Endre søk
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Secure GNSS-based Positioning and Timing: Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. Networked Systems Security (NSS) Group.ORCID-id: 0000-0002-8642-8176
2021 (engelsk)Doktoravhandling, med artikler (Annet vitenskapelig)
Abstract [en]

With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       

However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        

This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       

Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       

Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.

sted, utgiver, år, opplag, sider
KTH Royal Institute of Technology, 2021. , s. 71
Serie
TRITA-EECS-AVL ; 2021:19
HSV kategori
Forskningsprogram
Elektro- och systemteknik
Identifikatorer
URN: urn:nbn:se:kth:diva-291548ISBN: 978-91-7873-811-3 (tryckt)OAI: oai:DiVA.org:kth-291548DiVA, id: diva2:1537307
Disputas
2021-04-01, https://kth-se.zoom.us/webinar/register/WN_IFbfmOPTSVCODSCFxTnMDA, Online, Stockholm, 09:00 (engelsk)
Opponent
Veileder
Merknad

QC 20210316

Tilgjengelig fra: 2021-03-16 Laget: 2021-03-15 Sist oppdatert: 2025-02-05bibliografisk kontrollert
Delarbeid
1. GNSS receiver tracking performance analysis under distance-decreasing attacks
Åpne denne publikasjonen i ny fane eller vindu >>GNSS receiver tracking performance analysis under distance-decreasing attacks
2015 (engelsk)Inngår i: Proceedings of 2015 International Conference on Localization and GNSS, IEEE , 2015Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Numerous works have investigated the vulnerability of Global Navigation Satellite Systems (GNSS) against attacks. Upcoming systems make provisions for cryptographic civilian signal protection. However, this alone does not fully protect GNSS-based localization. In this paper, we show that attacks at the physical layer, without modification of navigation messages, can be severely effective. We analyze the influence of the, so called distance decreasing attacks, and we investigate their feasibility and we find that they can be practical and effective. Finally, we consider signal quality monitoring, but it can not readily serve as a countermeasure.

sted, utgiver, år, opplag, sider
IEEE, 2015
Emneord
Distance decreasing attacks, GNSS, Tracking
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-187134 (URN)10.1109/ICL-GNSS.2015.7217163 (DOI)000380461600030 ()2-s2.0-84959559446 (Scopus ID)
Konferanse
International Conference on Localization and GNSS, ICL-GNSS 2015; Gothenburg; Sweden
Merknad

QC 20160518

Tilgjengelig fra: 2016-05-18 Laget: 2016-05-17 Sist oppdatert: 2024-03-18bibliografisk kontrollert
2. Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks
Åpne denne publikasjonen i ny fane eller vindu >>Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks
2015 (engelsk)Inngår i: International Symposium on GNSS, 2015Konferansepaper, Publicerat paper (Fagfellevurdert)
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-221059 (URN)
Konferanse
International Symposium on GNSS 2015, Kyoto, Japan
Merknad

QC 20180115

Tilgjengelig fra: 2018-01-11 Laget: 2018-01-11 Sist oppdatert: 2024-09-23bibliografisk kontrollert
3. Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm
Åpne denne publikasjonen i ny fane eller vindu >>Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm
2019 (engelsk)Inngår i: Proceedings of the IEEE Aerospace Conference 2019, IEEE Computer Society, 2019, artikkel-id 8742021Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Because of the limited satellite visibility, reduced signal reception reliability and constraining spatial geometry, e.g., in urban areas, the development of multi-constellation global navigation satellite systems (GNSS) has gained traction rapidly. GNSS-based applications are expected to handle observations from different navigation systems, e.g., GPS, GLONASS, Bei-Dou and Galileo, in order to improve positioning accuracy and reliability. Furthermore, multi-constellation receivers present an opportunity to better counter spoofing and replaying attacks, leveraging approaches take advantage of the redundant measurements. In particular, cluster-based solution separation algorithm (CSSA) proposes to detect and identify faulty/malicious signals in a single GPS constellation by checking the consistency of receiver positions calculated with different number of satellites. Intuitively, the algorithm targets directly the consequence of spoofing/replaying attacks: the victim receiver position error estimation. It works independently of how the attacks are launched, either through modifying pseudorange measurements or manipulating the navigation messages, without changing the receiver hardware. Multi-constellation GNSS receivers utilize all observations from different navigation systems, there are more than 30 available satellites at each epoch after Galileo and BeiDou systems become fully operational; in other words using abundant redundancy. Therefore, we introduce such a CSSA to a multi-constellation receiver. The work shows that a multi-constellation GNSS receiver equipped with our algorithm works effectively against a strong spoofing/replaying attacker that can manipulate a large number of signals, or even an entire constellation. The results show that CSSA with multi-constellation significantly improves the performance of detecting and identifying the malicious signals; particularly, when the adversary cannot control all the constellations, a multi-constellation receiver can identify the faults even the adversary induces very small errors to pseudorange measurements, comparing with a single constellation receiver. Moreover, when the attacker is powerful to manipulate most of signals of all the constellations, a multi-constellation receiver with CSSA can still detect and identify the faulty signals with high probability when the attacker tries to mislead the victim more than a couple of hundred meters from its true location.

