AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.

Size: px
Start display at page:

Download "AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH."

Transcription

1 AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria P: F:

2 Objectives Integration of EGNOS/EDAS into vehicle on-board and personal mobility technologies Integration of a signal authentication functionality in order to provide the required level of integrity Integration of an innovative GNSS PVT (Position, Velocity, Time) software solution into positioning unit facilitating EGNOS/EDAS processing Improvement of the overall positioning performance (accuracy, availability, integrity) in demanding environments (alpine, urban, etc.) EGNOS coverage in the city of Graz on a vehicle trajectory (blue: EGNOS available; red: EGNOS unavailable) 2

3 TCA s PANDAS server PANDAS (Positioning and Navigation Data Assistance Service) is TCA s modular built server which provides EDAS and assistance data for demanding applications to significantly improve accuracy and integrity PANDAS provides data in many different applicable formats 3

4 PANDAS results PANDAS (using EDAS) as certified service increased positioning accuracy to an user accepted level as required for charging and thus, is one key enabler for the charging application Comparison of the trajectories obtained from different positioning solutions: RTK (yellow), standalone GPS (red), EGNOS (blue) and EDAS (green) 4

5 5 PANDAS results Comparison of the absolute errors obtained from different positioning solutions: standalone GPS (red), EGNOS (blue) and EDAS (green) Horizontal Errors Special Event - Run# Standalone 8 EGNOS EDAS Epochs (s ) Error (m)

6 PANDAS results Mean Absolute Horizontal Error 2,0 1,8 1,6 Mean Absolute Error (m) 1,4 1,2 1,0 0,8 0,6 Standalone EGNOS EDAS 0,4 0,2 0,0 1 Standalone 1,82 EGNOS 1,21 EDAS 0,99 All 5 Test Runs 6

7 Signal and position authentication GNSS Security Threats Jamming, Spoofing, Meaconing Volpe Report 2001: Vulnerability Assessment of the Transportation Infrastructure Relying on the GPS Countermeasures Signal processing algorithms Data processing algorithms 7

8 Authentication algorithms Signal processing IF signal cross-correlation between rover and base IF signal cross-correlation between L1 and L2 Very sophisticated but requires to process large amount of data Data processing algorithms Validation of ephemeris/almanac C/N0 monitoring Baseline verification EDAS/PANDAS used as reference platform 8

9 Baseline verification Single Point Solution unable to reveal spoofing attack Comparison of baselines Baseline out of coordinate differences Baseline computed relative positioning Relative positioning can be done based on code measurements (Double-Differences) based on IF signal correlation between rover and base Relative algorithm is capable of detecting spoofing attacks 9

10 Authentication results IF signal cross-correlation results Normal mode Baseline differences Spoofing attack 10

11 Conclusions EDAS/PANDAS Position accuracy enhancement through correction data based on EDAS and other algorithms Signal and position authentication Detection of spoofing attacks using signal processing and data processing algorithms EDAS/PANDAS in combination with signal authentication are the key enabler demanding applications since these technologies provide the required level of accuracy and reliability for the overall mission 11

12 AHORN 2012 SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum TeleConsult Austria GmbH Jürgen Seybold Schwarzbauerweg 3, A-8043 Graz, Austria P: F:

Assessing the Civil GPS Spoofing Threat

Assessing the Civil GPS Spoofing Threat Assessing the Civil GPS Spoofing Threat Todd Humphreys, Jahshan Bhatti, University of Texas at Austin Brent Ledvina, Virginia Tech/Coherent Navigation Mark Psiaki, Brady O Hanlon, Paul Kintner, Cornell

More information

EGNOS: free accuracy for mapping and GIS applications

EGNOS: free accuracy for mapping and GIS applications EGNOS: free accuracy for mapping and GIS applications Table of contents EGNOS basics: architecture and technical parameters EGNOS benefits for mapping and GIS EGNOS-enabled devices EGNOS applications and

More information

EDAS. as alternative source for a DGPS service for maritime users. Tamás Horváth. Alberding GmbH

