outline The term Timing used here as a general term: frequency,
More informationThe contribution of BeiDou to multi- GNSS Precise Point Positioning
Javier Tegedor, Ole Ørpen Fugro Satellite Positioning AS The contribution of BeiDou to multi- GNSS Precise Point Positioning Geodesi- og hydrografidagene 2015, Sundvollen, 18-19 November 2015 Fugro Precise
More informationSecurity Analysis of the Lightning Network
Security Analysis of the Lightning Network Laolu Osuntokun @roasbeef Lightning Labs BPASE 2017 State of the Hash-Lock In-progress Lightning Network specifications (lighting-rfc) Basis of Lightning Technology
More informationGPS Module. Ct-G431. Specifications Sheet V0.3
GPS Module Ct-G431 Specifications Sheet V0.3 Features: SiRF StarIV ultra low power chipset Compact module size for easy integration : 15 x 14 x 2.8 mm UART/ I 2 C pins reserved for customizing special
More informationOnline Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations
LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical
More informationConfiguring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 2 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,
More informationUpdate: Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network ITSF 2016
Update: Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network ITSF 2016 Marc Weiss, mweiss@nist.gov, 303-497-3261 NIST Time and Frequency Division Lee Cosart, lee.cosart@microsemi.com,
More informationWireless Network Security Spring 2011
Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 1, 2011 SURVEY: Physical Layer Security Announcements HW #1 is posted on main class website Due 2/10 @ 11:59pm (PST) Office hours on 2/1 will
More informationNetwork Security and Cryptography. 2 September Marking Scheme
Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,
More informationHardware/Software Codesign for Wireless Systems (E168b) Lab 2: GPS Correlator
Harris Hardware/Software Codesign for Wireless Systems (E168b) Lab 2: GPS Correlator Introduction In this lab, you will build a time-multiplexed correlator to search for and track GPS satellite signals.
More informationExperimental Analysis of Attacks on Next Generation Air Traffic Communication
Experimental Analysis of Attacks on Next Generation Air Traffic Communication Matthias Schäfer, Vincent Lenders and Ivan Martinovic June 27th, 2013 1. Introduction Introduction 1 Introduction 2 Attacks
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationEDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014
ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 EDUCATION AND ENGAGEMENT NOVEMBER, 12, 2014 JANA SEBESTIK TCIPG EDUCATION ASSISTANT DIRECTOR FOR STEM CURRICULUM DESIGN, OFFICE FOR MATHEMATICS, SCIENCE, AND
More informationBob Braden Alison Silverstein Dick Willson Dan Lutter
Bob Braden Alison Silverstein Dick Willson Dan Lutter USC/ISI NASPI Project Allied Partners Manager 1 In Nov 2014, the NASPI Data & Network Management Task Team (D&NMTT) surveyed networking practice in
More informationSIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017
SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and
More informationConfiguring NTP. Information About NTP. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP, page 1 NTP as Time Server, page 2 Distributing NTP Using CFS, page 2 Clock Manager, page 2 High Availability, page 2 Virtualization
More informationDistributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC
Distributed Meta-data Servers: Architecture and Design Sarah Sharafkandi David H.C. Du DISC 5/22/07 1 Outline Meta-Data Server (MDS) functions Why a distributed and global Architecture? Problem description
More informationMobile Millennium Using Smartphones as Traffic Sensors
Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology
More informationWhite paper. Interleaved MIMO: Near-full MIMO performance, nearly half the costs
White paper Interleaved MIMO: Near-full MIMO performance, nearly half the costs Contents Introduction 3 Colocated MIMO: High performance at a high cost 3 Interleaved MIMO DAS: A lot more performance for
More informationThe Virtual Power System Testbed (VPST) and Inter- Testbed Integration
The Virtual Power System Testbed (VPST) and Inter- Testbed Integration August 10, 2009 David Bergman Dong Jin Prof. David Nicol Tim Yardley (Presenter) University of Illinois at Urbana-Champaign www.iti.illinois.ed
More informationThis chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections:
This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: About NTP, page 1 Licensing Requirements for NTP, page 3 Prerequisites
More informationPresented at the FIG Working Week 2017, May 29 - June 2, 2017 in Helsinki, Finland
Presented at the FIG Working Week 2017, May 29 - June 2, 2017 in Helsinki, Finland OUTLINE I INTRODUCTION II GNSS MEASUREMENTS AND METHODOLOGY III IV TEST RESULTS AND DISCUSSION Concluding Remarks ONE
More informationAli Abur Northeastern University Department of Electrical and Computer Engineering Boston, MA 02115
Enhanced State t Estimation Ali Abur Northeastern University Department of Electrical and Computer Engineering Boston, MA 02115 GCEP Workshop: Advanced Electricity Infrastructure Frances Arriallaga Alumni
More informationConfiguring NTP. Information About NTP. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP, page 1 NTP as Time Server, page 2 Distributing NTP Using CFS, page 2 Clock Manager, page 2 High Availability, page 2 Virtualization
More informationPresentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar
Presentation at GLOBECOM 2007 After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise By Gregory Kanter and Prem Kumar NuCrypt, LLC 1801 Maple Ave. #6322, Evanston, IL 60201-3135
More informationObserved Differential Carrier Phase Float Accuracies on three Kinematic Surveys using a u-blox Antaris GPS Receiver under Open Sky Conditions
Observed Differential Carrier Phase Float Accuracies on three Kinematic Surveys using a u-blox Antaris GPS Receiver under Open Sky Conditions By David MacDonald Waypoint Consulting Inc. June 2005 Three
More informationConfiguring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:
This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 3 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,
More informationLTE and IEEE802.p for vehicular networking: a performance evaluation
LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction
More informationNETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication
NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient
More informationThe Performance Evaluation of the Integration of Inertial Navigation System and Global Navigation Satellite System with Analytic Constraints
Journal of Environmental Science and Engineering A 6 (2017) 313-319 doi:10.17265/2162-5298/2017.06.005 D DAVID PUBLISHING The Performance Evaluation of the Integration of Inertial Navigation System and
More informationOptions for Mitigating Potential GPS Vulnerabilities
Options for Mitigating Potential GPS Vulnerabilities GPS receivers have been widely used in communications infrastructure to provide precise time and frequency required to synchronize wireless base stations
More informationCEER Cyber-Physical Testbeds (a generational leap)
CEER Cyber-Physical Testbeds (a generational leap) CEER: Cyber-Physical Experimentation (testbed operation support) DATA ASSETS CLOUD Customer TESTBED PEOPLE PROVISION LOCAL SCIENCE Other Testbeds Testbed
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationDistributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia
Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements
More informationAd-hoc Storage Overlay System
Ad-hoc Storage Overlay System (ASOS) David Barbour dmbarbour@gmail.com EECS 800: Survivable Networking Professor James P. G. Sterbenz Presentation based upon paper: Guang Yang, Ling-Jyh Chen, Tony Sun,
More informationInitial Simulation Results for AVB Synchronization Transported using IEEE 1588 Peer-to-Peer Transparent Clocks
Initial Simulation Results for AVB Synchronization Transported using IEEE 1588 Peer-to-Peer Transparent Clocks Geoffrey M. Garner SAMSUNG Electronics (Consultant) IEEE 802.1 AVB TG IEEE 1588 2006.05.16
More information