Global Satellite Services

Similar documents
The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

ESOA > The Connected Automobile. Connected Automobiles Market Overview Paul Gudonis, Global Network & Services

The Australian Government s Approach to Critical Infrastructure Resilience

State of play of the European GNSS

Certification of EGNSS Timing Receivers and Services

Spoofing GNSS Timing Receivers

The Information Age has brought enormous

Update on LBS Location based services and IoT Internet of Things

Machine-Based Penetration Testing

Assessing the Civil GPS Spoofing Threat

SECURING THE CONNECTED ENTERPRISE.

S e c u rity S o lu tio n s

Machine-Based Penetration Testing

Port Facility Cyber Security

MASP Chapter on Safety and Security

High Quality Positioning: a Key to Success for Autonomous Driving

Unit 3 Cyber security

CYBER SECURITY AWARENESS IN THE MARITIME INDUSTRY

GPS SPOOFING: NO LONGER A FISH STORY

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Cybersecurity, safety and resilience - Airline perspective

Inertial Systems. Ekinox Series TACTICAL GRADE MEMS. Motion Sensing & Navigation IMU AHRS MRU INS VG

Science & Technology Directorate: R&D Overview

EGNSS Mass Market Applications - Mobility as a service and Smart cities, IoT, Commercial and Social LBS

CyBot Suite. Machine-based Penetration Testing

Summary of Cyber Security Issues in the Electric Power Sector

National Institute of Standards and Technology

Securing the future of mobility

IEEE PROJECTS ON EMBEDDED SYSTEMS

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

Galileo Open Service Authentication: A Complete Service Design and Provision Analysis

Sensor Fusion: Potential, Challenges and Applications. Presented by KVH Industries and Geodetics, Inc. December 2016

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Security Challenges with ITS : A law enforcement view

Location-Specific Cyber Risk

Strategies for Maritime Cyber Security Leveraging the Other Modes

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Railroad Infrastructure Security

Examining future priorities for cyber security management

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

LANDINS Georeferencing and Orientation System

Threat analysis. Tuomas Aura CS-C3130 Information security. Aalto University, autumn 2017

Internet of Things Toolkit for Small and Medium Businesses

Qualification Specification. Level 2 Award in Cyber Security Awareness For Business

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

Autonomy & Operational Sustainability

M-2-M-2-People. How Mobility Enables Visibility. Daniel Munyan Director, M2M Center of Excellence Computer Sciences Corporation 6/1/2012 1

GPS Vulnerability Report

e:

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

Chapter 1. Chapter 2. Chapter 3

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

13W-AutoSPIN Automotive Cybersecurity

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Patient Information Security

Overview Brosix stringent corporate security requirements.

Risk Assessment of Autonomous Vehicles Using Bayesian Defense Graphs

DigiTraq STA. SIGFOX Ready GPS Tracker. Or Contact us: Please visit the HidnSeek Website for more info:

Cyber Security: Threat and Prevention

MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data?

Presented by Joe Burns Kentucky Rural Water Association July 19, 2005

Enhancing the cyber security &

IEEE-SA Internet of Things - Security & Standards

Evaluation of the Existing CORS Network Infrastructure in Singapore to Meet User Demand Singapore Land Authority Presenter: Victor Khoo

Forensics and Active Protection

Digital Strategies for Development in Asia and the Pacific

About Cronus Cyber Technologies

Cyber and information security applicable for the maritime sector

Vehicle Area Networks:

SMART Ship Program. Najmeh Masoudi Cyber safety and security manager. Palazzo S. Giorgio - Genova, 28/06/ Copyright Bureau Veritas

Business Continuity Planning Keeping Pace with New Technology

NOSAC. Phase I and Phase II FINAL REPORT

Designing for the Industrial Internet Accelerating the Industrial Internet of Things

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Smart cards are made of plastic, usually polyvinyl chloride. The card may embed a hologram to prevent counterfeiting. Smart cards provide strong

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

Europeanizing Transport Security

To Audit Your IAM Program

INTRODUCTION TO CLOAKWARE/TRS TECHNOLOGY

Measuring the World: Designing Robust Vehicle Localization for Autonomous Driving. Frank Schuster, Dr. Martin Haueis

CHIEF INFORMATION OFFICER

Korea ICT Market Overview. Yoonmi Kim Finpro Korea

SM05: Risk Analysis: A Comparison in Quantifying Asset Values, Threats, Vulnerabilities and Risk. Doug Haines Haines Security Solutions 9 April 2013

Electronic and Mission Systems

DriveLinQ Driver Manual For Cabmate Customers

Maritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant

Singapore Autonomous Vehicle Initiative (SAVI)

Internet of Things (IoT) Securing the Connected Ecosystem

Real Time Traffic Information Delivered to the Dashboard

Heavy Vehicle Cyber Security Bulletin

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

MODAInnovations Complete Academic Project Solutions

Business Continuity Management

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Transportation Security Risk Assessment

Designing a GPS Receiver Network with GNSS Algorithm for Accuracy and Safety

Security Policies and Procedures Principles and Practices

Security analysis and assessment of threats in European signalling systems?