EDAS. as alternative source for a DGPS service for maritime users. Tamás Horváth. Alberding GmbH 30 Sept 2015 1/27 EDAS as alternative source for a DGPS service for maritime users Tamás Horváth Alberding GmbH EGNOS Service Provision Workshop 2015, 29-30 September 2015, Copenhagen, Denmark 30 Sept

More information

GPS Spoofing Susceptibility Testing

GPS Spoofing Susceptibility Testing GPS Spoofing Susceptibility Testing GNSS Vulnerability Countering the Threat 13 th Feb 2013 Prof. Charles Curry B.Eng, C.Eng, FIET Managing Director, Chronos Technology Ltd NPL, Teddington, London With

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

Strategies for Maritime Cyber Security Leveraging the Other Modes

Strategies for Maritime Cyber Security Leveraging the Other Modes Strategies for Maritime Cyber Security Leveraging the Other Modes Michael Dinning Innovative Technologies for a Resilient Marine Transportation System June 24, 2014 The National Transportation Systems

More information

Global Satellite Services

Global Satellite Services Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity Content 1. Location revolution 2. World of Spoofing

More information

Transportation Security Risk Assessment

Transportation Security Risk Assessment Transportation Security Risk Assessment Presented to: Nuclear Waste Technical Review Board Presented by: Nancy Slater Thompson Office of National Transportation October 13, 2004 Salt Lake City, Utah Introduction

More information

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016 Sensor Fusion: Potential, Challenges and Applications Presented by KVH Industries and Geodetics, Inc. December 2016 1 KVH Industries Overview Innovative technology company 600 employees worldwide Focused

More information

State of play of the European GNSS

State of play of the European GNSS State of play of the European GNSS Tachograph forum Flavio SBARDELLATI, GSA Market Development 3 December 2018, Brussels GSA in a nutshell What? Gateway to Services Galileo & EGNOS Operations and Service

More information

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

PrepAwayExam.   High-efficient Exam Materials are the best high pass-rate Exam Dumps PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : HP0-Y24 Title : Securing HP ProCurve Networks Vendors : HP Version : DEMO Get Latest

More information

Spoofing GNSS Timing Receivers

Spoofing GNSS Timing Receivers Spoofing GNSS Timing Receivers Tim Frost and Guy Buesnel ITSF, November 2016 www.calnexsol.com www.spirent.com Introduction 2 Dependence on GPS timing US Department of Homeland Security: 15 of the 19 Critical

More information

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International

More information

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Space Reflecto 2013, Brest, 04 November 2013 GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons? Mohamed SAHMOUDI 1,2 1 ISAE, University of Toulouse, France 2

More information

Robust GPS-Based Timing for Phasor Measurement Units

Robust GPS-Based Timing for Phasor Measurement Units TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID TCIPG.ORG Robust GPS-Based Timing for Phasor Measurement Units October 3, 2014 Grace Xingxin Gao University of Illinois at Urbana-Champaign UNIVERSITY

More information

EDAS Based Virtual Reference Stations for maritime users

EDAS Based Virtual Reference Stations for maritime users EDAS Based Virtual Reference Stations for maritime users E. Lacarra, J. Morán, J. Vázquez, M.A. Sánchez, ESSP SAS, T. Horváth, Alberding GmbH BIOGRAPHIES Elisabet Lacarra received her master degree in

More information

INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE

INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE INDONESIA S GEOSPATIAL DATA INFRASTRUCTURE Antonius B. Wijanarto Head of Center for Geodetic Control Network and Geodynamics GEOSPATIAL INFORMATION AGENCY srgi@big.go.id ONE GEO.REFERENCE (One Map Policy)

More information

DIGITAL ROAD PROFILE USING KINEMATIC GPS

DIGITAL ROAD PROFILE USING KINEMATIC GPS ARTIFICIAL SATELLITES, Vol. 44, No. 3 2009 DOI: 10.2478/v10018-009-0023-6 DIGITAL ROAD PROFILE USING KINEMATIC GPS Ashraf Farah Assistant Professor, Aswan-Faculty of Engineering, South Valley University,

