MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

Size: px
Start display at page:

Download "MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?"

Transcription

1 MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp 22 nd June 2018 Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1

2 Webinar ID : MGA Webinar # 5 Webinar Information Webinar Topic : Threats to GNSS : Can We Falsify GPS Data? Date : 22 nd June 2018 Friday, Time : 18:00 (JST) 09:00 (UTC) Duration : 45min + 15min (Q/A) Resource Person : Dinesh Manandhar, Associate Professor, The University of Tokyo Registration : Further Information: Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 2

3 Threat Types Intentional Threats Interference, Jamming, Spoofing and Meaconing Non-Intentional Threats Interference, Jamming Interference from Cell-towers Natural Threats Solar Flares, Sun Spots (Space Weather) Impact on Satellite Orbit In this webinar, we discuss about SPOOFING Threats Dinesh Manandhar, CSIS, The University of Tokyo, 3

4 Background Information : GPS Signal Structure x Phase Reverse L1 Carrier, Mhz x1/10 X1, Clock 10.23Mhz C / A Code, 1.023Mhz x1/ Navigation Data, 50Hz L1 Band GPS Signal P Code, 10.23Mhz Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 4

5 GPS Signal Block Diagram of GPS Receiver Antenna AGC Pre-Amp LNA Down Converter A/D Converter Baseband Signal Processing Oscillator Frequency Generator Acquisition Tracking Navigation Data Position Output Dinesh Manandhar, CSIS, The University of Tokyo, 5

6 Amplitude Time Domain Plot of IF Data File: JAX_LIV.dat Time-domain 6 Plot of GPS IF Signal How does GPS Signal Look Like? Magnitude, db Frequency Domain Plot of IF Data File: JAX_LIV.dat Frequency-domain Plot of 15 GPS IF Signal (Fourier Transform) Number of Samples in a Bin Histogram of IF Data File: JAX_LIV.dat Histogram of GPS IF Signal Time (ms) Frequency (MHz) Bin Value Acquisition of GPS L1C/A Signal with Low Noise Acquisition of GPS L1C/A Signal with Higher Noise Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 6

7 Why is GPS Signal So Vulnerable? The signal is extremely weak It is below the thermal noise of the receiver,-111dbm No signal protection scheme is implemented except P(Y) code, military use signal Signal specifications are open to everyone Even new signals do not have protection plans against spoofing QZSS Signal is also equally vulnerable as GPS signal QZSS signals are almost the same as GPS signals JIS devices are commercially available off-the-shelf JIS: Jamming, Interference & Spoofing Dinesh Manandhar, CSIS, The University of Tokyo, 7

8 GPS Signal Power: How Strong or How Weak? GPS satellites are about 22,000km away Transmit power is about 30W This power when received at the receiver is reduced by times. The power reduces by 1/distance 2 This is similar to seeing a 30W bulb 22,000Km far GPS signals in the receiver is about Watt, which is below the thermal noise 30Watt Watt Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 8

9 GPS Signal Power: How Strong or How Weak? GPS Signal Power at Receiver -130dBm or -160dBW Thermal Noise Power Defined by kt eff B, where K = e-23JK -1, Boltzman Constant T eff = , for Room temperature in Kelvin at 290 Teff is effective Temperature based on Frii s formula B = 2.046MHz, Signal bandwidth Thermal Noise Power = -110dBm for 2MHz bandwidth If Bandwidth is narrow, 50Hz Noise Power = -156dBm Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 9

10 GPS Signal Power GPS Signal Level -130dBm GPS Signal is hidden inside Thermal Noise due to Spread Spectrum Noise Level -111dBm GPS Signal power level is below the thermal noise level of the system. Hence, it is not possible to measure GPS signal level without demodulation (de-spreading). Dinesh Manandhar, CSIS, The University of Tokyo, 10

11 Below Noise Above Noise Power of GPS Signal vs. Other Signals Signal Type Mobile Phone Handset TX Power * RX Power at Mobile Phone Handset* Power (based on calculations, not measured) Watt dbw dbm 1W 0dBW 30dBm 100e-6W -40dBW -70dBm ZigBee 316e-16W -115dBW -85dBm VHF 200e-16W -137dBW -107dBm Thermal Noise 79e-16W -141dBW -111dBm GPS** 1e-16W -160dBW -130dBm * Actual power values will differ. These are just for comparison purpose ** GPS Signals are hidden under the noise. Thus, it can t be measured directly e.g. using a Spectrum Analyzer Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 11

