Robust GPS-Based Timing for Phasor Measurement Units

Size: px
Start display at page:

Download "Robust GPS-Based Timing for Phasor Measurement Units"

Transcription

1 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T 1

2 How to Make GPS-based Timing Robust? TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 2

3 Facts about GPS GPS provides timing for many applications, such as PMUs GPS civil signals are unencrypted Only GPS military signals are encrypted Civil users (e.g. PMUs) do not have access to the military codes GPS civil signal structures are completely open GPS civil signal definition is published in its Interface Control Documents (ICD) GPS received signals are extremely weak GPS satellites are 20,200 km (12,550 miles) away GPS is operational Satellites in orbits Signals being broadcast Billions of GPS receivers in use TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 3

4 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 4

5 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 5

6 Cooperative Authentication: Architecture Our proposed approach: cooperat ive aut hent icat ion I got my location. Can you guys check if I was spoofed? Cross-check receiver #1 Cross-check receiver #2 Your snippet matches mine. You are not spoofed! A snippet of baseband GNSS signal A high correlation! You are good, bro. User receiver It doesn t match mine. You might be spoofed. Cross-check receiver #N Merits: network and geographical redundancy 5 / 20 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 6

7 Pair-wise Checking: Cross-correlation of P(Y) Code Lo et al., 2009 Psiaki, Humphreys et al., 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 7

8 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 8

9 Pairwise Check TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 9

10 Pairwise Check Ideal Results Pair-wise Check Ideal Results Not Spoofed Spoofed Pair-wise Check In-phase Baseband Correlation (C/A) 40 ms 40 Correlation peaks Quadraturephase Baseband Correlation (P(Y)) Single Correlation peak No Correlation peak Spoofer cannot generate TRUSTWORTHY CYBER INFRASTRUCTURE FOR FOR THE POWER THE POWER GRID GRID TCIPG.ORG TCIPG.ORG 24 10

11 Modeling Pairwise Check P(Y) codes don t match TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 11

12 Experiments with Different Scenarios 3000km San Francisco CA and Champaign IL, static 22km Rantoul IL, moving at ~45 mph and Champaign IL, static TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 12

13 Experiments: San Francisco & UIUC Everitt Lab GPS Front End Receiver SiGe Sampler 2 bit quantization Bandwidth: 2.72MHz Low cost, off the shelf Antenna Novatel Antenna GPS Front End Receiver SiGe Sampler 2 bit quantization Bandwidth: 2.72MHz TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 13

14 Pairwise Results for Different Separations 3000km separation 22km separation Almost no Residual Correlation Some Residual Correlation Near ideal Correlation Could detect spoofing Could detect spoofing TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 14

15 SNR Affects Pair-wise Check Performance TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 15

16 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 16

17 Modeling Unreliable Cross-Check Receivers TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 17

18 Authentication Performance, Theoretical Results Pair-wise false alarm rate Pair-wise missed detection rate Probability of being spoofed by a different spoofer Probability of being spoofed by the same spoofer Authentication performance improves exponentially with increasing number of cross-check receivers. P SS causes twice as great performance deterioration as P SD does. Choose a cross-check receiver far from the user receiver. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 18

19 Receiver Operating Characteristic (ROC) Curves TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 19

20 Performance of Cooperative Authentication Assume 20% of the cross-check receivers are spoofed (an extremely challenging assumption) Probability of missed detection (P MD = 1 - P D ) 10 0 P MD = P SS = 0, P SD = 0 P SS = 0.02, P SD = 0.18 P SS = 0.1, P SD = 0.1 P SS = 0.18, P SD = Number of cross-check receivers (N) Probability of missed detection Probability of false alarm (P FA ) P SS = 0, P SD = 0 P SS = 0.02, P SD = 0.18 P SS = 0.1, P SD = 0.1 P SS = 0.18, P SD = 0.02 P FA = Number of cross-check receivers (N) Probability of false alarm Robustness grows exponentially with the number of cross-check receivers A small number of unreliable cross-check receivers are on par with a reliable cross-check receiver. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 20

21 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 21

22 Approach: Position-Information-Aided (P.I.A.) Vector Tracking Approach: Vector tracking Reduces the search space Aided by the true position Kalman filtering Recursively predict and update the errors Narrowband loop filter TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 22

23 Scalar Tracking Incoming Signal GPS Front-end Channel 1-N f d, φ NCO Correlator Code and Carrier Discriminators Navigation Processing Position and Time Solutions (x, y, z, t) TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 23

24 Implementation: P.I.A. Vector Tracking Channel 1-N LOS Projection Navigation Prediction Code and Carrier Predictions Position, Velocity, Timing, Code, and Carrier Correction Incoming Signal GPS Front-end NCO f d, φ Correlator Timing Errors Position analysis Known True Position (x, y, z) Code and Carrier Discriminators Kalman Filter: Navigation Prediction Time Solution (t) TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 24

25 Implementation: Kalman Filter Filter States: δx, δv, δt, δt State Transition Matrix Predictions: δx = X (X + V Δt) δv = V V Calculation of receiver clock bias: t = 1 ω F = Δt Δt Δt Δt ω (ρ x x ) X = δx δy δz δv δv δv δt δt 1/var ε Psuedorange Satellite Position Known true position TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 25 14

26 P.I.A. Vector Tracking Improves Accuracy Loop filter bandwidth of 5Hz for both scalar and P.I.A tracking loops. 9 satellites in view Maximum errors: Traditional tracking ~50ns Proposed vector tracking ~15ns No Noise Added TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 26

27 P.I.A. Tracking Increases Noise Tolerance Increased noise leads to loss of lock in scalar tracking. At 4 db of additional noise, the scalar tracking was able to produce navigation bits for 4 satellites. Noise Added 0 db 9 1 db 8 3 db 5 4 db 4 # of Satellites Tracked 1 db Noise Added 4 db Noise Added TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 27

28 P.I.A. Tracking is Robust Against Jamming Scalar tracking fails at 5 db of added noise. P.I.A. Vector Tracking continued to operate up until 9 db of additional noise (5 db more noise tolerance over scalar tracking) Reduces a jammer s effective radius. 5 db Noise Added 9 db Noise Added Scalar tracking fails P.I.A. still tracking Scalar tracking fails P.I.A. still tracking TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 28

29 P.I.A. Tracking Detects Meaconing Meaconing: record and replay legitimate GPS signal. Meaconing attack simulated. P.I.A. Vector Tracking loop fails to converge in the event of a meaconing attack. 200 meter difference in known position and meaconing position. Meaconing attack begins TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 29

30 Outline GPS Cooperative Authentication Pairwise check Decision aggregation Position-Information-Aided Vector Tracking Approach Implementation Experimental Results Conclusions TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 30

31 Conclusions GPS cooperative authentication A modest number of low-reliable cross-check receivers outperform a high-quality reliable receiver. Robustness grows exponentially with the number of cross-check receivers. Position-Information-Aided Vector Robust against jamming (5dB more noise tolerance compared with scalar tracking); Successfully detects meaconing attacks; Improves the accuracy of the timing solutions (15 ns vs 50 ns). TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 31

32 Acknowledgement Prof. Jonathan Makela TCIPG References Daniel Chou, Liang Heng, and Grace Xingxin Gao, Robust GPS-Based Timing for Phasor Measurement Units: A Position-Information-Aided Vector Tracking Approach, ION GNSS+ 2014, Tampa FL, Sep 2014, Best Presentation of the Session Award. Liang Heng, Daniel Chou, and Grace Xingxin Gao, Cooperative GPS Signal Authentication from Unreliable Peers, ION GNSS+ 2014, Tampa FL, Sep 2014, Best Presentation of the Session Award. Liang Heng, Jonathan Makela, Alejandro Dominguez-Garcia, Rakesh Bobba, William Sanders, and Grace Xingxin Gao, Reliable GPS-based Timing for Power System Applications: A multi-layered Multireceiver Approach, the 2014 IEEE Power and Energy Conference at Illinois (IEEE PECI 2014), Champaign, IL, Feb Liang Heng, Daniel B. Work, and Grace Xingxin Gao, Reliability from Unreliable Peers: Cooperative GNSS Authentication, Inside GNSS Magazine, September October Liang Heng, Daniel B. Work, and Grace Xingxin Gao, GNSS Signal Authentication from Cooperative Peers, IEEE Transactions on Intelligent Transportation Systems, submitted. TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 32

33 Backup Slides TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 33

34 Multi-layer Countermeasures TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG 34

PMU Time Source Security

PMU Time Source Security PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization

More information

Assessing the Civil GPS Spoofing Threat

Assessing the Civil GPS Spoofing Threat Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell

More information

Spoofing GNSS Timing Receivers

Spoofing GNSS Timing Receivers Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical

More information

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing

More information

Smart Grid Security Illinois

Smart Grid Security Illinois Smart Grid Security Efforts @ Illinois TCIPG: Trustworthy Cyber Infrastructure for the Power Grid Drive the design of an resilient cyber infrastructure electric power which operates through attacks $18.8

More information

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International

More information

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June

More information

Two-Antenna Differential Carrier Phase

Two-Antenna Differential Carrier Phase GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase Mark L. Psiaki Sibley School of Mech. & Aero. Engr., Cornell Univ. Brady W. O'Hanlon & Steven P. Powell School of Electrical & Computer

More information

Trustworthy Cyber Infrastructure for the Power Grid (TCIPG)

Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) Pete Sauer May 20, 2011 Power Affiliates Program University of Illinois Cornell University Dartmouth College University of California Davis Washington

More information

GPS Spoofing Susceptibility Testing

GPS Spoofing Susceptibility Testing GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With

More information

The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning

The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning R.Murat Demirer R.Murat Demirer( CORS Project) 1 Potential Applications of the Global Positioning

More information

SMART BUILDINGS IN THE SMART GRID

SMART BUILDINGS IN THE SMART GRID SMART BUILDINGS IN THE SMART GRID JIANGMENG ZHANG TIM YARDLEY UNIVERSITY OF ILLINOIS ARIZONA STATE UNIVERSITY DARTMOUTH COLLEGE WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

More information

Attack Resilient State Estimation for Vehicular Systems

Attack Resilient State Estimation for Vehicular Systems December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania

More information

Annual Industry Workshop March 27-29, Session Abstracts

Annual Industry Workshop March 27-29, Session Abstracts Annual Industry Workshop March 27-29, 2017 Session Abstracts Case Study Presentation: Analyzing the Evolving Ukraine Cyber Attack(s) Presentation by Ben Miller, Dragos, Inc. Q&A Discussion led by Ben Miller,

More information

Nimbra - communication platform for the SmartGRID

Nimbra - communication platform for the SmartGRID Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for

More information

Power Affiliates Program Highlights. Pete Sauer

Power Affiliates Program Highlights. Pete Sauer Power Affiliates Program Highlights Pete Sauer 2014 Affiliates Ameren Bitrode CWLP Continental Automotive EMCWA Exelon Flanders Electric G&W Electric MidAmerican M.A. Pai PowerWorld S&C Electric Sargent

More information

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data

Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Real-Time Model-Free Detection of Low-Quality Synchrophasor Data Meng Wu and Le Xie Department of Electrical and Computer Engineering Texas A&M University College Station, TX NASPI Work Group meeting March

More information

SPREE: A Spoofing Resistant GPS Receiver

SPREE: A Spoofing Resistant GPS Receiver SPREE: A Spoofing Resistant GPS Receiver Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun raanjhan@inf.ethz.ch, ohildur@inf.ethz.ch, capkuns@inf.ethz.ch Department of Computer Science ETH Zurich,

More information

Evolution of Control for the Power Grid

Evolution of Control for the Power Grid Evolution of Control for the Power Grid Anjan Bose Washington State University Pullman, WA, USA PaiFest In Honor of Prof. M. A. Pai Urbana-Champaign, IL October 15, 2015 The Past (before 1960s) Hard

More information

congestion energy & environment accessibility aging infrastructure

congestion energy & environment accessibility aging infrastructure Living with and loving transportation technologies Dan Work Assistant Professor, Civil and Environmental Engineering, Coordinated Science Laboratory, and Electrical and Computer Engineering (courtesy)

More information

Multiple target detection in video using quadratic multi-frame correlation filtering

Multiple target detection in video using quadratic multi-frame correlation filtering Multiple target detection in video using quadratic multi-frame correlation filtering Ryan Kerekes Oak Ridge National Laboratory B. V. K. Vijaya Kumar Carnegie Mellon University March 17, 2008 1 Outline

More information

WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP

WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP WEI Conference SDG&E TCRI Project April 25, 2018 Mark Fowler, CISSP San Diego Gas & Electric Subsidiary of Sempra Energy 4100 Full-Time Employees Regulated public utility Providing clean, safe & reliable

More information

Computationally Efficient Direct Position Estimation via Low Duty-Cycling

Computationally Efficient Direct Position Estimation via Low Duty-Cycling 1 Computationally Efficient Direct Position Estimation via Low Duty-Cycling Yuting Ng and Grace Xingxin Gao University of Illinois at Urbana-Champaign BIOGRAPHIES Yuting Ng is a graduate student in the

More information

Cyber Security for Smart Grid Devices

Cyber Security for Smart Grid Devices Cyber Security for Smart Grid Devices Annarita Giani Electrical Engineering & Computer Sciences University of California at Berkeley agiani@eecs.berkeley.edu Trustworthy Cyber Infrastructure for the Power

More information

The Path to a Secure and Resilient Power Grid Infrastructure

The Path to a Secure and Resilient Power Grid Infrastructure The Path to a Secure and Resilient Power Grid Infrastructure Bill Sanders University of Illinois at Urbana-Champaign www.tcipg.org whs@illinois.edu 1 Power Grid Trust Dynamics Span Two Interdependent Infrastructures

More information

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016 Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused

More information

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Space Reflecto 2013, Brest, 04 November 2013 GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Mohamed SAHMOUDI 1,2 1 ISAE, University of Toulouse, France 2

More information

Extending InfiniBand Globally

Extending InfiniBand Globally Extending InfiniBand Globally Eric Dube (eric@baymicrosystems.com) com) Senior Product Manager of Systems November 2010 Bay Microsystems Overview About Bay Founded in 2000 to provide high performance networking

More information

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security. Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:

More information

An Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation

An Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation An Experimental Exploration of Low-Cost Solutions for Precision Ground Vehicle Navigation Daniel Cody Salmon David M. Bevly Auburn University GPS and Vehicle Dynamics Laboratory 1 Introduction Motivation

More information

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic Presented by Stephen Friedenthal, IoT Solutions Architect About Cisco Systems, Inc. San Fran Companies want to derive

More information

Introduction to Networking & NTP

Introduction to Networking & NTP Introduction to Networking & NTP Agenda Basic Network Elements Time Transfer Basics How time is transferred Accuracy limitations Test data review Live demo Typical Time Distribution Strategies Time hierarchies

More information

Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments

Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments Nabil Kbayer; Héctor Ortega; Mohamed Sahmoudi and Cédric Rouch TéSA Lab, ISAE-SUPAERO, CNES, Toulouse University,

More information

Real-World Experience with a Mobile Broadband Network

Real-World Experience with a Mobile Broadband Network Real-World Experience with a Mobile Broadband Network Dr. Jin Yang Verizon Wireless jin.yang@ieee.org September 23, 2004 IEEE Communications Society Oakland-East Bay Chapter, CA Outline Introduction Overview

More information

GPS Vulnerability Report

GPS Vulnerability Report GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements

More information

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005

The Challenges of Measuring Wireless Networks. David Kotz Dartmouth College August 2005 The Challenges of Measuring Wireless Networks David Kotz Dartmouth College August 2005 Why measure? For better management Large WLANs need scalable management To manage you must monitor To monitor you

More information

Fosca Giannotti et al,.

Fosca Giannotti et al,. Trajectory Pattern Mining Fosca Giannotti et al,. - Presented by Shuo Miao Conference on Knowledge discovery and data mining, 2007 OUTLINE 1. Motivation 2. T-Patterns: definition 3. T-Patterns: the approach(es)

More information

Offloading UAV Navigation Computation to the Cloud Sriramya Ramya Bhamidipati and Grace Xingxin Gao

Offloading UAV Navigation Computation to the Cloud Sriramya Ramya Bhamidipati and Grace Xingxin Gao Offloading UAV Navigation Computation to the Cloud Sriramya Ramya Bhamidipati and Grace Xingxin Gao SCPNT 2016 November 01 2016 UAV Navigation in Urban Areas Challenges Limited battery life Restricted

More information

Sleep/Wake Aware Local Monitoring (SLAM)

Sleep/Wake Aware Local Monitoring (SLAM) Sleep/Wake Aware Local Monitoring (SLAM) Issa Khalil, Saurabh Bagchi, Ness Shroff Dependable Computing Systems Lab (DCSL) & Center for Wireless Systems and Applications (CWSA) School of Electrical and

More information

Trusted Intermediaries

Trusted Intermediaries AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks

Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Location Spoofing Attack and Its Countermeasures in Database-Driven Cognitive Radio Networks Kexiong (Curtis) Zeng, Sreeraksha Kondaji Ramesh, Yaling Yang. Outline Background and Motivation Our Works Overview

More information

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc

More information

Geometric Approach to Position Determination in Space: Advantages and Limitations

Geometric Approach to Position Determination in Space: Advantages and Limitations Geometric Approach to Position Determination in Space: Advantages and Limitations OSU Dorota Grejner-Brzezinska and Tae-Suk Bae Department of Civil and Environmental Engineering and Geodetic Science The

More information

BILL SANDERS CYBERSECURITY & PRIVACY FOR THE SMART GRID: CHALLENGES AND OPPORTUNITIES FEBRUARY 10, 2015

BILL SANDERS CYBERSECURITY & PRIVACY FOR THE SMART GRID: CHALLENGES AND OPPORTUNITIES FEBRUARY 10, 2015 CYBERSECURITY & PRIVACY FOR THE SMART GRID: CHALLENGES AND OPPORTUNITIES FEBRUARY 10, 2015 BILL SANDERS GUIRR: CROSS-SECTOR IMPACT OF THE SMART GRID NATIONAL ACADEMY OF SCIENCES UNIVERSITY OF ILLINOIS

More information

Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems

Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems Hadi Wassaf David Burnham Frank Wang Communication, Navigation, Surveillance (CNS) and Traffic Management Systems

More information

GPS SPOOFING: NO LONGER A FISH STORY

GPS SPOOFING: NO LONGER A FISH STORY SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and

More information

Sampling Large Graphs for Anticipatory Analysis

Sampling Large Graphs for Anticipatory Analysis Sampling Large Graphs for Anticipatory Analysis Lauren Edwards*, Luke Johnson, Maja Milosavljevic, Vijay Gadepally, Benjamin A. Miller IEEE High Performance Extreme Computing Conference September 16, 2015

More information

AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.

AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH. AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria juergen.seybold@tca.at

More information

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices

Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Dmitry Ishchenko/Reynaldo Nuqui/Steve Kunsman, September 21, 2016 Collaborative Defense of Transmission and Distribution Protection & Control Devices Against Cyber Attacks (CODEF) Cyber Security of the

More information

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET

AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET Author: Tianyin Zhang and Nur Jaber Advisor: Dr. Richard Dean Morgan State University ABSTRACT This paper discusses channel

More information

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly

More information

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections: This chapter contains the following sections: Information About NTP, page 1 Licensing Requirements, page 3 Prerequisites for NTP, page 3 Guidelines and Limitations for NTP, page 3 Default Settings for

More information

Space and Missile Systems Center

Space and Missile Systems Center Space and Missile Systems Center M-Code Benefits and Availability Capt Travis Mills, SMC/GPEP 29 Apr 15 UNCLASSIFIED/APPROVED FOR PUBLIC RELEASE Report Documentation Page Form Approved OMB No. 0704-0188

More information

Tales from the Base Station to the Substation. Delivering Phase ITSF 2013

Tales from the Base Station to the Substation. Delivering Phase ITSF 2013 Tales from the Base Station to the Substation Delivering Phase ITSF 2013 1 Phase delivery in Telecom Networks Telecom LTE networks rely on accurate phase synchronization Efficient and reliable use of spectrum

More information

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks

Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks Dongyu Qiu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana-Champaign CSL, UIUC p.1/22 Introduction

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

GNSS WRISTWATCH DEVICE FOR NETWORKED OPERATIONS SUPPORTING LOCATION BASED SERVICES

GNSS WRISTWATCH DEVICE FOR NETWORKED OPERATIONS SUPPORTING LOCATION BASED SERVICES GNSS WRISTWATCH DEVICE FOR NETWORKED OPERATIONS SUPPORTING LOCATION BASED SERVICES Alison Brown, NAVSYS Corporation Peter K. Brown, NAVSYS Ltd. INTRODUCTION The TIDGET/ZigBee wristwatch device was designed