More information

Miguel Martins itrust consulting

Miguel Martins itrust consulting Tailoring information security to business requirements itrust consulting s.à r.l. Headquarters: 18, Steekaul L-6831 Berbourg Tel: +352 26 17 62 12 Fax: +352 26 71 09 78 Mail: Info@itrust.lu Web: www.itrust.lu

More information

RT-2 L1TE NovAtel s Single Frequency RTK Solution

RT-2 L1TE NovAtel s Single Frequency RTK Solution RT-2 L1TE NovAtel s Single Frequency RTK Solution Precise thinking 2009 NovAtel Inc. All rights reserved. Printed in Canada. D12699 www.novatel.com 1-800-NOVATEL (U.S. & Canada) or 403-295-4900 Europe

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base OCO Total FY 2014 FY 2015 FY 2016 FY 2017 Cost To Complete

More information

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group Presentation Objectives Introductions Cyber security context Cyber security in the maritime sector Developing cybersecurity

More information

LIABILITY-CRITICAL APPLICATIONS

LIABILITY-CRITICAL APPLICATIONS Integrity and Interoperability for LIABILITY-CRITICAL APPLICATIONS Property of GMV All rights reserved LIABILITY CRITICAL APPLICATIONS (OF GNSS POSITIONING) Those in which large unnoticed navigation errors

More information

High Quality Positioning: a Key to Success for Autonomous Driving

High Quality Positioning: a Key to Success for Autonomous Driving High Quality Positioning: a Key to Success for Autonomous Driving SaPPART final workshop Alberto Fernandez Wyttenbach Brussels, 4 October 2017 This presentation can be interpreted only together with the

More information

Cyber Attack Information System CAIS. DI Thomas Bleier, MSc, CISSP, CEH

Cyber Attack Information System CAIS. DI Thomas Bleier, MSc, CISSP, CEH Cyber Attack Information System CAIS Cyber Attack Information System DI Thomas Bleier, MSc, CISSP, CEH 09.11.2012 AIT Austrian Institute of Technology Bundeskanzleramt Österreich Bundesministerium für

More information

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range

A Better Space Mission Systems threat assessment by leveraging the National Cyber Range A Better Space Mission Systems threat assessment by leveraging the National Cyber Range Chuck Allen (CISSP) & Jonathon Doubleday CORD Presented to GSAW, Feb-March 2018 2018 The Aerospace Corporation Abstract

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

Figure 1: Mobile mapping project location in New York City.

Figure 1: Mobile mapping project location in New York City. Using Mobile LiDAR to Deliver Survey Accurate Data This presentation will take the attendees though the process of controlling and delivering survey grade LiDAR data for use in CADD, Modeling, and GIS

More information

t Bench for Robotics and Autonomy Andrea Merlo

t Bench for Robotics and Autonomy Andrea Merlo t Bench for Robotics and Autonomy Andrea Merlo Agenda Introduction TBRA Overview Objectives Architecture / Technical Description Status Test Results Roadmap he context of a Rover, dance, Navigation and

More information

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

UAS Operation in National Air Space (NAS) Secure UAS Command and Control UAS Operation in National Air Space (NAS) Secure UAS Command and Control Dr. Randal Sylvester Division Chief Technologist L3 CSW 26 October 2015 This information consists of L-3 Communications Corporation,

More information

NavFire Guidance System Integrated GPS and Mission Computer for Future Navigation Systems

NavFire Guidance System Integrated GPS and Mission Computer for Future Navigation Systems NavFire Guidance System Integrated GPS and Mission Computer for Future Navigation Systems Walter Trach, Jr. Session IIIA 12 May 2010 NavFire Guidance System Outline Precision-Guided Artillery NavFire Guidance

More information

Automated Attack Framework for Test & Evaluation (AAFT)

Automated Attack Framework for Test & Evaluation (AAFT) Automated Attack Framework for Test & Evaluation (AAFT) 34 th International Test and Evaluation Association Symposium October 4, 2017 Mr. Andrew Shaffer The Applied Research Laboratory The Pennsylvania

More information

Cyber Defense Centers only for large companies?