12 Impact on Signal Processing due to Noise or Interference Signal Presence of high level noise This requires longer integration of data More processing power PRN 13 Integration Time : 1ms PRN 13 Integration Time : 3ms PRN 13 Integration Time : 6ms PRN 22 Integration Time : 1ms PRN 22 Integration Time : 3ms PRN 22 Integration Time : 6ms Presence of noise PRN 3 Integration Time : 1ms PRN 3 Integration Time : 3ms PRN 3 Integration Time : 6ms Very small noise Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 12

13 GPS Spoofing Dinesh Manandhar, CSIS, The University of Tokyo, 13

14 11:26:28 PM Quiz : Can You Trust GPS Position & Time Data? Yes, You can But Need to Verify Because of Spoofing Issues Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 14

15 What is Location Spoofing? Falsify Location Data as If it were True Location Where is it? Tokyo or Hawaii? TOKYO TOKYO Or Hawaii? HAWAII James Bond s Tomorrow Never Dies movie is all about GPS Spoofing by using a Spy Satellite to broadcast GPS like spoof signal. Spoofer Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 15

16 Why SPOOFING is Dangerous compared to Interference & Jamming? Spoofing Jamming and Interference Intentional Difficult to Detect Available of Service but Lead to False Position Data Intentional and Non-Intentional Can be Detected Denial of Service No Effective Solution for Existing Signals Fewer Research and Studies Many Solutions Exist Many Research and Studies Dinesh Manandhar, CSIS, The University of Tokyo, 16

17 Software-Based GPS Signal Generator (Spoofer?) Ephemeris Data RINEX File User Motion Data Static or Dynamic Select Visible Satellites Generate Signal Adjust Signal Output Power Digital I/Q Signal Output Digital IQ Signal fs = 26MHz A/D = 12bit Digital to Analog (D/A) Conversion Transmit Signal Simulation Date, Time and Duration Digital Signal Properties (Sampling Freq, Bit Rate, IF etc) Antenna Gain Pattern Software Hardware Signal Generation Digital IQ Signal GPS L1C/A f = MHz Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 17

18 SPOOFing a Car: Is he driving the car? Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 18

19 24 th June 2017 A GPS spoofing attack in June, involving over 20 vessels in the Black Sea, has been reported. Probably the first official record of spoofing. More. GPS Spoofing in Black Sea? Black Sea Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 19

20 Fishing Vessels might be Spoofed! B A Vessel B approaches Vessel A B A B A Vessel B setup the Spoofing System for Vessel A. Vessel A uses Vessel B s Coordinates B A Exclusion Zone A The Spoofing System is disabled. Vessel A and Vessel B takes normal route to go to their destinations. Vessel A enters Exclusion Zone but it Transmits Vessel B s Coordinates. So, the Authority sees Vessel A at the location of Vessel B. Based on JRC Technical notes: Report on Authentication in Fisheries Monitoring No Ships shall Enter this Zone for Fishing Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 20

21 Drug Traffickers Are Spoofing Border Drones: DHS, USA DHS: Department of Homelands Security, USA Dinesh Manandhar, CSIS, The University of Tokyo, 21

22 Published on 10 th NOV 2017 US Defense Bill 2018: Use GPS with Galileo and QZSS to Improve Accuracy and Resiliency The House and Senate agreed Wednesday on the final National Defense Authorization Act (NDAA) for It included at least two provisions of interest to our readers: SEC DEMONSTRATION OF BACKUP AND COMPLEMENTARY POSITIONING, NAVIGATION, AND TIMING CAPABILITIES OF GLOBAL POSITIONING SYSTEM - Requires the Departments of Defense, Transportation and Homeland Security to conduct a $10M technology demonstration/ proof of concept for a GPS backup system. This demonstration is to be based upon information gathered from a requirements and alternatives analysis study mandated by last year's NDAA. SEC ENHANCEMENT OF POSITIONING, NAVIGATION, AND TIMING CAPACITY - Requires the Secretary of Defense to ensure DoD receivers incorporate Europe's Galileo and Japan's QZSS satellite signals along side GPS in order to improve accuracy and resiliency. It also directs the secretary to assess use of non-allied satellite navigation in DoD receivers. Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 22

23 Became Public Law No: , 12/12/2017 US President Signs Law Requiring GPS Backup Demo QZSS could be a part of GPS back-up system for Resiliency Source: Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 23