sted, utgiver, år, opplag, sider
IEEE Computer Society, 2019
Serie
IEEE Aerospace Conference Proceedings, ISSN 1095-323X
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-248027 (URN)10.1109/AERO.2019.8742021 (DOI)000481648203027 ()2-s2.0-85068331338 (Scopus ID)
Konferanse
IEEE Aerospace Conference 2019, Mar 2 - Mar 9, 2019, Yellowstone Conference Center, Big Sky, Montana,
Merknad

QC 20190403

Part of ISBN 9781538668542

Tilgjengelig fra: 2019-04-02 Laget: 2019-04-02 Sist oppdatert: 2024-10-18bibliografisk kontrollert
4. On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals
Åpne denne publikasjonen i ny fane eller vindu >>On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals
2019 (engelsk)Inngår i: Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, Institute of Navigation , 2019, s. 363-372Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

The security of global navigation satellite systems draws attention increasingly, and authentication mechanisms for civilian services seem very effective in thwarting malicious behavior. For example, the Galileo E1 Open Service introduces navigation message authentication. Authentication, as well as encryption at navigation message or spreading code level, can prevent spoofing attacks, but do not preclude replay attacks. In this work, we consider a type of strong replay attacks, distance-decreasing attacks, against cryptographically protected GNSS signals. Distance-decreasing attack enhance an attacker’s capability of allowing it to mislead the victim receiver that the GNSS signals arrive earlier than true signals. We analyze the instantiation and the effects of the distance-decreasing attacks on unprotected GNSS signals, on navigation message authenticated signals, and on spreading-code encrypted signals. We discuss different strategies that the attacker can adopt to introduce the least bit errors to the re-transmitted signals and avoid being detected at the victim receiver. We provide evaluation results of distance-decreasing attacks on unprotected signals and authenticated navigation message signals, based on different strategies and configurations, and we sketch countermeasures to the different strategies.

sted, utgiver, år, opplag, sider
Institute of Navigation, 2019
Emneord
Distance-Decreasing (DD) attacks, Early Detection (ED), Late Commit (LC), Navigation Message Authentication (NMA), Spreading Code Encryption (SCE)
HSV kategori
Forskningsprogram
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-248026 (URN)10.33012/2019.16736 (DOI)000542920400026 ()2-s2.0-85068322902 (Scopus ID)
Konferanse
2019 International Technical Meeting of The Institute of Navigation, January 28 - 31, 2019, Reston, Virginia
Merknad