Cyber Defense Centers only for large companies? Cyber Defense Centers only for large companies? Security Intelligence and Operations July, 2016 The Challenges we face 2 Managing risk in today s digital enterprise Increasingly sophisticated cyber attacks

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications

Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications Project Overview Mapping Technology Assessment for Connected Vehicle Highway Network Applications ESRI International Users Conference July 2012 Table Of Contents Connected Vehicle Program Goals Mapping

More information

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight

WHITE PAPER. Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications. White paper by Net Insight Eliminating GPS Dependency for Real-Time Wide-Area Syncrophasor Applications White paper by Net Insight Net Insight AB, Sweden September 2012 WHITE PAPER ABSTRACT Today s society is becoming increasingly

More information

Security Considerations in M2M Communications

Security Considerations in M2M Communications Security Considerations in M2M Communications Applied Research Issues & Projects in the Austrian Institute of Technology (AIT) Dr. Markus Tauber Project Manager, ICT Security, Future Networks and Services,

More information

GALILEO STATUS AND INSTITUTIONAL ORGANISATION

GALILEO STATUS AND INSTITUTIONAL ORGANISATION 1 GNSS TECHNOLOGY ADVANCES IN A MULTI- CONSTELLATION FRAMEWORK SESSION 3: GNSS SERVICES, INSTITUTIONAL ORGANISATION AND PROGRAMMES GALILEO STATUS AND INSTITUTIONAL ORGANISATION 26 September 2014, Rome

More information

Update on LBS Location based services and IoT Internet of Things

Update on LBS Location based services and IoT Internet of Things Update on LBS Location based services and IoT Internet of Things This presentation can be interpreted only together with the oral comments accompanying it GNSS is considered a commodity inside smartphones

More information

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing

Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Briefing: Navigation Message Authentication for Civil GPS Anti-Spoofing Kyle Wesson UT Radionavigation Laboratory http://radionavlab.ae.utexas.edu 10 March 2011 The Big Picture Are cryptographic anti-spoofing

More information

Iwane Mobile Mapping System

Iwane Mobile Mapping System Iwane Mobile Mapping System Geo-Imaging Mobile Mapping Solution Iwane Mobile Mapping System (IMMS) is high-efficient, easyto-use, end-to-end solution that provides tremendous flexibility in collecting,

More information

Lure10: Exploiting Windows Automatic Wireless Association Algorithm

Lure10: Exploiting Windows Automatic Wireless Association Algorithm Lure10: Exploiting Windows Automatic Wireless Association Algorithm HITBSecConf2017, Amsterdam GEORGE CHATZISOFRONIOU (@_sophron) sophron@census-labs.com www.census-labs.com > Wi-Fi Automatic Association

More information

Tales from the Base Station to the Substation. Delivering Phase ITSF 2013

Tales from the Base Station to the Substation. Delivering Phase ITSF 2013 Tales from the Base Station to the Substation Delivering Phase ITSF 2013 1 Phase delivery in Telecom Networks Telecom LTE networks rely on accurate phase synchronization Efficient and reliable use of spectrum

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information

Cybersecurity of Space Missions

Cybersecurity of Space Missions Cybersecurity of Space Missions Jean Muylaert and Luca Del Monte Presentation at the Workshop of the European Interparliamentary Space Conference 14 May 2018 Space missions Examples of hacking, spoofing,

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network

More information

Science & Technology Directorate: R&D Overview

Science & Technology Directorate: R&D Overview Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

1 General Information... 2

1 General Information... 2 Public Release Notes Topic : u-blox M8 Flash Firmware 3.01 HPG 1.20 UBX-16024900 Author : Mårten Ström Date : 18 Oct 2016 We reserve all rights in this document and in the information contained therein.

More information

Connected Car Solutions Based on IoT

Connected Car Solutions Based on IoT FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the

More information

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies lwihl@scalable-networks.com 2 The Need OT security particularly in the

More information

1 General Information... 2

1 General Information... 2 Public Release Notes Topic : u-blox M8 Flash Firmware 3.01 HPG 1.40 UBX-17021504 Author : Mårten Ström Date : 22 June 2017 We reserve all rights in this document and in the information contained therein.

More information

Christoph Schmittner, Zhendong Ma, Paul Smith

Christoph Schmittner, Zhendong Ma, Paul Smith FMVEA for Safety and Security Analysis of Intelligent and Cooperative Vehicles 1st International workshop on the Integration of Safety and Security Engineering (ISSE 14) Christoph Schmittner, Zhendong

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

Enhancing the cyber security &

Enhancing the cyber security & Enhancing the cyber security & resilience of transport infrastructure in Europe European Union Agency for Network and Information Security Securing Europe s Information society 2 Positioning ENISA activities

More information

James Van Rens CEO Riegl USA, Inc. Mining Industry and UAV s combined with LIDAR Commercial UAV Las Vegas October 2015 James Van Rens CEO Riegl USA

James Van Rens CEO Riegl USA, Inc. Mining Industry and UAV s combined with LIDAR Commercial UAV Las Vegas October 2015 James Van Rens CEO Riegl USA James Van Rens CEO Riegl USA, Inc. Mining Industry and UAV s combined with LIDAR Commercial UAV Las Vegas October 2015 James Van Rens CEO Riegl USA COST EFFECIENCY CONTINUUM LIDAR and IMU Partnership Technology

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

TerraSystem LidarPod

TerraSystem LidarPod TerraSystem LidarPod a complete turnkey system New to the market, the TerraSystem UAV LidarPod is a complete turnkey system developed specifically for use on Unmanned Aerial Vehicles (UAVs). Survey industry

More information

Attack Resilient State Estimation for Vehicular Systems

Attack Resilient State Estimation for Vehicular Systems December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania

More information

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2012 Office of Secretary Of Defense DATE: February 2011 BA 3: Advanced Development (ATD) COST ($ in Millions) FY 2010 FY 2011 Base OCO Total FY 2013 FY

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov SIP Automated Driving System SEIGO KUZUMAKI Program Director Nov.14.2017 Welcome back to SIP-adus WS! `Is it not delightful to have friends coming from distant quarters? (The Analects of Confucius) Intensive

More information

Certification of EGNSS Timing Receivers and Services

Certification of EGNSS Timing Receivers and Services Certification of EGNSS Timing Receivers and Services Roland Bauernfeind 03.11.2016 International Timing & Sync Forum 2016, Time for a Smart Future NavCert, the GNSS-Certifier for ITS 2006 founded as joint

More information

DESENT: Smart decision support system for urban energy and transportation

DESENT: Smart decision support system for urban energy and transportation DESENT: Smart decision support system for urban energy and transportation Intermediate results of the project DESENT Thomas Nacht Real Corp 2018, 04.04 06.04.2018, Vienna/Austria Agenda Introducing the

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

Identity & security CLOUDCARD+ When security meets convenience

Identity & security CLOUDCARD+ When security meets convenience Identity & security CLOUDCARD+ When security meets convenience CLOUDCARD+ When security meets convenience We live in an ever connected world. Digital technology is leading the way to greater mobility and

More information

The IS Audit Process Part-1 Four key objectives

The IS Audit Process Part-1 Four key objectives The IS Audit Process Part-1 Four key objectives a. Defining auditing and auditors b. The audit planning process c. Risk analysis d. Internal controls Auditing & Auditors: an evaluation process of an org,

More information

NIST Security Certification and Accreditation Project

NIST Security Certification and Accreditation Project NIST Security Certification and Accreditation Project An Integrated Strategy Supporting FISMA Dr. Ron Ross Computer Security Division Information Technology Laboratory 1 Today s Climate Highly interactive

More information

Scepter / Scepter II Getting Configured for Real Time Networks with an Internet Hot Spot

Scepter / Scepter II Getting Configured for Real Time Networks with an Internet Hot Spot a. Turn Your Mi-Fi, Cell Phone or other Internet Hot Spot On b. Turn Your Scepter Data Collector On 1 c. In the center of the data collector tap Wi-Fi a. Tap Menu in the bottom Right Corner and then Wi-Fi

More information

Assessment of geodetic coordinates processed using different baselines

Assessment of geodetic coordinates processed using different baselines Assessment of geodetic coordinates processed using different baselines Elmo Leonardo Xavier Tanajura 1, Rodrigo Mikosz Gonçalvez 2,Admilson da Penha Pacheco 3, Cláudia Pereira Krueger 4 1 Center of Technological

More information

SpatialFuser. Offers support for GNSS and INS navigation systems. Supports multiple remote sensing equipment configurations.