24 GPS Spoofing Poses Risk of Future Havoc GPS 'Spoofing' is No Joke: Dangers of GPS Data Hacking Realized GNSS spoofing will attain virus status, warns expert GPS World Hacking Global Positioning System with GPS Spoofing Can Lead To Fatalities Dangers of GPS spoofing and hacking for location based services Faking of GPS Data a growing and potentially lethal danger The Japan Times, FB Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 24

25 GPS Tracking is Illegal without Warrant: Japan Supreme Court Ruling 15 th March 2017 New rules might be implemented to make GPS tracking legal with warrant. But, there is also fear of GPS Signal Spoofing. Dinesh Manandhar, CSIS, The University of Tokyo, 25

26 Why Authentication is Necessary? Geo-Fencing Geo-Security Insurance Pay-As-You- Drive Toll Fee Importance of Authentication ADAS ITS Auto- Driving Alternate for Fuel Tax Collection Secured Transport of Dangerous Goods Dinesh Manandhar, CSIS, The University of Tokyo, 26 IoT M2M V2V / V2X

27 Self-Spoofing Connect by cable Real Signal Absent Spoofing Methods Self-Spoofing Connect by cable Real Signal Present Self or 3 rd Party Spoofing Over the air transmission Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 27

28 Experiment Setup to Test GPS Spoofing GNSS Antenna GPS Receiver Live GPS Signal from Antenna PC Signal Combiner GPS Receiver GNSS Signal Generator ATT SPOOFER Attenuator 0 30dB SPOOFER Attenuator Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 28

29 Online Spoofing Demo Dinesh Manandhar, CSIS, The University of Tokyo, 29

30 Examples of TRUE signal and SPOOF Signal Power Spectrum of IF Data TRUE Signal SPOOF Signal during the Attack Period Dinesh Manandhar, CSIS, The University of Tokyo, 30

31 Examples of TRUE signal and SPOOF Signal Time Series IF Data, I & Q Channels Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 31

32 Examples of TRUE signal and SPOOF Signal Histogram of IF Data, I & Q Channels Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 32

33 Examples of TRUE signal and Very Strong SPOOF Signal Power Spectrum, Time Series and Histogram of IF Data Dinesh Manandhar, CSIS, The University of Tokyo, 33

34 We will cover Anti-Spoof Solutions in the next webinar Dinesh Manandhar, CSIS, The University of Tokyo, 34

35 Additional Information Please visit websites For Webinar: Contact: Dinesh Manandhar, CSIS, The University of Tokyo, 35

Lecture ID: WT

Lecture ID: WT GNSS Online Lecture # 1 Lecture ID: WT-103-401 Lecture Topic: GNSS Data Processing in RTKLIB Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: dinesh@iis.u-tokyo.ac.jp

More information

Robust GPS-Based Timing for Phasor Measurement Units

Robust GPS-Based Timing for Phasor Measurement Units TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY

More information

Spoofing GNSS Timing Receivers

Spoofing GNSS Timing Receivers Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical

More information

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection

More information

GPS SPOOFING: NO LONGER A FISH STORY

GPS SPOOFING: NO LONGER A FISH STORY SESSION ID: MBS-F03 GPS SPOOFING: NO LONGER A FISH STORY Michael Shalyt CEO and Co-Founder Aperio Systems @MShalyt Outline Intro the world is being measured. Good examples of bad data. GPS forgery and

More information

Miguel Martins itrust consulting

Miguel Martins itrust consulting Tailoring information security to business requirements itrust consulting s.à r.l. Headquarters: 18, Steekaul L-6831 Berbourg Tel: +352 26 17 62 12 Fax: +352 26 71 09 78 Mail: Info@itrust.lu Web: www.itrust.lu

More information

Assessing the Civil GPS Spoofing Threat

Assessing the Civil GPS Spoofing Threat Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell

More information

Global Satellite Services

Global Satellite Services Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity Content 1. Location revolution 2. World of Spoofing

More information

Considerations for SDR Implementations in Commercial Radio Networks

Considerations for SDR Implementations in Commercial Radio Networks Considerations for SDR Implementations in Commercial Radio Networks Hans-Otto Scheck Nokia Networks P.O.Box 301 FIN-00045 Nokia Group hans-otto.scheck@nokia.com ETSI Software Defined Radio (SDR) / Cognitive