QC 20190412

Tilgjengelig fra: 2019-04-02 Laget: 2019-04-02 Sist oppdatert: 2022-06-26bibliografisk kontrollert
5. Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks
Åpne denne publikasjonen i ny fane eller vindu >>Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks
2019 (engelsk)Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Increased use of global satellite navigation systems (GNSS), for applications such as autonomous vehicles, intelligent transportationsystems and drones, heightens security concerns. Civil GNSS signals are vulnerable to notably spoofing and replayattacks. To counter such attacks, cryptographic methods are developed: Navigation Message Authentication (NMA) is onesuch scheme, about to be deployed for Galileo E1 Open Service (OS); it allows receivers to verify the signal origin andprotects navigation message integrity. However, NMA signals cannot fully thwart replay attacks, which do not require forgingnavigation messages. Classic replay attacks, e.g, meaconing, retransmit previously recorded signals without any modification,thus highly limiting the capacity of the adversary. Distance-decreasing (DD) attacks are a strong type of replay attack,allowing fine-grained individual pseudorange manipulation in real time. Moreover, DD attacks counterbalance processing andtransmission delays induced by adversary, by virtue of shifting earlier in time the perceived (relayed) signal arrival; thusshortening the pseudorange measurements. In this paper, we first analyze how DD attacks can harm the Galileo E1 OSNMAservice assuming the adversary has no prior information on the navigation message. Moreover,we propose a DD attackdetection method based on a Goodness of Fit test on the prompt correlator outputs of the victim. The results show that themethod can detect the DD attacks even when the receiver has locked to the DD signals.

sted, utgiver, år, opplag, sider
Miami, Florida: , 2019
HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-265517 (URN)10.33012/2019.17114 (DOI)000568618904007 ()2-s2.0-85075269802 (Scopus ID)
Konferanse
Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019)
Merknad

QC  20191212

Tilgjengelig fra: 2019-12-12 Laget: 2019-12-12 Sist oppdatert: 2022-06-26bibliografisk kontrollert
6. Protecting GNSS-based Services using Time Offset Validation
Åpne denne publikasjonen i ny fane eller vindu >>Protecting GNSS-based Services using Time Offset Validation
2020 (engelsk)Inngår i: 2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, 2020, s. 575-583Konferansepaper, Publicerat paper (Fagfellevurdert)
Abstract [en]

Global navigation satellite systems (GNSS) provide pervasive accurate positioning and timing services for a large gamut of applications, from Time based One-Time Passwords (TOPT), to power grid and cellular systems. However, there can be security concerns for the applications due to the vulnerability of GNSS. It is important to observe that GNSS receivers are components of platforms, in principle having rich connectivity to different network infrastructures. Of particular interest is the access to a variety of timing sources, as those can be used to validate GNSS-provided location and time. Therefore, we consider off-the-shelf platforms and how to detect if the GNSS receiver is attacked or not, by cross-checking the GNSS time and time from other available sources. First, we survey different technologies to analyze their availability, accuracy and trustworthiness for time synchronization. Then, we propose a validation approach for absolute and relative time. Moreover, we design a framework and experimental setup for the evaluation of the results. Attacks can be detected based on WiFi supplied time when the adversary shifts the GNSS provided time, more than 23.942 μs; with Network Time Protocol (NTP) supplied time when the adversary-induced shift is more than 2.046 ms. Consequently, the proposal significantly limits the capability of an adversary to manipulate the victim GNSS receiver.

HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-280850 (URN)10.1109/PLANS46316.2020.9110224 (DOI)000839298400066 ()2-s2.0-85087051578 (Scopus ID)
Konferanse
2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, Portland, OR, United States of America, 20 April - 23 April 2020
Merknad

Part of ISBN 978-172810244-3

QC 20230921

Tilgjengelig fra: 2020-09-14 Laget: 2020-09-14 Sist oppdatert: 2025-03-17bibliografisk kontrollert
7. Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
Åpne denne publikasjonen i ny fane eller vindu >>Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
(engelsk)Manuskript (preprint) (Annet vitenskapelig)
Abstract [en]

As the security of global navigation satellite systems(GNSS) for civilian usage is becoming increasingly important,navigation message authentication is to significantly improveresilience to spoofing attacks. However, not all attacks can beeffectively countered: a strong variant of replay/relay attacks,distance-decreasing (DD) attacks, can shorten pseudorange mea-surements, without manipulating the cryptographically protectednavigation message, thus manipulating the positiion, velocity, andtime solution undetected. First, we discuss how DD attacks cantamper with GNSS signals, demonstrating the attack effectivenesson a recorded Galileo signal. DD attacks might introduce biterrors to the forged signals, but the adversary can keep this errorrate very low with proper attack parameter settings. Then, basedon our mathematical model of the prompt correlator outputof the tracking phase at the victim receiver, we find that thecorrelator output distribution changes in presence of DD attacks.This leads us to apply hypothesis testing to detect the DD attacks,notably a Goodness of Fit (GoF) test and a generalized likelihoodratio test (GLRT), depending on the victim’s knowledge on theDD attacks. Monte Carlo simulations are used to evaluate thedetection probability and the receiver operating characteristic(ROC) curves for two tests, for different adversary configurationand noise settings. Then, we evaluate the effectiveness of the twotests with a synthesized DD signal. The results show that bothtests can detect DD attacks with similar performance in highsignal-to-noise ratio (SNR) environments. The GLRT detectionprobability is approximately20%higher than that of the GoFtest in low SNR environments