SpatialFuser. Offers support for GNSS and INS navigation systems. Supports multiple remote sensing equipment configurations. SPATIALFUSER SpatialFuser SpatialFuser is designed to georeference data acquired by our LiDAR mapping systems into common mapping formats such as LAS/LAZ or GPX. The main purpose of SpatialFuser is to

More information

Smart and Resilient Energy Systems: Metrics and Evaluation

Smart and Resilient Energy Systems: Metrics and Evaluation Smart and Resilient Energy Systems: Metrics and Evaluation Igor Linkov and Matthew Bates Risk and Decision Sciences Team, US Army 6172339869 Igor.Linkov@usace.army.mil 1 Smart Resilient 2 Smart vs Resilient

More information

EUROMED GNSS II/MEDUSA project

EUROMED GNSS II/MEDUSA project EUROMED GNSS II/MEDUSA project PBN Implementation Workshop / Go Team PBN Implementation Workshop / Go Team, Tunis, February 2014 1 Contents Euromed GNSS European GNSS (E GNSS), EGNOS and Galileo Euromed

More information

Time Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi

Time Synchronization Trends for Critical Infrastructure. Randy Brudzinski Vice President Microsemi Time Synchronization Trends for Critical Infrastructure Randy Brudzinski Vice President Microsemi Power Matters. TM Microsemi Corporation Time Synchronization Trends for Critical Infrastructure Randy Brudzinski

More information

Emerging Connected Vehicle based

Emerging Connected Vehicle based Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu Presented by Sezana Fahmida Outline Introduction

More information

CompTIA Cybersecurity Analyst+

CompTIA Cybersecurity Analyst+ CompTIA Cybersecurity Analyst+ Course CT-04 Five days Instructor-Led, Hands-on Introduction This five-day, instructor-led course is intended for those wishing to qualify with CompTIA CSA+ Cybersecurity

More information

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING

More information

CYBER SECURITY OPERATION CENTER

CYBER SECURITY OPERATION CENTER CYBER OPERATION CENTER Reply s new Cyber Security Operation Centre is a structure specialised in the provision of Premium-level security services, tailored to the customer's needs, processes, and the specific

More information

Professional Services Overview

Professional Services Overview Professional Services Overview Internet of Things (IoT) Security Assessment and Advisory Services IOT APPLICATION MOBILE CLOUD NETWORK Company Overview HISTORY HISTORY Founded in 2010 Headquartered in

More information

AIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1)

AIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1) AIIC Associazione Italiana esperti Infrastrutture Critiche AIIC (1) AIIC Associazione Italiana esperti Infrastrutture Critiche Non-governmental and non-profit scientific association legally registered

More information

The Australian Government s Approach to Critical Infrastructure Resilience

The Australian Government s Approach to Critical Infrastructure Resilience The Australian Government s Approach to Critical Infrastructure Resilience GNSS Workshop University of New South Wales 4 December 2013 Mr Kris Garred, Director Critical Infrastructure Policy Attorney-General

More information

Application Security Approach

Application Security Approach Technical Approach Page 1 CONTENTS Section Page No. 1. Introduction 3 2. What is Application Security 7 3. Typical Approaches 9 4. Methodology 11 Page 2 1. INTRODUCTION Page 3 It is a Unsafe Cyber world..

More information

Low cost GNSS receivers: navigation and monitoring activities

Low cost GNSS receivers: navigation and monitoring activities PHD in Environmental and Infrastructure Engineering XXIX cycle Low cost GNSS receivers: navigation and monitoring activities Ph.D.'s activity final report Marco Negretti marco.negretti@polimi.it Supervisor:

More information

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Office of Secretary Of Defense DATE: February 2012 0400: Research,, Test & Evaluation, Defense-Wide BA 3: Advanced Technology (ATD) COST ($ in Millions)

More information

GNOSTECH MARITIME CYBERSECURITY SOLUTIONS

GNOSTECH MARITIME CYBERSECURITY SOLUTIONS GNOSTECH MARITIME CYBERSECURITY SOLUTIONS Disaster Response vs Cyber Incident Response Technologies Facilitates Exceptional Benefits While Creating Cyber Vulnerabilities Shore-based Systems That Directly

More information

Digitale Zukunft Datenbrillen und Smartwatches im (alpinen) Tourismus. Gerald Binder

Digitale Zukunft Datenbrillen und Smartwatches im (alpinen) Tourismus. Gerald Binder Digitale Zukunft Datenbrillen und Smartwatches im (alpinen) Tourismus Gerald Binder INTRODUCTION enabling mobile innovation Introduction evolaris Who We Are COMET K1 center of excellence for research and

More information

EDA documentation. EUROPEAN DEFENCE AGENCY COMMUNICATION No. EDA

EDA documentation. EUROPEAN DEFENCE AGENCY COMMUNICATION No. EDA Martin KONERTZ Director Capability, Armament & Technology e-mail: CAT@eda.europa.eu Tel: +32 (0)2 504 2850 Brussels, 31 May 18 EUROPEAN DEFENCE AGENCY COMMUNICATION No. EDA201805184 Ref: Land & Logistics/MK

More information

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017

Radware DefensePro DDoS Mitigation Release Notes Software Version Last Updated: December, 2017 Radware DefensePro DDoS Mitigation Release Notes Software Version 8.13.01 Last Updated: December, 2017 2017 Cisco Radware. All rights reserved. This document is Cisco Public. Page 1 of 9 TABLE OF CONTENTS

More information

Cyber Security Detection Technology for your Security Operations Centre. IT Security made in Europe

Cyber Security Detection Technology for your Security Operations Centre. IT Security made in Europe Cyber Security Detection Technology for your Security Operations Centre IT Security made in Europe Customized IT security. Our services. 2 3 Solutions Our technology. Your experts. Managed Services Next

More information

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS Danielle M. Zeedick, Ed.D., CISM, CBCP Juniper Networks August 2016 Today s Objectives Goal Objectives To understand how holistic network

More information

20 Barrett Court Fredericton, NB, Canada E3B 6Y1 navsoft.com

20 Barrett Court Fredericton, NB, Canada E3B 6Y1  navsoft.com 20 Barrett Court Fredericton, NB, Canada E3B 6Y1 www.gemini navsoft.com 2 Contents Contents... 3 1. Description... 4 2. RoverVu Layout... 6 2.1. Rover Client Software Window... 6 2.2 GPS Status Window...

More information

7th ICG Meeting, Beijing

7th ICG Meeting, Beijing Location Assurance Service Provider 06/11/2012 itrust consulting s.à r.l. Tel: +352 26 176 212 6 Z.I. Bombicht Fax: +352 26 710 978 L-6947 Niederanven Web: www.itrust.lu 7th ICG Meeting, Beijing Introduction

More information

Security Configuration Assessment (SCA)

Security Configuration Assessment (SCA) Security Configuration Assessment (SCA) Getting Started Guide Security Configuration Assessment (SCA) is a lightweight cloud service which can quickly perform the configuration assessment of the IT assets,

More information

SIP Automated Driving System ー Mobility bringing everyone a smile ー

SIP Automated Driving System ー Mobility bringing everyone a smile ー AASHTO International Day SIP Automated Driving System ー Mobility bringing everyone a smile ー Masato MINAKATA (TOYOTA MOTOR CORPORATION) SIP-adus International Cooperative WG 29 October 2017 Intensive R&D

More information

GPS Vulnerability Report

GPS Vulnerability Report GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements

More information

Land & Property Information. CORSnet-NSW Web Portal User Guide

Land & Property Information. CORSnet-NSW Web Portal User Guide Land & Property Information CORSnet-NSW Web Portal User Guide 1 What is a CORS? Most people are now familiar with the use of Global Navigation Satellite Systems (GNSS) like the ones used for in-car and

More information

Achieving End-to-End Security in the Internet of Things (IoT)

Achieving End-to-End Security in the Internet of Things (IoT) Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of

More information