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission

More information

GPS Vulnerability Report

GPS Vulnerability Report GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements

More information

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International

More information

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing

More information

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016 Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly

More information

Time Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi

Time Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi Time Synchronization Trends for Critical Infrastructure Randy Brudzinski Vice President Microsemi Power Matters. TM Microsemi Corporation Time Synchronization Trends for Critical Infrastructure Randy Brudzinski

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Lora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation

Lora-A Revolutionary Technology for IOT LPWAN. Tony Li Vice President of China Sales and Marketing, Semtech Corporation Lora-A Revolutionary Technology for IOT LPWAN Tony Li Vice President of China Sales and Marketing, Semtech Corporation IoT Connected Device Opportunity Ericsson Gartner 28B 21B Source:Ericsson. Ericsson

More information

Hacking challenge: steal a car!

Hacking challenge: steal a car! Hacking challenge: steal a car! Your "local partner in crime" Sławomir Jasek IT security expert since 2005, and still loves this job Agenda BLE vs security How to hack the car New tool Vulnerabilities

More information

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th EFFECTIVE DEFENCE In a connected world Philippe COTELLE, Airbus Defence and Space 206, Nov 4th Telecommunications Satellites Cybersecurity Threats Telemetry & Command hijack or jamming Data communication

More information

FLEET MANAGEMENT

FLEET MANAGEMENT FLEET MANAGEMENT We offer wide range of fleet management products dedicated for professional applications. We constantly upgrade our existing products and launch new ones to meet expectations of our customers.

More information

AT Ground Surveillance System (GSS)

AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Surveillance System (GSS) AT Ground Security Sensors The AT Ground Surveillance System (GSS) is integrated network of sensors, cameras and mesh radio network

More information

GLONASS SHIELD USER MANUAL

GLONASS SHIELD USER MANUAL GLONASS SHIELD USER MANUAL 11 MARCH, 2013 THANK YOU FOR BUYING OUR PRODUCT! Congratulations! You have purchased our GLONASS/GPS Shield expansion board used to determine geographical coordinates and time

More information

Two-Antenna Differential Carrier Phase

Two-Antenna Differential Carrier Phase GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase Mark L. Psiaki Sibley School of Mech. & Aero. Engr., Cornell Univ. Brady W. O'Hanlon & Steven P. Powell School of Electrical & Computer

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com

From Terminals to Teleports to All the Tools in Between. Aerospace Broadcast Government Infrastructure. datapath.com From Terminals to Teleports to All the Tools in Between Aerospace Broadcast Government Infrastructure datapath.com High Definition Communications in Even the Most Remote Locations For operations in remote,

More information

Cybersecurity of Space Missions

Cybersecurity of Space Missions Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Networking & Censorship

Networking & Censorship Networking & Censorship How We Use the Web Shopping Contributing content (wikis, blogs) Promoting business Learning Exploring our roots Exploring virtual worlds Paying taxes Gambling Lots more Online

More information

Denial of Service Protection Standardize Defense or Loose the War

Denial of Service Protection Standardize Defense or Loose the War Denial of Service Protection Standardize Defense or Loose the War ETSI : the threats, risk and opportunities 16th and 17th - Sophia-Antipolis, France By: Emir@cw.net Arslanagic Head of Security Engineering

More information

Tiger Scheme QST/CTM Standard

Tiger Scheme QST/CTM Standard Tiger Scheme QST/CTM Standard Title Tiger Scheme Qualified Security Tester Team Member Standard Version 1.2 Status Public Release Date 21 st June 2011 Author Professor Andrew Blyth (Tiger Technical Panel)

More information

GNU Radio Software Defined DSRC Radio

GNU Radio Software Defined DSRC Radio Institute for Critical Technology and Applied Science GNU Radio Software Defined DSRC Radio Joseph M. Ernst, PhD Research Assistant Professor (540) 231-2254, jmernst@vt.edu hume@vt.edu www.hume.vt.edu

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

Can You Haul Me Now? Bart Filipiak Market Development Manager 18 March 2009 Piedmont SCTE

Can You Haul Me Now? Bart Filipiak Market Development Manager 18 March 2009 Piedmont SCTE Can You Haul Me Now? Bart Filipiak Market Development Manager 18 March 2009 Piedmont SCTE What is Cellular? 2 Wireless Evolution 2G Digital communications aka PCS GSM (TDMA- AT&T, T-Mobile) CDMA One iden

More information

GPS Monitoring Station Data Management

GPS Monitoring Station Data Management GPS Monitoring Station Data Management Héctor Manuel Maestro Alegre Abstract- GPS is nowadays the most important GNSS and the only one fully operative. Nowadays, this navigation system is becoming omnipresent

More information

Oyster Cellular Datasheet Engineered to outperform Revision February 2017

Oyster Cellular Datasheet Engineered to outperform Revision February 2017 Engineered to outperform Revision 1.1-20 February 2017 1. BATTERY POWERED GPS ASSET TRACKING ON 2G AND 3G The Oyster is a compact, rugged GPS tracking device that has been designed for tracking containers,

More information

Electron Asset Tracker

Electron Asset Tracker Electron Asset Tracker The Asset Tracker is a cellular solution for tracking the location of just about anything! The included shield has a GPS module and an accelerometer, so you can make projects that

More information

Timing in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015

Timing in Cyber Physical Systems. Marc Weiss, Ph.D. NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems Marc Weiss, Ph.D. mweiss@nist.gov NIST, Time and Frequency Division WSTS 2015 Timing in Cyber Physical Systems: Outline The term Timing used here as a general term: frequency,

More information

State of play of the European GNSS

State of play of the European GNSS State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service

More information

LuxGovSat the latest Luxembourg Satcom Business

LuxGovSat the latest Luxembourg Satcom Business LuxGovSat the latest Luxembourg Satcom Business Overview for the BCC Presented by: Paul Wells Vice President Government Satellite Communications 13 th October, 2017 LuxGovSat Secure Government Satellite

More information

Digital Authentication Strategies for the Automated Identification System

Digital Authentication Strategies for the Automated Identification System Digital Authentication Strategies for the Automated Identification System Alexander Stewart, Erich Rice, and Paul Safonov Masters Program in Information Assurance Information Systems Department St Cloud

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Chemical Facility Anti-Terrorism Standards (CFATS) Update for Roof Coatings Manufacturers

More information

EuroAfrica-ICT Awareness Workshop: AFSAGA FP6 Project. Eugene Avenant CSIR Satellite Application Centre

EuroAfrica-ICT Awareness Workshop: AFSAGA FP6 Project. Eugene Avenant CSIR Satellite Application Centre EuroAfrica-ICT Awareness Workshop: AFSAGA FP6 Project Eugene Avenant CSIR Satellite Application Centre African Satellite communications and Galileo applications Slide 2 CSIR 2007 www.csir.co.za euroafrica-ict

More information

GPS Spoofing Susceptibility Testing

GPS Spoofing Susceptibility Testing GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With

More information

RECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz

RECOMMENDATION ITU-R M Intelligent transport systems dedicated short range communications at 5.8 GHz Rec. ITU-R M.1453-2 1 RECOMMENDATION ITU-R M.1453-2 Intelligent transport systems dedicated short range communications at 5.8 GHz (Question ITU-R 205/8) (2000-2002-2005) Scope This Recommendation outlines

More information

WELCOME Mobile Applications Testing. Copyright

WELCOME Mobile Applications Testing. Copyright WELCOME Mobile Applications Testing 1 Mobile Applications Testing List of MUST HAVE to survive this class Required Google Drive account Google email Flash Drive Mobile Phone (iphone/android) Desired Have

More information

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center. Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for

More information

TECHNICAL DESCRIPTION

TECHNICAL DESCRIPTION Rev 1.1 TECHNICAL DESCRIPTION Fastrax UP501 GPS Receiver This document describes the electrical connectivity and main functionality of the Fastrax UP501 hardware. July 1 st, 2010 Fastrax Ltd. TRADEMARKS

More information

Cambium Networks LTE Program. EMEA Partner Event Budapest, July 2018

Cambium Networks LTE Program. EMEA Partner Event Budapest, July 2018 Cambium Networks LTE Program EMEA Partner Event Budapest, July 2018 Why LTE? Customer Perspective Small WISP (

More information

Telecommunications Regulation. EL SALVADOR Romero Pineda & Asociados

Telecommunications Regulation. EL SALVADOR Romero Pineda & Asociados Telecommunications Regulation EL SALVADOR Romero Pineda & Asociados CONTACT INFORMATION Antonio R. Méndez Llort Romero Pineda & Asociados Edificio World Trade Center Torre I, Suite 305, San Salvador, El

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

StarFinder Aire User Manual

StarFinder Aire User Manual Document No.: Document Type: Security Level: 270-UM-001 User Manual Open StarFinder Aire User Manual (Preliminary) Version 1.00 Dec. 05, 2015 Copyright Laipac Technology Inc. Release History Revision Date

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Engineering 2011 Intake Semester 7 Examination CS4422 WIRELESS AND BROADBAND NETWORKING Time allowed: 2

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Certification of EGNSS Timing Receivers and Services

Certification of EGNSS Timing Receivers and Services Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint

More information

BASTA Baltic Sea Rim Maritime and Seaport Connectivity. Project proposal, subject to contract

BASTA Baltic Sea Rim Maritime and Seaport Connectivity. Project proposal, subject to contract BASTA Baltic Sea Rim Maritime and Seaport Connectivity Project proposal, subject to contract Challenge in maritime industry Lack of affordable state-of-the-art broadband connectivity affects businesses,

More information

The new wave in satellite broadband connectivity at sea

The new wave in satellite broadband connectivity at sea The new wave in satellite broadband connectivity at sea www.thuraya.com Follow us on /thurayatelecom Thuraya Atlas IP+ Every day, more and more vessels traverse the oceans to facilitate global trade, protect

More information

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems

More information

Dedicated Short Range Communication: What, Why and How?

Dedicated Short Range Communication: What, Why and How? Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background

More information

Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007

Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007 Transmission Security (TRANSEC) in an IP based VSAT Architecture April 2007-1 - As the ability to monitor satellite transmissions grows increasingly sophisticated, the need to implement increased levels

More information

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14

C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Supreme Allied Commander Transformation C UAxS Workshop conclusions Old Dominion University, Norfolk, 11 Dec 14 Major Jean-Claude Deskeuvre, BEL A CUAxS PM 5-Feb-15 1 Outline Reminder of the objectives

More information

N2 di-gps mini digital images GPS

N2 di-gps mini digital images GPS N2 di-gps mini digital images GPS Users Guide Ver 1.03 Please visit our website www.di-gps.com for the latest version of the user guide Fujifilm and S5 Pro are registered trademark or a trademark of FUJIFILM

More information

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery

More information

TM1000A. GPS Based Network Time Server. Installation and Operation Manual

TM1000A. GPS Based Network Time Server. Installation and Operation Manual TM1000A GPS Based Network Time Server Installation and Operation Manual Table of Contents 1 Introduction...1 1.1 Serial Number Notes:...1 2 Installation...2 2.1 Location...2 2.2 Connections...2 2.2.1 Antenna...2

More information

Wireless Mics, White Spaces and You. Karl Voss KAET

Wireless Mics, White Spaces and You. Karl Voss KAET Wireless Mics, White Spaces and You Karl Voss KAET White Space 101 General Terminology White Space Devices (WSD) TV Band Devices (TVBD) White Space Database (WSDB) Low Power Auxiliary (LPA) FCC Licensed

More information

GPS S1216F8 Breakout Board (v1.0)

GPS S1216F8 Breakout Board (v1.0) GPS S1216F8 Breakout Board (v1.0) Released under the Creative Commons Attribution Share-Alike 3.0 License http://creativecommons.org/licenses/by-sa/3.0/ Overview SkyTraq has introduced the fastest consumer

More information

Nimbra - communication platform for the SmartGRID

Nimbra - communication platform for the SmartGRID Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for

More information

Fleet Management - Smart, Secure and Easy

Fleet Management - Smart, Secure and Easy Fleet Management - Smart, Secure and Easy Automile is a comprehensive fleet management solution to monitor both company and service vehicles and provide rich insights. Our hardware requires no installation

More information

G903 NB-IoT GPS Tracker User Manual V1.0

G903 NB-IoT GPS Tracker User Manual V1.0 G903 NB-IoT GPS Tracker User Manual V1.0 Preface Congratulations on choosing the Mictrack G903 NB-IoT GPS tracker. This manual shows how to easily program and setup the tracker for best results. Make sure

More information

REPORT NO: E6V2 DATE: JULY 24, F -13dBm F -13dBm

REPORT NO: E6V2 DATE: JULY 24, F -13dBm F -13dBm CDMA ID: 44410 Date: 3/7/18 CDMA 1xRTT BC10 Limit Condition 816.35 823.65 F low @ F high @ Delta (Hz) Frequency Stability (ppm) Temperature Voltage (MHz) (MHz) Normal (20C) 816.5679 823.4405 Extreme (50C)