More information

Vehicle Trust Management for Connected Vehicles

Vehicle Trust Management for Connected Vehicles Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11 DISCLAIMER The contents of this report reflect the views of the

More information

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG

TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG FROM SECURITY TO RESILIENCY: OPPORTUNITIES AND CHALLENGES FOR THE SMART GRID S CYBER INFRASTRUCTURE APRIL 20, 2015 BILL SANDERS UNIVERSITY OF ILLINOIS DARTMOUTH COLLEGE UC DAVIS WASHINGTON STATE UNIVERSITY

More information

Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo

Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo Coding for the Network: Scalable and Multiple description coding Marco Cagnazzo Overview Examples and motivations Scalable coding for network transmission Techniques for multiple description coding 2 27/05/2013

More information

Neuro-fuzzy admission control in mobile communications systems

Neuro-fuzzy admission control in mobile communications systems University of Wollongong Thesis Collections University of Wollongong Thesis Collection University of Wollongong Year 2005 Neuro-fuzzy admission control in mobile communications systems Raad Raad University

More information

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011 Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

Timing in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015

Timing in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems Marc Weiss, Ph.D. mweiss@nist.gov NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems: Outline The term Timing used here as a general term: frequency,

More information

The contribution of BeiDou to multi- GNSS Precise Point Positioning

The contribution of BeiDou to multi- GNSS Precise Point Positioning Javier Tegedor, Ole Ørpen Fugro Satellite Positioning AS The contribution of BeiDou to multi- GNSS Precise Point Positioning Geodesi- og hydrografidagene 2015, Sundvollen, 18-19 November 2015 Fugro Precise

More information

Security Analysis of the Lightning Network

Security Analysis of the Lightning Network Security Analysis of the Lightning Network Laolu Osuntokun @roasbeef Lightning Labs BPASE 2017 State of the Hash-Lock In-progress Lightning Network specifications (lighting-rfc) Basis of Lightning Technology

More information

GPS Module. Ct-G431. Specifications Sheet V0.3

GPS Module. Ct-G431. Specifications Sheet V0.3 GPS Module Ct-G431 Specifications Sheet V0.3 Features: SiRF StarIV ultra low power chipset Compact module size for easy integration : 15 x 14 x 2.8 mm UART/ I 2 C pins reserved for customizing special

More information

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations

Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal Correlations LOGO Online Bad Data Detection for Synchrophasor Systems via Spatio-temporal s Le Xie Texas A&M University NASPI International Synchrophasor Symposium March 24, 2016 Content 1 Introduction 2 Technical

More information

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections: This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 2 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,

More information

Update: Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network ITSF 2016

Update: Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network ITSF 2016 Update: Ethernet Time Transfer through a U.S. Commercial Optical Telecommunications Network ITSF 2016 Marc Weiss, mweiss@nist.gov, 303-497-3261 NIST Time and Frequency Division Lee Cosart, lee.cosart@microsemi.com,

More information

Wireless Network Security Spring 2011

Wireless Network Security Spring 2011 Wireless Network Security 14-814 Spring 2011 Patrick Tague Feb 1, 2011 SURVEY: Physical Layer Security Announcements HW #1 is posted on main class website Due 2/10 @ 11:59pm (PST) Office hours on 2/1 will

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

Hardware/Software Codesign for Wireless Systems (E168b) Lab 2: GPS Correlator

Hardware/Software Codesign for Wireless Systems (E168b) Lab 2: GPS Correlator Harris Hardware/Software Codesign for Wireless Systems (E168b) Lab 2: GPS Correlator Introduction In this lab, you will build a time-multiplexed correlator to search for and track GPS satellite signals.

More information

Experimental Analysis of Attacks on Next Generation Air Traffic Communication

Experimental Analysis of Attacks on Next Generation Air Traffic Communication Experimental Analysis of Attacks on Next Generation Air Traffic Communication Matthias Schäfer, Vincent Lenders and Ivan Martinovic June 27th, 2013 1. Introduction Introduction 1 Introduction 2 Attacks

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

EDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014

EDUCATION AND ENGAGEMENT JANA SEBESTIK ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 NOVEMBER, 12, 2014 ANNUAL INDUSTRY WORKSHOP NOVEMBER 12-13, 2014 EDUCATION AND ENGAGEMENT NOVEMBER, 12, 2014 JANA SEBESTIK TCIPG EDUCATION ASSISTANT DIRECTOR FOR STEM CURRICULUM DESIGN, OFFICE FOR MATHEMATICS, SCIENCE, AND

More information

Bob Braden Alison Silverstein Dick Willson Dan Lutter

Bob Braden Alison Silverstein Dick Willson Dan Lutter Bob Braden Alison Silverstein Dick Willson Dan Lutter USC/ISI NASPI Project Allied Partners Manager 1 In Nov 2014, the NASPI Data & Network Management Task Team (D&NMTT) surveyed networking practice in

More information

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017

SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 SIDE CHANNEL ATTACKS AGAINST IOS CRYPTO LIBRARIES AND MORE DR. NAJWA AARAJ HACK IN THE BOX 13 APRIL 2017 WHAT WE DO What we do Robust and Efficient Cryptographic Protocols Research in Cryptography and

More information

Configuring NTP. Information About NTP. This chapter contains the following sections:

Configuring NTP. Information About NTP. This chapter contains the following sections: This chapter contains the following sections: Information About NTP, page 1 NTP as Time Server, page 2 Distributing NTP Using CFS, page 2 Clock Manager, page 2 High Availability, page 2 Virtualization

More information

Distributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC

Distributed Meta-data Servers: Architecture and Design. Sarah Sharafkandi David H.C. Du DISC Distributed Meta-data Servers: Architecture and Design Sarah Sharafkandi David H.C. Du DISC 5/22/07 1 Outline Meta-Data Server (MDS) functions Why a distributed and global Architecture? Problem description

More information

Mobile Millennium Using Smartphones as Traffic Sensors

Mobile Millennium Using Smartphones as Traffic Sensors Mobile Millennium Using Smartphones as Traffic Sensors Dan Work and Alex Bayen Systems Engineering, Civil and Environmental Engineering, UC Berkeley Intelligent Infrastructure, Center for Information Technology

More information

White paper. Interleaved MIMO: Near-full MIMO performance, nearly half the costs

White paper. Interleaved MIMO: Near-full MIMO performance, nearly half the costs White paper Interleaved MIMO: Near-full MIMO performance, nearly half the costs Contents Introduction 3 Colocated MIMO: High performance at a high cost 3 Interleaved MIMO DAS: A lot more performance for

More information

The Virtual Power System Testbed (VPST) and Inter- Testbed Integration

The Virtual Power System Testbed (VPST) and Inter- Testbed Integration The Virtual Power System Testbed (VPST) and Inter- Testbed Integration August 10, 2009 David Bergman Dong Jin Prof. David Nicol Tim Yardley (Presenter) University of Illinois at Urbana-Champaign www.iti.illinois.ed

More information

This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections:

This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: About NTP, page 1 Licensing Requirements for NTP, page 3 Prerequisites

More information

Presented at the FIG Working Week 2017, May 29 - June 2, 2017 in Helsinki, Finland

Presented at the FIG Working Week 2017, May 29 - June 2, 2017 in Helsinki, Finland Presented at the FIG Working Week 2017, May 29 - June 2, 2017 in Helsinki, Finland OUTLINE I INTRODUCTION II GNSS MEASUREMENTS AND METHODOLOGY III IV TEST RESULTS AND DISCUSSION Concluding Remarks ONE

More information

Ali Abur Northeastern University Department of Electrical and Computer Engineering Boston, MA 02115

Ali Abur Northeastern University Department of Electrical and Computer Engineering Boston, MA 02115 Enhanced State t Estimation Ali Abur Northeastern University Department of Electrical and Computer Engineering Boston, MA 02115 GCEP Workshop: Advanced Electricity Infrastructure Frances Arriallaga Alumni

More information

Configuring NTP. Information About NTP. This chapter contains the following sections:

Configuring NTP. Information About NTP. This chapter contains the following sections: This chapter contains the following sections: Information About NTP, page 1 NTP as Time Server, page 2 Distributing NTP Using CFS, page 2 Clock Manager, page 2 High Availability, page 2 Virtualization

More information

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar

Presentation at GLOBECOM After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise. Gregory Kanter and Prem Kumar Presentation at GLOBECOM 2007 After quantum keys are distributed: Physical-Layer Encryption Aided by Optical Noise By Gregory Kanter and Prem Kumar NuCrypt, LLC 1801 Maple Ave. #6322, Evanston, IL 60201-3135

More information

Observed Differential Carrier Phase Float Accuracies on three Kinematic Surveys using a u-blox Antaris GPS Receiver under Open Sky Conditions

Observed Differential Carrier Phase Float Accuracies on three Kinematic Surveys using a u-blox Antaris GPS Receiver under Open Sky Conditions Observed Differential Carrier Phase Float Accuracies on three Kinematic Surveys using a u-blox Antaris GPS Receiver under Open Sky Conditions By David MacDonald Waypoint Consulting Inc. June 2005 Three

More information

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections:

Configuring NTP. Information About NTP. Information About the NTP Server. This chapter contains the following sections: This chapter contains the following sections: Information About NTP Information About NTP, on page 1 Licensing Requirements, on page 3 Prerequisites for NTP, on page 3 Guidelines and Limitations for NTP,

More information

LTE and IEEE802.p for vehicular networking: a performance evaluation

LTE and IEEE802.p for vehicular networking: a performance evaluation LTE and IEEE802.p for vehicular networking: a performance evaluation Zeeshan Hameed Mir* Fethi Filali EURASIP Journal on Wireless Communications and Networking 1 Presenter Renato Iida v2 Outline Introduction

More information

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication

NETWORKING. 8. ITDNW08 Congestion Control for Web Real-Time Communication NETWORKING 1. ITDNW01 Wormhole: The Hidden Virus Propagation Power of a Search Engine in Social 2. ITDNW02 Congestion Control for Background Data Transfers With Minimal Delay Impact 3. ITDNW03 Transient

More information

The Performance Evaluation of the Integration of Inertial Navigation System and Global Navigation Satellite System with Analytic Constraints

The Performance Evaluation of the Integration of Inertial Navigation System and Global Navigation Satellite System with Analytic Constraints Journal of Environmental Science and Engineering A 6 (2017) 313-319 doi:10.17265/2162-5298/2017.06.005 D DAVID PUBLISHING The Performance Evaluation of the Integration of Inertial Navigation System and

More information

Options for Mitigating Potential GPS Vulnerabilities

Options for Mitigating Potential GPS Vulnerabilities Options for Mitigating Potential GPS Vulnerabilities GPS receivers have been widely used in communications infrastructure to provide precise time and frequency required to synchronize wireless base stations

More information

CEER Cyber-Physical Testbeds (a generational leap)

CEER Cyber-Physical Testbeds (a generational leap) CEER Cyber-Physical Testbeds (a generational leap) CEER: Cyber-Physical Experimentation (testbed operation support) DATA ASSETS CLOUD Customer TESTBED PEOPLE PROVISION LOCAL SCIENCE Other Testbeds Testbed

More information

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Network Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010 Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)

More information

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia

Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Distributed Internet-Based Load Altering Attacks Against Smart Power Grids Authors: A.-H. Mohsenian-Rad and A. Leon-Garcia Presenter: Harsha Patibandla Submitted in Partial Fulfillment of the Course Requirements

More information

Ad-hoc Storage Overlay System

Ad-hoc Storage Overlay System Ad-hoc Storage Overlay System (ASOS) David Barbour dmbarbour@gmail.com EECS 800: Survivable Networking Professor James P. G. Sterbenz Presentation based upon paper: Guang Yang, Ling-Jyh Chen, Tony Sun,

More information

Initial Simulation Results for AVB Synchronization Transported using IEEE 1588 Peer-to-Peer Transparent Clocks

Initial Simulation Results for AVB Synchronization Transported using IEEE 1588 Peer-to-Peer Transparent Clocks Initial Simulation Results for AVB Synchronization Transported using IEEE 1588 Peer-to-Peer Transparent Clocks Geoffrey M. Garner SAMSUNG Electronics (Consultant) IEEE 802.1 AVB TG IEEE 1588 2006.05.16

More information