GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY

Similar documents
Review Article GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques

Robust GPS-Based Timing for Phasor Measurement Units

SPREE: A Spoofing Resistant GPS Receiver

Radio Propagation Characteristics of MIMO Systems in Practical Deployment Scenarios

Assessing the Civil GPS Spoofing Threat

Spoofing GNSS Timing Receivers

Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

Position Matching Estimation for GNSS Positioning in Multipath/Non-Line-Of-Sight Environments

Evaluation of a GNSS receiver performance in different multipath environments with a novel real-time multipath simulation system

What is the Advantage of Seismic Array Processing?

Framework and Performance Evaluation of a Ray Tracing-Software Defined Radio Method for GNSS Positioning in an Urban Canyon Environment

State of the art in GNSS authentication and opportunities for system evolutions

Two-Antenna Differential Carrier Phase

Christian Doppler Laboratory for Dependable Wireless Connectivity for the Society in Motion Three-Dimensional Beamforming

Laser speckle based background oriented schlieren measurements in a fire backlayering front

GNSS Multipath Signals: Mitigation or Constructive Use for Robust Navigation in Urban Canyons?

PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION

PMU Time Source Security

LTE: MIMO Techniques in 3GPP-LTE

5G Air Interface Enhanced Mobile Broadband with Millimeter Wave

AHORN SoftGNSStrusted Genaue und sichere Positionsbestimmung für kritische Anwendungen im alpinen Raum. TeleConsult Austria GmbH.

Spoofing Detection in Wireless Networks

The Impact of Current and Future Global Navigation Satellite Systems on Precise Carrier Phase Positioning

Effects of Weight Approximation Methods on Performance of Digital Beamforming Using Least Mean Squares Algorithm

A New Method for Correcting ScanSAR Scalloping Using Forests and inter SCAN Banding Employing Dynamic Filtering

CHAPTER 4 DUAL LOOP SELF BIASED PLL

CS 4495 Computer Vision A. Bobick. CS 4495 Computer Vision. Features 2 SIFT descriptor. Aaron Bobick School of Interactive Computing

Wireless and Mobile Networks

LMS Sound Camera and Sound Source Localization Fast & Versatile Sound Source Localization

G012 Scattered Ground-roll Attenuation for 2D Land Data Using Seismic Interferometry

Analysis of Functional MRI Timeseries Data Using Signal Processing Techniques

Objective. Introduction A More Practical Model. Introduction A More Practical Model. Introduction The Issue

Energy Efficient Adaptive Beamforming on Sensor Networks

SLC ultra low jitter Clock Synthesizer 2 MHz to 7 GHz

NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING

This course provides students with the knowledge and skills to successfully survey, install, and administer enterprise Wi-Fi networks.

COMPARISON OF 3D LASER VIBROMETER AND ACCELEROMETER FREQUENCY MEASUREMENTS

Rate Adaptation in

Point to Multi-point Link: Bridge Mode

Heterogeneous Mobile Network

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

GPS Vulnerability Report

Multiple target detection in video using quadratic multi-frame correlation filtering

HIGH SPEED SIGNAL CHAIN SELECTION GUIDE

Robust Ring Detection In Phase Correlation Surfaces

Multicomponent f-x seismic random noise attenuation via vector autoregressive operators

"Charting the Course... Implementing Cisco Unified Wireless Networking Essentials v2.0 (IUWNE) Course Summary

Lecture ID: WT

Telecommunication Services Engineering Lab. Roch H. Glitho

Simulating the propagation and

A Correlation Test: What were the interferometric observation conditions?

SUPPLEMENTARY INFORMATION

Quality control phantoms and protocol for a tomography system

7th ICG Meeting, Beijing

An SVD-based Fragile Watermarking Scheme With Grouped Blocks

UHF Wireless Microphone System UwMic9

AUDIOVISUAL COMMUNICATION

Chapter 6 Wireless and Mobile Networks. Chapter 6 outline. Chapter 6: Wireless and Mobile Networks. Elements of a wireless network

A new robust watermarking scheme based on PDE decomposition *

Advanced Wireless Cooperation mechanisms for Interference Mitigation in the 2.4 GHz ISM Band

G Practical Magnetic Resonance Imaging II Sackler Institute of Biomedical Sciences New York University School of Medicine. Compressed Sensing

Interferometric processing. Rüdiger Gens

Active noise control at a moving location in a modally dense three-dimensional sound field using virtual sensing

Detection of Buried Objects using GPR Change Detection in Polarimetric Huynen Spaces

DESIGN OF EXPERIMENTS and ROBUST DESIGN

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Wake Vortex Tangential Velocity Adaptive Spectral (TVAS) Algorithm for Pulsed Lidar Systems

Christos Papadopoulos

Dynamic Behavior of RS latches using FIB processing and probe connection

Production of Video Images by Computer Controlled Cameras and Its Application to TV Conference System

High Dynamic Range Imaging

SL Interpreter Compact

Abstract of the Book

HIGH RESOLUTION STACKING OF SEISMIC DATA. Marcos Ricardo Covre, Tiago Barros and Renato da Rocha Lopes

SiRFstar II ARCHITECTURE:

Course Outline (1) #6 Data Acquisition for Built Environment. Fumio YAMAZAKI

802.11ac FREQUENTLY ASKED QUESTIONS. May 2012

mmwave Radar IWR1642 People Counting Demonstration

Keysight Technologies PROPSIM F64 5G Channel Emulation Solution - F8800A

Digital Image Processing

CoE4TN3 Medical Image Processing

A Comparison of Still-Image Compression Standards Using Different Image Quality Metrics and Proposed Methods for Improving Lossy Image Quality

SPM8 for Basic and Clinical Investigators. Preprocessing

A new motion compensation algorithm of floating lidar system for the assessment of turbulence intensity

SPM8 for Basic and Clinical Investigators. Preprocessing. fmri Preprocessing

1 Audio quality determination based on perceptual measurement techniques 1 John G. Beerends

A NEW DCT-BASED WATERMARKING METHOD FOR COPYRIGHT PROTECTION OF DIGITAL AUDIO

Wi-Fi Backscatter: Internet Connectivity for RF-Powered Devices

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data

AUDIO SIGNAL PROCESSING FOR NEXT- GENERATION MULTIMEDIA COMMUNI CATION SYSTEMS

GafChromic Protocol Multi-Channel Film Dosimetry + Gamma Map Analysis

Sampling Approaches to Metrology in Semiconductor Manufacturing

20th GISFI Standardisation Series Meeting (GSSM) Dr. Navin Kumar Amrita Vishwa Vidyapeetham (University) Bangalore

Processing techniques for a GNSS-R scatterometric remote sensing instrument

Yui-Lam CHAN and Wan-Chi SIU

MIMO RFIC Test Architectures

MAXIMIZING BANDWIDTH EFFICIENCY

Lab 2 Report. Carlin Gettliffe

Transcription:

GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International Technical Symposium on Navigation and Timing (ITSNT) 14-17 Nov 2017 ENAC, Toulouse, France

Outline Introduction Spoofing detection metrics Single antenna spoofing detection Antenna array for spoofing detection Detection performance Experimental results 2/16

Spoofing Scenarios Not Covered Overlapped and non overlapped scenarios Spoofer knows the target receiver signal parameters Authentic and spoofing signals coexist The correlation peak is aligned with the authentic peak Covered Authentic signals are blocked Easy to spoof and difficult to detect Spoofer 3/16

Standalone Spoofing Detection RF Down- Converter Detecting multiple correlation peaks in CAF Detecting high received power level Synthetic array processing Antenna Combining (Beam- Forming) Acquisition Tracking Move the GNSS receiver and detect abnormal variations in the clock bias PVT Authentication for a Moving Receiver Structural signals power analysis Noise floor analysis Detecting rapid fluctuations in tracked signal amplitude Doppler and code rate consistency check Synthetic array processing Possible spoofing detection metrics in different operating layers of a GNSS receiver 4/16

Spoofing Detection Spoofing detection can be performed at Receiver level where a stand-alone receiver detects a spoofing attack AGC level monitoring SNR monitoring Number of PRNs Pre-correlation based structural power analysis Network level where a CAV unit detects the spoofing occurrence based on observations from different receivers Position estimates Measurements 5/16

Antenna Array Based Spoofing Detection Spoofing-free Digital baseband Acquisition Ch N Ch 2 Ch 1 RF Down- Converter/ Digitizer Nullsteering Tracking Beamforming M S R P V T RF Front-end Precorrelation spoofing mitigation Single channel receiver Pre-despreading and post-despreading approaches can be employed 6/16

Covered Spoofing Scenario Two Maxtena helical antenna with 8 cm spacing as the receiver antenna array Spoofer antennas Spoofing Signals Receiver antennas 7/16

Data Collection Scenario Phase-coherent multi-channel TeleOrbit Frontend 10 Mega samples/s, 8 bit quantization and disabled automatic gain control (AGC) 8/16

Signal Quality in Covered Spoofing Ch1 cable connection Ch2 and Ch3 propagation Signals processed with a software receiver Counterfeit signals are propagated inside the case Received signals are not subject to attenuation and multipath propagation 9/16

Pre-despreading spoofing detection metrics Structural Power Content Analysis (SPCA) IF samples variance with disabled AGC is considered Pre-despreading methods cannot be used to detect SPCA and IF Variance 10/16

SQM and PLI Monitoring Metrics Post-despreading spoofing detection There is no distortion on correction peak Phase lock indicator (PLI) was used to monitor quality of PLL 0.05 0-0.05-0.1 1 0.95 0.9 0.85 a) SQM Authentic, std=0.01 Covered spoofing, std=0.01 0 20 40 60 Time (s) b) PLI Authentic Covered spoofing 0.8 0 20 40 60 Time (s) 11/16

RTK Solutions in Covered Spoofing Horizontal and vertical solutions Code and carrier measurements quality in the covered spoofing attack Antenna quality in covered spoofing scenario Carrier phase multipath propagation 12/16

Antenna Array Eigen Analysis 2-element antenna array was used Correlation matrix of IF samples was used for Eigen analysis Highest-to-lowest ratio of eigenvalues ( ) in spoofing and authentic cases 13/16

Relative Phase in Authentic Case Relative phase of Ch1-Ch2 in tracking stage Relative phase is a function of Direction of arrival PRN signals Relative path delay of the RF chain Relative phase in authentic case for various PRNs are not the same 14/16

Relative Phase in Spoofing Case Relative phase of Ch1-Ch2 at correlator outputs Ch1 parameters were used to wipe of Ch2 Relative phase in spoofing case for various PRNs are the same All PRNs are transmitted from a single source 15/16

Conclusions Covered spoofing scenario was investigated where the reception of the authentic signals was blocked The covered spoofing attack is relatively easy to implement while the signal quality was preserved Multipath due to signal propagation inside the spoofing case was not a concern Single antenna based spoofing detection metrics are not sensitive for the covered spoofing attack Two-element antenna array was utilized to implement spatial processing in pre-despreading and post-despreading stages of the receiver the covered spoofing attack could be successfully detected using such an antenna array 16/16