More information

Satellite Communications

Satellite Communications Satellite Communications Ryan Smith Maritime Market & Broadband Communications at sea changing dramatically New services offer global coverage and broadband speeds at an affordable prices Hardware is smaller,

More information

FMB204 FLEET MANAGEMENT // FMB204

FMB204 FLEET MANAGEMENT // FMB204 FMB204 Teltonika FMB204 is a SPECIAL waterproof (IP67) tracker with Bluetooth connectivity, internal high gain GNSS and GSM antennas and integrated high capacity backup battery. Device is designed to work

More information

The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert

The dark side of IOT. Francesco Zucca. Automation Instrumentation Summit Wireless Expert Automation Instrumentation Summit - 2017 The dark side of IOT Francesco Zucca Wireless Expert 1 Agenda Introduction IIOT How to work WSN Typical hacker attack in WSN Issue with Drones Security Countermeasures

More information

The Role of PNT in Cybersecurity Location-based Authentication

The Role of PNT in Cybersecurity Location-based Authentication The Role of PNT in Cybersecurity Location-based Authentication Dr. Michael O Connor November 14, 2013 Satelles is a Division of ikare Corporation What do we mean by Authentication? Authentication is the

More information

Quiz: Application of Telecommunication Topic : General Revision

Quiz: Application of Telecommunication Topic : General Revision Quiz: Application of Telecommunication Topic : General Revision Name Time : 1:30 Minutes Q1: Engr. Zohaib-ur-Rehman, has been appointed new intern for cellular company, The first Task assigned to him by

More information

Instructor: Eric Rettke Phone: (every few days)

Instructor: Eric Rettke Phone: (every few days) Instructor: Eric Rettke Phone: 818 364-7775 email: rettkeeg@lamission.edu (every few days) Fall 2016 Computer Science 411 - Principles of Cyber Security 1 Please keep a copy of the syllabus handy for the

More information

Quick Start Guide CJB1950ALAAB

Quick Start Guide CJB1950ALAAB Quick Start Guide 1 CJB1950ALAAB www.sar-tick.com This product meets applicable national SAR limits of 2.0W/kg. The specific maximum SAR values can be found in the section of this user guide. When carrying

More information

SPREE: A Spoofing Resistant GPS Receiver

SPREE: A Spoofing Resistant GPS Receiver SPREE: A Spoofing Resistant GPS Receiver Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun raanjhan@inf.ethz.ch, ohildur@inf.ethz.ch, capkuns@inf.ethz.ch Department of Computer Science ETH Zurich,

More information

ThinkRF R5500. Real-Time Spectrum Analyzer 9 khz to 8 GHz / 18 GHz / 27 GHz. Technical Data Sheet Preliminary

ThinkRF R5500. Real-Time Spectrum Analyzer 9 khz to 8 GHz / 18 GHz / 27 GHz. Technical Data Sheet Preliminary Technical Data Sheet Preliminary ThinkRF R5500 Real-Time Spectrum Analyzer 9 khz to 8 GHz / 18 GHz / 27 GHz Featuring Real-Time Bandwidth (RTBW) up to 100 MHz Spurious Free Dynamic Range (SFDR) up to 100

More information

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client

Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Terms and Conditions between Easy Time Clock, Inc. And Easy Time Clock Client Client s Responsibility Easy Time Clock, Inc. ( ETC ) is a client-led time and attendance program. The Client is solely responsible

More information

SH1030 Rev Introduction. Ultra low power DASH7 Arduino Shield Modem. Applications. Description. 868 MHz. Features

SH1030 Rev Introduction. Ultra low power DASH7 Arduino Shield Modem. Applications. Description. 868 MHz. Features SH1030 Rev. 1.2 Applications Wireless sensor network Data acquisition equipment Security systems Industrial monitor and control Internet of things (IoT) Ultra low power DASH7 Arduino Shield Modem 868 MHz

More information

PMU Time Source Security

PMU Time Source Security PMU Time Source Security Erich Heine Information Trust Institute Authors: Erich Heine, Tim Yardley, Dr. Alejandro Dominguez-Garcia, Daniel Chen 1 Overview PMU time synchronization

More information

Mobile Hands Free Operation. Ontario Regulation 366/09

Mobile Hands Free Operation. Ontario Regulation 366/09 Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer

More information

RAK811 LoRa / LoRAWAN module (based on SX1276) 868/915MHz up to 3km range

RAK811 LoRa / LoRAWAN module (based on SX1276) 868/915MHz up to 3km range RAK811 LoRa / LoRAWAN module (based on SX1276) 868/915MHz up to 3km range RAK811 LoRa Module LoRaWAN module base on SX1276 LoRa spread spectrum. Embedded LoRaWAN protocol class A&C. Easily connects to

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

The SCADA Connection: Moving Beyond Auto Dialers

The SCADA Connection: Moving Beyond Auto Dialers WHITE PAPER The SCADA Connection: Moving Beyond Auto Dialers ABSTRACT: Auto dialers have long been used to report alarms in SCADA installations. While they are useful for notifying users of alarm states,

More information

THE NEXT GENERATION OF ELECTRONIC MONITORING POWERED BY EUROPEAN SATELLITES

THE NEXT GENERATION OF ELECTRONIC MONITORING POWERED BY EUROPEAN SATELLITES THE NEXT GENERATION OF ELECTRONIC MONITORING POWERED BY EUROPEAN SATELLITES A European civilian and secure alternative the military U.S. GPS technology Let s work together to prepare tomorrow s secure

More information

Japan. December 13, C-V2X Trial in Japan. Qualcomm Technologies Inc.

Japan. December 13, C-V2X Trial in Japan. Qualcomm Technologies Inc. December 13, 2018 Japan C-V2X Trial in Japan Qualcomm Technologies Inc. Continental, Ericsson, Nissan, NTT DOCOMO, OKI, Qualcomm Technologies 2 Trial objectives The objective is to validate and demonstrate

More information

MGL Avionics. N16 Aviation band Navigation Radio ICD V1

MGL Avionics. N16 Aviation band Navigation Radio ICD V1 MGL Avionics N16 Aviation band Navigation Radio ICD V1 Table of Contents MGL Avionics N16 transceiver communications protocols...3 Version...3 The legal stuff...3 General...3 Frequencies...4 RS232 protocol...4

More information

Response to the Comments on the PAR

Response to the Comments on the PAR 802.22 Response to the Comments on the 802.22.1 PAR Date: 2012-11-13 Authors: Name Company Address Phone email Apurva N. Mody BAE Systems P. O. Box 868, MER 15-2350, Nashua, NH 03061 1-404-819-0314, 1-603-

More information

to your Pocket PC? 3. Click new to connect

to your Pocket PC? 3. Click new to connect P i-geo+ USERS MANUAL How to connect your i-geo+ Version Issue date Description A 14 Nov. 2005 Initial Release Your Polstar i-geo+ GPS receiver uses world-class technology to provide you with a GPS receiver

More information

LIABILITY-CRITICAL APPLICATIONS

LIABILITY-CRITICAL APPLICATIONS Integrity and Interoperability for LIABILITY-CRITICAL APPLICATIONS Property of GMV All rights reserved LIABILITY CRITICAL APPLICATIONS (OF GNSS POSITIONING) Those in which large unnoticed navigation errors

More information

TV White Space for Affordable Broadband Access

TV White Space for Affordable Broadband Access TV White Space for Affordable Broadband Access Abhay Karandikar Institute Chair Professor Department of Electrical Engineering Indian Institute of Technology Bombay, Mumbai 400076 karandi@ee.iitb.ac.in

More information

di-gps Pro L digital images GPS receiver (Built-in data Logger)

di-gps Pro L digital images GPS receiver (Built-in data Logger) di-gps Pro L digital images GPS receiver (Built-in data Logger) User Guide Ver 1.4 Please visit our website www.di-gps.com for the latest version of the user guide V1.4 1 Contents Introduction 3 Warning

More information

congestion energy & environment accessibility aging infrastructure

congestion energy & environment accessibility aging infrastructure Living with and loving transportation technologies Dan Work Assistant Professor, Civil and Environmental Engineering, Coordinated Science Laboratory, and Electrical and Computer Engineering (courtesy)

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Understanding Cyber Attacks That Leverage the Telephony Channel

Understanding Cyber Attacks That Leverage the Telephony Channel SESSION ID: CCT-R04 Understanding Cyber Attacks That Leverage the Telephony Channel Payas Gupta Research Scientist CRISSP-AD, New York University Abu Dhabi payasgupta@nyu.edu In collaboration with Mustaque

More information