Transcription:

Global Satellite Services Position Integrity & The World of Spoofing Daan Scheer Global Strategic Businesss Development Satellite Positioning & Integrity

Content 1. Location revolution 2. World of Spoofing 3. Mitigation 4. SATGUARD - NMA Proposition NMA - Navigation Message Authentication 5. Fugro & Asset integrity 2

A changing world IoT, Autonomous navigating assets, Smart cities & harbours, Electronic road pricing, all with location as a centerpiece Over the coming decade processes and systems will rely more and more on quality positioning and equally those are exposed to more cyber attack related risks; Position Integrity is a clear necessity 3

Imagine NO Geolocation service or a WRONG position! 4

Imagine NO Geolocation service or a WRONG position! The line is First In First Out, meaning the next request will go to the Uber cab who has been waiting the longest and is in the waiting area (in blue): International airport Penang, Malaysia Your location within the airport / pickup lot does not affect your position in the queue, however you will not receive dispatches unless you are in the waiting area 5

World of Spoofing 6

The world of spoofing - Likelihood Self-spoofing (Uber case) or Being spoofed? Who is the attacker & What is objective? What are the Attacker s skills & What resources available? Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 7

The world of spoofing - Variables Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015) 8

The world of spoofing - Use cases Low Value Asset Tracker: o Tamper motivated, tracking (Insurance telematics, ERP, vehicle fleet & fishing vessel tracking) High Value Asset Tracking: o Non-tampered, externally spoofed, tracking (High value goods or vehicles / trains) Portable Tracker: o Constrained on power, tamper motivated, tracking (Tagging) High Value Positioning: o Non-tampered, externally spoofed, positioning (Autonomous driving, dynamic positioning (rig)) GNSS Disciplined Timing: o Power & financial transactions 9

The world of spoofing - Threat sources Individual Operator: o Driver avoiding being tracked o Limited resource and little technical ability Lone Criminal: o Motivated by financial gain Prestige Attacker: o Hacker, academic, journalism o Motivated by publicizing their achievement o Moderate resources but significant technical ability Organized Crime: o Motivated by financial gain and possess sizeable resources Organized Attacker: o Terrorists or foreign intelligence services o Motivated by the disruptive effect of the attack, potentially unlimited resources and ability. 10

The world of spoofing - Likelihood score Uber case Attack likelihood: Extreme (4), High (3), Moderate (2), Low (1), or Negligible (0) 11 Reference to Galileo Open Service Authentication: A Complete Service Design and Provision Analysis (Sept 2015)

The world of spoofing - Countermeasures Full Position Integrity Cryptographic source External-data aided position qualification Authentication of signal & message 12

Fusion of systems for maximal resilience GNSS Navigation Message (NM) Ephemeris (incl. Time & Clock) Satellite health IMU Inertial sensor aid Full system resilience GNSS Authentication Other signals Software System (positioning) software & Receiver Autonomous Integrity Monitoring Other sensors Video, Radar, Ultrasonic, Lidar & Map match GNSS Signal Pseudo range GNSS Augmentation Corrections, Satellite Health, Real time & Extended ephemeris 13

Navigation Message Authentication Ensures the received GNSS signals carry the correct messages Authenticity of messages established using a global GNSS receiver network Digital signature information produced for authenticated messages Signature information distributed to the user User checks that received navigation message matches signature Observe in Fugro s global reference network & broadcast digital signature 14

Spoofing complexity GNSS receivers & spoofing detection methods Multiple spoofing signals and/or at multiple locations (Self) spoofing using synchronised signals RAIM & IMU other external aids (signals & sensors) Pseudo range Authentication (Dual Antenna or CRPA) Re-transmission (Self) spoofing using pre-recorded (Self) spoofing using signal generator Change ephemeris for use in Assisted GPS Navigation Message Authentication Receiver technology Mass market - Land Low-end High-end 15

Fugro people and equipment 10,000 Employees 26 Vessels 98 CPT Trucks 40 Laboratories 28 Jack-up Platforms 16 R+D centres 239 Land-based Drill Rigs 18 Offshore Drill Rigs 119 ROVs 5 AUVs 169 Offices Source: Fugro AR 2017 16

Multiple applications are vulnerable Website & use cases 17

Position critical processes need reliable location services Navigation Message Authentication provides a clear yes or no as to spoofing detection in all receiver domains and adds redundancy to the system 18

We are Fugro proud to provide geo-intelligence, location services and asset integrity solutions to contribute to a liveable world Daan Scheer