HSV kategori
Identifikatorer
urn:nbn:se:kth:diva-281254 (URN)
Merknad

QC 20200917

Tilgjengelig fra: 2020-09-16 Laget: 2020-09-16 Sist oppdatert: 2022-06-25bibliografisk kontrollert
8. Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers
Åpne denne publikasjonen i ny fane eller vindu >>Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers
2021 (engelsk)Inngår i: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 2, s. 217-234Artikkel i tidsskrift, News item (Fagfellevurdert) Published
Abstract [en]

Numerous applications and devices use Global Navigation Satellite System (GNSS)-provided position, velocity and time (PVT)information. However, unintentional interference and intentional attacks render GNSS-provided information unreliable. ReceiverAutonomous Integrity Monitoring (RAIM) is considered an effective and lightweight protection method when a subset of the availablesatellite measurements is affected. However, the conventional RAIM Fault Detection and Exclusion (FDE), exhaustive iterative searchto exclude faulty signals, can be expensive when there are many potential faults, especially so for multi-constellation GNSS receiversoperating in the presence of several faulty signals. Therefore, we propose a fast multiple fault detection and exclusion (FM-FDE)algorithm, to detect and exclude multiple faults for both single and multi-constellation receivers. The novelty is FM-FDE caneffectively exclude faults withouta lengthy iterative search on candidate fault signals. FM-FDE calculates position distances of anysubset pairs with (3+P) measurements, where P is the number of constellations. Then, the algorithm utilizes statistical testing toexamine the distances, identifies faulty measurements and further excludes them from the computation of the final PVT solution. Weevaluate FM-FDE with synthesized faulty measurements added to a collected data set; the results show that FM-FDE is faster thanconventional Solution Separation (SS) FDE when the number of faults is larger than 3 in a single constellation receiver. Moreover,FM-FDE is much faster when the number of faults is larger than 2 in a GPS-Galileo receiver, when both constellation contains faultymeasurements. The trade-off is that FM-FDE slightly degrades performance in terms of misdetection and false alarm probabilities,compared to the conventional SS FDE.

sted, utgiver, år, opplag, sider
IEEE Communications Society, 2021
HSV kategori
Forskningsprogram
Elektro- och systemteknik
Identifikatorer
urn:nbn:se:kth:diva-281255 (URN)10.1109/OJCOMS.2021.3050333 (DOI)2-s2.0-85122047981 (Scopus ID)
Merknad

QC 20200917

Tilgjengelig fra: 2020-09-16 Laget: 2020-09-16 Sist oppdatert: 2022-06-25bibliografisk kontrollert

Open Access i DiVA

fulltext(1589 kB)961 nedlastinger
Filinformasjon
Fil FULLTEXT01.pdfFilstørrelse 1589 kBChecksum SHA-512
ae1e4f7b31f6d223dd8dbb3f670faf67f723491238afb07996b5a49a6c24d84d446b47aa6f3375240904fecc14e214fbe09efa3ff618df40c6a30231cae89df7
Type fulltextMimetype application/pdf

Andre lenker

online defense link

Person

Zhang, Kewei

Søk i DiVA

Av forfatter/redaktør
Zhang, Kewei
Av organisasjonen

Søk utenfor DiVA

GoogleGoogle Scholar
Totalt: 963 nedlastinger
Antall nedlastinger er summen av alle nedlastinger av alle fulltekster. Det kan for eksempel være tidligere versjoner som er ikke lenger tilgjengelige

isbn
urn-nbn

Altmetric

isbn
urn-nbn
Totalt: 1328 treff
RefereraExporteraLink to record
Permanent link

Direct link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf