MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?
|
|
- Augustus Russell
- 5 years ago
- Views:
Transcription
1 MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June 2018 Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1
2 Webinar ID : MGA Webinar # 5 Webinar Information Webinar Topic : Threats to GNSS : Can We Falsify GPS Data? Date : 22 nd June 2018 Friday, Time : 18:00 (JST) 09:00 (UTC) Duration : 45min + 15min (Q/A) Resource Person : Dinesh Manandhar, Associate Professor, The University of Tokyo Registration : Further Information: Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 2
3 Threat Types Intentional Threats Interference, Jamming, Spoofing and Meaconing Non-Intentional Threats Interference, Jamming Interference from Cell-towers Natural Threats Solar Flares, Sun Spots (Space Weather) Impact on Satellite Orbit In this webinar, we discuss about SPOOFING Threats Dinesh Manandhar, CSIS, The University of Tokyo, 3
4 Background Information : GPS Signal Structure x Phase Reverse L1 Carrier, Mhz x1/10 X1, Clock 10.23Mhz C / A Code, 1.023Mhz x1/ Navigation Data, 50Hz L1 Band GPS Signal P Code, 10.23Mhz Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 4
5 GPS Signal Block Diagram of GPS Receiver Antenna AGC Pre-Amp LNA Down Converter A/D Converter Baseband Signal Processing Oscillator Frequency Generator Acquisition Tracking Navigation Data Position Output Dinesh Manandhar, CSIS, The University of Tokyo, 5
6 Amplitude Time Domain Plot of IF Data File: JAX_LIV.dat Time-domain 6 Plot of GPS IF Signal How does GPS Signal Look Like? Magnitude, db Frequency Domain Plot of IF Data File: JAX_LIV.dat Frequency-domain Plot of 15 GPS IF Signal (Fourier Transform) Number of Samples in a Bin Histogram of IF Data File: JAX_LIV.dat Histogram of GPS IF Signal Time (ms) Frequency (MHz) Bin Value Acquisition of GPS L1C/A Signal with Low Noise Acquisition of GPS L1C/A Signal with Higher Noise Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 6
7 Why is GPS Signal So Vulnerable? The signal is extremely weak It is below the thermal noise of the receiver,-111dbm No signal protection scheme is implemented except P(Y) code, military use signal Signal specifications are open to everyone Even new signals do not have protection plans against spoofing QZSS Signal is also equally vulnerable as GPS signal QZSS signals are almost the same as GPS signals JIS devices are commercially available off-the-shelf JIS: Jamming, Interference & Spoofing Dinesh Manandhar, CSIS, The University of Tokyo, 7
8 GPS Signal Power: How Strong or How Weak? GPS satellites are about 22,000km away Transmit power is about 30W This power when received at the receiver is reduced by times. The power reduces by 1/distance 2 This is similar to seeing a 30W bulb 22,000Km far GPS signals in the receiver is about Watt, which is below the thermal noise 30Watt Watt Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 8
9 GPS Signal Power: How Strong or How Weak? GPS Signal Power at Receiver -130dBm or -160dBW Thermal Noise Power Defined by kt eff B, where K = e-23JK -1, Boltzman Constant T eff = , for Room temperature in Kelvin at 290 Teff is effective Temperature based on Frii s formula B = 2.046MHz, Signal bandwidth Thermal Noise Power = -110dBm for 2MHz bandwidth If Bandwidth is narrow, 50Hz Noise Power = -156dBm Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 9
10 GPS Signal Power GPS Signal Level -130dBm GPS Signal is hidden inside Thermal Noise due to Spread Spectrum Noise Level -111dBm GPS Signal power level is below the thermal noise level of the system. Hence, it is not possible to measure GPS signal level without demodulation (de-spreading). Dinesh Manandhar, CSIS, The University of Tokyo, 10
11 Below Noise Above Noise Power of GPS Signal vs. Other Signals Signal Type Mobile Phone Handset TX Power * RX Power at Mobile Phone Handset* Power (based on calculations, not measured) Watt dbw dbm 1W 0dBW 30dBm 100e-6W -40dBW -70dBm ZigBee 316e-16W -115dBW -85dBm VHF 200e-16W -137dBW -107dBm Thermal Noise 79e-16W -141dBW -111dBm GPS** 1e-16W -160dBW -130dBm * Actual power values will differ. These are just for comparison purpose ** GPS Signals are hidden under the noise. Thus, it can t be measured directly e.g. using a Spectrum Analyzer Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 11
12 Impact on Signal Processing due to Noise or Interference Signal Presence of high level noise This requires longer integration of data More processing power PRN 13 Integration Time : 1ms PRN 13 Integration Time : 3ms PRN 13 Integration Time : 6ms PRN 22 Integration Time : 1ms PRN 22 Integration Time : 3ms PRN 22 Integration Time : 6ms Presence of noise PRN 3 Integration Time : 1ms PRN 3 Integration Time : 3ms PRN 3 Integration Time : 6ms Very small noise Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 12
13 GPS Spoofing Dinesh Manandhar, CSIS, The University of Tokyo, 13
14 11:26:28 PM Quiz : Can You Trust GPS Position & Time Data? Yes, You can But Need to Verify Because of Spoofing Issues Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 14
15 What is Location Spoofing? Falsify Location Data as If it were True Location Where is it? Tokyo or Hawaii? TOKYO TOKYO Or Hawaii? HAWAII James Bond s Tomorrow Never Dies movie is all about GPS Spoofing by using a Spy Satellite to broadcast GPS like spoof signal. Spoofer Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 15
16 Why SPOOFING is Dangerous compared to Interference & Jamming? Spoofing Jamming and Interference Intentional Difficult to Detect Available of Service but Lead to False Position Data Intentional and Non-Intentional Can be Detected Denial of Service No Effective Solution for Existing Signals Fewer Research and Studies Many Solutions Exist Many Research and Studies Dinesh Manandhar, CSIS, The University of Tokyo, 16
17 Software-Based GPS Signal Generator (Spoofer?) Ephemeris Data RINEX File User Motion Data Static or Dynamic Select Visible Satellites Generate Signal Adjust Signal Output Power Digital I/Q Signal Output Digital IQ Signal fs = 26MHz A/D = 12bit Digital to Analog (D/A) Conversion Transmit Signal Simulation Date, Time and Duration Digital Signal Properties (Sampling Freq, Bit Rate, IF etc) Antenna Gain Pattern Software Hardware Signal Generation Digital IQ Signal GPS L1C/A f = MHz Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 17
18 SPOOFing a Car: Is he driving the car? Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 18
19 24 th June 2017 A GPS spoofing attack in June, involving over 20 vessels in the Black Sea, has been reported. Probably the first official record of spoofing. More. GPS Spoofing in Black Sea? Black Sea Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 19
20 Fishing Vessels might be Spoofed! B A Vessel B approaches Vessel A B A B A Vessel B setup the Spoofing System for Vessel A. Vessel A uses Vessel B s Coordinates B A Exclusion Zone A The Spoofing System is disabled. Vessel A and Vessel B takes normal route to go to their destinations. Vessel A enters Exclusion Zone but it Transmits Vessel B s Coordinates. So, the Authority sees Vessel A at the location of Vessel B. Based on JRC Technical notes: Report on Authentication in Fisheries Monitoring No Ships shall Enter this Zone for Fishing Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 20
21 Drug Traffickers Are Spoofing Border Drones: DHS, USA DHS: Department of Homelands Security, USA Dinesh Manandhar, CSIS, The University of Tokyo, 21
22 Published on 10 th NOV 2017 US Defense Bill 2018: Use GPS with Galileo and QZSS to Improve Accuracy and Resiliency The House and Senate agreed Wednesday on the final National Defense Authorization Act (NDAA) for It included at least two provisions of interest to our readers: SEC DEMONSTRATION OF BACKUP AND COMPLEMENTARY POSITIONING, NAVIGATION, AND TIMING CAPABILITIES OF GLOBAL POSITIONING SYSTEM - Requires the Departments of Defense, Transportation and Homeland Security to conduct a $10M technology demonstration/ proof of concept for a GPS backup system. This demonstration is to be based upon information gathered from a requirements and alternatives analysis study mandated by last year's NDAA. SEC ENHANCEMENT OF POSITIONING, NAVIGATION, AND TIMING CAPACITY - Requires the Secretary of Defense to ensure DoD receivers incorporate Europe's Galileo and Japan's QZSS satellite signals along side GPS in order to improve accuracy and resiliency. It also directs the secretary to assess use of non-allied satellite navigation in DoD receivers. Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 22
23 Became Public Law No: , 12/12/2017 US President Signs Law Requiring GPS Backup Demo QZSS could be a part of GPS back-up system for Resiliency Source: Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 23
24 GPS Spoofing Poses Risk of Future Havoc GPS 'Spoofing' is No Joke: Dangers of GPS Data Hacking Realized GNSS spoofing will attain virus status, warns expert GPS World Hacking Global Positioning System with GPS Spoofing Can Lead To Fatalities Dangers of GPS spoofing and hacking for location based services Faking of GPS Data a growing and potentially lethal danger The Japan Times, FB Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 24
25 GPS Tracking is Illegal without Warrant: Japan Supreme Court Ruling 15 th March 2017 New rules might be implemented to make GPS tracking legal with warrant. But, there is also fear of GPS Signal Spoofing. Dinesh Manandhar, CSIS, The University of Tokyo, 25
26 Why Authentication is Necessary? Geo-Fencing Geo-Security Insurance Pay-As-You- Drive Toll Fee Importance of Authentication ADAS ITS Auto- Driving Alternate for Fuel Tax Collection Secured Transport of Dangerous Goods Dinesh Manandhar, CSIS, The University of Tokyo, 26 IoT M2M V2V / V2X
27 Self-Spoofing Connect by cable Real Signal Absent Spoofing Methods Self-Spoofing Connect by cable Real Signal Present Self or 3 rd Party Spoofing Over the air transmission Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 27
28 Experiment Setup to Test GPS Spoofing GNSS Antenna GPS Receiver Live GPS Signal from Antenna PC Signal Combiner GPS Receiver GNSS Signal Generator ATT SPOOFER Attenuator 0 30dB SPOOFER Attenuator Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 28
29 Online Spoofing Demo Dinesh Manandhar, CSIS, The University of Tokyo, 29
30 Examples of TRUE signal and SPOOF Signal Power Spectrum of IF Data TRUE Signal SPOOF Signal during the Attack Period Dinesh Manandhar, CSIS, The University of Tokyo, 30
31 Examples of TRUE signal and SPOOF Signal Time Series IF Data, I & Q Channels Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 31
32 Examples of TRUE signal and SPOOF Signal Histogram of IF Data, I & Q Channels Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 32
33 Examples of TRUE signal and Very Strong SPOOF Signal Power Spectrum, Time Series and Histogram of IF Data Dinesh Manandhar, CSIS, The University of Tokyo, 33
34 We will cover Anti-Spoof Solutions in the next webinar Dinesh Manandhar, CSIS, The University of Tokyo, 34
35 Additional Information Please visit websites For Webinar: Contact: Dinesh Manandhar, CSIS, The University of Tokyo, 35
Lecture ID: WT
GNSS Online Lecture # 1 Lecture ID: WT-103-401 Lecture Topic: GNSS Data Processing in RTKLIB Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp
More informationRobust GPS-Based Timing for Phasor Measurement Units
TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY
More informationSpoofing GNSS Timing Receivers
Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical
More informationGPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security
GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection
More informationGPS SPOOFING: NO LONGER A FISH STORY
SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and
More informationMiguel Martins itrust consulting
Tailoring information security to business requirements itrust consulting s.à r.l. Headquarters: 18, Steekaul L-6831 Berbourg Tel: +352 26 17 62 12 Fax: +352 26 71 09 78 Mail: Info@itrust.lu Web: www.itrust.lu
More informationAssessing the Civil GPS Spoofing Threat
Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell
More informationGlobal Satellite Services
Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity Content 1. Location revolution 2. World of Spoofing
More informationConsiderations for SDR Implementations in Commercial Radio Networks
Considerations for SDR Implementations in Commercial Radio Networks Hans-Otto Scheck Nokia Networks P.O.Box 301 FIN-00045 Nokia Group hans-otto.scheck@nokia.com ETSI Software Defined Radio (SDR) / Cognitive
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationGPS Vulnerability Report
GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements
More informationGNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY
GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International
More informationBriefing: Navigation Message Authentication for Civil GPS Anti-Spoofing
Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing
More informationSensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016
Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused
More informationCyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)
Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,
More informationWHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight
Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly
More informationTime Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi
Time Synchronization Trends for Critical Infrastructure Randy Brudzinski Vice President Microsemi Power Matters. TM Microsemi Corporation Time Synchronization Trends for Critical Infrastructure Randy Brudzinski
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationLora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation
Lora-A Revolutionary Technology for IOT LPWAN Tony Li Vice President of China Sales and Marketing, Semtech Corporation IoT Connected Device Opportunity Ericsson Gartner 28B 21B Source:Ericsson. Ericsson
More informationHacking challenge: steal a car!
Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities
More informationEFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th
EFFECTIVE DEFENCE In a connected world Philippe COTELLE, Airbus Defence and Space 206, Nov 4th Telecommunications Satellites Cybersecurity Threats Telemetry & Command hijack or jamming Data communication
More informationFLEET MANAGEMENT
FLEET MANAGEMENT We offer wide range of fleet management products dedicated for professional applications. We constantly upgrade our existing products and launch new ones to meet expectations of our customers.
More informationAT Ground Surveillance System (GSS)
AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network
More informationGLONASS SHIELD USER MANUAL
GLONASS SHIELD USER MANUAL 11 MARCH, 2013 THANK YOU FOR BUYING OUR PRODUCT! Congratulations! You have purchased our GLONASS/GPS Shield expansion board used to determine geographical coordinates and time
More informationTwo-Antenna Differential Carrier Phase
GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase Mark L. Psiaki Sibley School of Mech. & Aero. Engr., Cornell Univ. Brady W. O'Hanlon & Steven P. Powell School of Electrical & Computer
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationFrom Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com
From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,
More informationCybersecurity of Space Missions
Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationNetworking & Censorship
Networking & Censorship How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Exploring virtual worlds Paying taxes Gambling Lots more Online
More informationDenial of Service Protection Standardize Defense or Loose the War
Denial of Service Protection Standardize Defense or Loose the War ETSI : the threats, risk and opportunities 16th and 17th - Sophia-Antipolis, France By: Emir@cw.net Arslanagic Head of Security Engineering
More informationTiger Scheme QST/CTM Standard
Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)
More informationGNU Radio Software Defined DSRC Radio
Institute for Critical Technology and Applied Science GNU Radio Software Defined DSRC Radio Joseph M. Ernst, PhD Research Assistant Professor (540) 231-2254, jmernst@vt.edu hume@vt.edu www.hume.vt.edu
More informationThe challenges, opportunities and setting the framework for 5G EMF and Health
The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management
More informationCan You Haul Me Now? Bart Filipiak Market Development Manager 18 March 2009 Piedmont SCTE
Can You Haul Me Now? Bart Filipiak Market Development Manager 18 March 2009 Piedmont SCTE What is Cellular? 2 Wireless Evolution 2G Digital communications aka PCS GSM (TDMA- AT&T, T-Mobile) CDMA One iden
More informationGPS Monitoring Station Data Management
GPS Monitoring Station Data Management Héctor Manuel Maestro Alegre Abstract- GPS is nowadays the most important GNSS and the only one fully operative. Nowadays, this navigation system is becoming omnipresent
More informationOyster Cellular Datasheet Engineered to outperform Revision February 2017
Engineered to outperform Revision 1.1-20 February 2017 1. BATTERY POWERED GPS ASSET TRACKING ON 2G AND 3G The Oyster is a compact, rugged GPS tracking device that has been designed for tracking containers,
More informationElectron Asset Tracker
Electron Asset Tracker The Asset Tracker is a cellular solution for tracking the location of just about anything! The included shield has a GPS module and an accelerometer, so you can make projects that
More informationTiming in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015
Timing in Cyber Physical Systems Marc Weiss, Ph.D. mweiss@nist.gov NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems: Outline The term Timing used here as a general term: frequency,
More informationState of play of the European GNSS
State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service
More informationLuxGovSat the latest Luxembourg Satcom Business
LuxGovSat the latest Luxembourg Satcom Business Overview for the BCC Presented by: Paul Wells Vice President Government Satellite Communications 13 th October, 2017 LuxGovSat Secure Government Satellite
More informationDigital Authentication Strategies for the Automated Identification System
Digital Authentication Strategies for the Automated Identification System Alexander Stewart, Erich Rice, and Paul Safonov Masters Program in Information Assurance Information Systems Department St Cloud
More informationUAS Operation in National Air Space (NAS) Secure UAS Command and Control
UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Update for Roof Coatings Manufacturers
More informationEuroAfrica-ICT Awareness Workshop: AFSAGA FP6 Project. Eugene Avenant CSIR Satellite Application Centre
EuroAfrica-ICT Awareness Workshop: AFSAGA FP6 Project Eugene Avenant CSIR Satellite Application Centre African Satellite communications and Galileo applications Slide 2 CSIR 2007 www.csir.co.za euroafrica-ict
More informationGPS Spoofing Susceptibility Testing
GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With
More informationRECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz
Rec. ITU-R M.1453-2 1 RECOMMENDATION ITU-R M.1453-2 Intelligent transport systems dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002-2005) Scope This Recommendation outlines
More informationWELCOME Mobile Applications Testing. Copyright
WELCOME Mobile Applications Testing 1 Mobile Applications Testing List of MUST HAVE to survive this class Required Google Drive account Google email Flash Drive Mobile Phone (iphone/android) Desired Have
More informationStaying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.
Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for
More informationTECHNICAL DESCRIPTION
Rev 1.1 TECHNICAL DESCRIPTION Fastrax UP501 GPS Receiver This document describes the electrical connectivity and main functionality of the Fastrax UP501 hardware. July 1 st, 2010 Fastrax Ltd. TRADEMARKS
More informationCambium Networks LTE Program. EMEA Partner Event Budapest, July 2018
Cambium Networks LTE Program EMEA Partner Event Budapest, July 2018 Why LTE? Customer Perspective Small WISP (
More informationTelecommunications Regulation. EL SALVADOR Romero Pineda & Asociados
Telecommunications Regulation EL SALVADOR Romero Pineda & Asociados CONTACT INFORMATION Antonio R. Méndez Llort Romero Pineda & Asociados Edificio World Trade Center Torre I, Suite 305, San Salvador, El
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationStarFinder Aire User Manual
Document No.: Document Type: Security Level: 270-UM-001 User Manual Open StarFinder Aire User Manual (Preliminary) Version 1.00 Dec. 05, 2015 Copyright Laipac Technology Inc. Release History Revision Date
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Engineering 2011 Intake Semester 7 Examination CS4422 WIRELESS AND BROADBAND NETWORKING Time allowed: 2
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationCertification of EGNSS Timing Receivers and Services
Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint
More informationBASTA Baltic Sea Rim Maritime and Seaport Connectivity. Project proposal, subject to contract
BASTA Baltic Sea Rim Maritime and Seaport Connectivity Project proposal, subject to contract Challenge in maritime industry Lack of affordable state-of-the-art broadband connectivity affects businesses,
More informationThe new wave in satellite broadband connectivity at sea
The new wave in satellite broadband connectivity at sea www.thuraya.com Follow us on /thurayatelecom Thuraya Atlas IP+ Every day, more and more vessels traverse the oceans to facilitate global trade, protect
More informationSecuring connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity
Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems
More informationDedicated Short Range Communication: What, Why and How?
Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background
More informationTransmission Security (TRANSEC) in an IP based VSAT Architecture April 2007
Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007-1 - As the ability to monitor satellite transmissions grows increasingly sophisticated, the need to implement increased levels
More informationC UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14
Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives
More informationN2 di-gps mini digital images GPS
N2 di-gps mini digital images GPS Users Guide Ver 1.03 Please visit our website www.di-gps.com for the latest version of the user guide Fujifilm and S5 Pro are registered trademark or a trademark of FUJIFILM
More informationVehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI
Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery
More informationTM1000A. GPS Based Network Time Server. Installation and Operation Manual
TM1000A GPS Based Network Time Server Installation and Operation Manual Table of Contents 1 Introduction...1 1.1 Serial Number Notes:...1 2 Installation...2 2.1 Location...2 2.2 Connections...2 2.2.1 Antenna...2
More informationWireless Mics, White Spaces and You. Karl Voss KAET
Wireless Mics, White Spaces and You Karl Voss KAET White Space 101 General Terminology White Space Devices (WSD) TV Band Devices (TVBD) White Space Database (WSDB) Low Power Auxiliary (LPA) FCC Licensed
More informationGPS S1216F8 Breakout Board (v1.0)
GPS S1216F8 Breakout Board (v1.0) Released under the Creative Commons Attribution Share-Alike 3.0 License http://creativecommons.org/licenses/by-sa/3.0/ Overview SkyTraq has introduced the fastest consumer
More informationNimbra - communication platform for the SmartGRID
Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for
More informationFleet Management - Smart, Secure and Easy
Fleet Management - Smart, Secure and Easy Automile is a comprehensive fleet management solution to monitor both company and service vehicles and provide rich insights. Our hardware requires no installation
More informationG903 NB-IoT GPS Tracker User Manual V1.0
G903 NB-IoT GPS Tracker User Manual V1.0 Preface Congratulations on choosing the Mictrack G903 NB-IoT GPS tracker. This manual shows how to easily program and setup the tracker for best results. Make sure
More informationREPORT NO: E6V2 DATE: JULY 24, F -13dBm F -13dBm
CDMA ID: 44410 Date: 3/7/18 CDMA 1xRTT BC10 Limit Condition 816.35 823.65 F low @ F high @ Delta (Hz) Frequency Stability (ppm) Temperature Voltage (MHz) (MHz) Normal (20C) 816.5679 823.4405 Extreme (50C)
More informationSatellite Communications
Satellite Communications Ryan Smith Maritime Market & Broadband Communications at sea changing dramatically New services offer global coverage and broadband speeds at an affordable prices Hardware is smaller,
More informationFMB204 FLEET MANAGEMENT // FMB204
FMB204 Teltonika FMB204 is a SPECIAL waterproof (IP67) tracker with Bluetooth connectivity, internal high gain GNSS and GSM antennas and integrated high capacity backup battery. Device is designed to work
More informationThe dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert
Automation Instrumentation Summit - 2017 The dark side of IOT Francesco Zucca Wireless Expert 1 Agenda Introduction IIOT How to work WSN Typical hacker attack in WSN Issue with Drones Security Countermeasures
More informationThe Role of PNT in Cybersecurity Location-based Authentication
The Role of PNT in Cybersecurity Location-based Authentication Dr. Michael O Connor November 14, 2013 Satelles is a Division of ikare Corporation What do we mean by Authentication? Authentication is the
More informationQuiz: Application of Telecommunication Topic : General Revision
Quiz: Application of Telecommunication Topic : General Revision Name Time : 1:30 Minutes Q1: Engr. Zohaib-ur-Rehman, has been appointed new intern for cellular company, The first Task assigned to him by
More informationInstructor: Eric Rettke Phone: (every few days)
Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the
More informationQuick Start Guide CJB1950ALAAB
Quick Start Guide 1 CJB1950ALAAB www.sar-tick.com This product meets applicable national SAR limits of 2.0W/kg. The specific maximum SAR values can be found in the section of this user guide. When carrying
More informationSPREE: A Spoofing Resistant GPS Receiver
SPREE: A Spoofing Resistant GPS Receiver Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun raanjhan@inf.ethz.ch, ohildur@inf.ethz.ch, capkuns@inf.ethz.ch Department of Computer Science ETH Zurich,
More informationThinkRF R5500. Real-Time Spectrum Analyzer 9 khz to 8 GHz / 18 GHz / 27 GHz. Technical Data Sheet Preliminary
Technical Data Sheet Preliminary ThinkRF R5500 Real-Time Spectrum Analyzer 9 khz to 8 GHz / 18 GHz / 27 GHz Featuring Real-Time Bandwidth (RTBW) up to 100 MHz Spurious Free Dynamic Range (SFDR) up to 100
More informationTerms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client
Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible
More informationSH1030 Rev Introduction. Ultra low power DASH7 Arduino Shield Modem. Applications. Description. 868 MHz. Features
SH1030 Rev. 1.2 Applications Wireless sensor network Data acquisition equipment Security systems Industrial monitor and control Internet of things (IoT) Ultra low power DASH7 Arduino Shield Modem 868 MHz
More informationPMU Time Source Security
PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization
More informationMobile Hands Free Operation. Ontario Regulation 366/09
Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer
More informationRAK811 LoRa / LoRAWAN module (based on SX1276) 868/915MHz up to 3km range
RAK811 LoRa / LoRAWAN module (based on SX1276) 868/915MHz up to 3km range RAK811 LoRa Module LoRaWAN module base on SX1276 LoRa spread spectrum. Embedded LoRaWAN protocol class A&C. Easily connects to
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationThe SCADA Connection: Moving Beyond Auto Dialers
WHITE PAPER The SCADA Connection: Moving Beyond Auto Dialers ABSTRACT: Auto dialers have long been used to report alarms in SCADA installations. While they are useful for notifying users of alarm states,
More informationTHE NEXT GENERATION OF ELECTRONIC MONITORING POWERED BY EUROPEAN SATELLITES
THE NEXT GENERATION OF ELECTRONIC MONITORING POWERED BY EUROPEAN SATELLITES A European civilian and secure alternative the military U.S. GPS technology Let s work together to prepare tomorrow s secure
More informationJapan. December 13, C-V2X Trial in Japan. Qualcomm Technologies Inc.
December 13, 2018 Japan C-V2X Trial in Japan Qualcomm Technologies Inc. Continental, Ericsson, Nissan, NTT DOCOMO, OKI, Qualcomm Technologies 2 Trial objectives The objective is to validate and demonstrate
More informationMGL Avionics. N16 Aviation band Navigation Radio ICD V1
MGL Avionics N16 Aviation band Navigation Radio ICD V1 Table of Contents MGL Avionics N16 transceiver communications protocols...3 Version...3 The legal stuff...3 General...3 Frequencies...4 RS232 protocol...4
More informationResponse to the Comments on the PAR
802.22 Response to the Comments on the 802.22.1 PAR Date: 2012-11-13 Authors: Name Company Address Phone email Apurva N. Mody BAE Systems P. O. Box 868, MER 15-2350, Nashua, NH 03061 1-404-819-0314, 1-603-
More informationto your Pocket PC? 3. Click new to connect
P i-geo+ USERS MANUAL How to connect your i-geo+ Version Issue date Description A 14 Nov. 2005 Initial Release Your Polstar i-geo+ GPS receiver uses world-class technology to provide you with a GPS receiver
More informationLIABILITY-CRITICAL APPLICATIONS
Integrity and Interoperability for LIABILITY-CRITICAL APPLICATIONS Property of GMV All rights reserved LIABILITY CRITICAL APPLICATIONS (OF GNSS POSITIONING) Those in which large unnoticed navigation errors
More informationTV White Space for Affordable Broadband Access
TV White Space for Affordable Broadband Access Abhay Karandikar Institute Chair Professor Department of Electrical Engineering Indian Institute of Technology Bombay, Mumbai 400076 karandi@ee.iitb.ac.in
More informationdi-gps Pro L digital images GPS receiver (Built-in data Logger)
di-gps Pro L digital images GPS receiver (Built-in data Logger) User Guide Ver 1.4 Please visit our website www.di-gps.com for the latest version of the user guide V1.4 1 Contents Introduction 3 Warning
More informationcongestion energy & environment accessibility aging infrastructure
Living with and loving transportation technologies Dan Work Assistant Professor, Civil and Environmental Engineering, Coordinated Science Laboratory, and Electrical and Computer Engineering (courtesy)
More informationSYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS
SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;
More informationUnderstanding Cyber Attacks That Leverage the Telephony Channel
SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi payasgupta@nyu.edu In collaboration with Mustaque
More information