kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure GNSS-based Positioning and Timing: Distance-Decreasing attacks, fault detection and exclusion, and attack detection with the help of opportunistic signals
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Software and Computer systems, SCS. Networked Systems Security (NSS) Group.ORCID iD: 0000-0002-8642-8176
2021 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

With trillions of devices connected in large scale systems in a wired or wireless manner, positioning and synchronization become vital. Global Navigation Satellite System (GNSS) is the first choice to provide global coverage for positioning and synchronization services. From small mobile devices to aircraft, from intelligent transportation systems to cellular networks, and from cargo tracking to smart grids, GNSS plays an important role, thus, requiring high reliability and security protection.       

However, as GNSS signals propagate from satellites to receivers at distance of around 20 000 km, the signal power arriving at the receivers is very low, making the signals easily jammed or overpowered. Another vulnerability stems from that civilian GNSS signals and their specifications are publicly open, so that anyone can craft own signals to spoof GNSS receivers: an adversary forges own GNSS signals and broadcasts them to the victim receiver, to mislead the victim into believing that it is at an adversary desired location or follows a false trajectory, or adjusts its clock to a time dictated by the adversary. Another type of attack is replaying GNSS signals: an adversary transmits a pre-recorded GNSS signal stream to the victim receiver, so that the receiver calculates an erroneous position and time. Recent incidents reported in press show that the GNSS functionalities in a certain area, e.g., Black Sea, have been affected by cyberattacks composed of the above-mentioned attack types.        

This thesis, thus, studies GNSS vulnerabilities and proposes detection and mitigation methods for GNSS attacks, notably spoofing and replay attacks. We analyze the effectiveness of one important and powerful replay attack, the so-called Distance-decreasing (DD) attacks that were previously investigated for wireless communication systems, on GNSS signals. DD attacks are physical layer attacks, targeting time-of-flight ranging protocols, to shorten the perceived as measured distance between the transmitter and receiver. The attacker first transmits an adversary-chosen data bit to the victim receiver before the signal arrives at the attacker; upon receipt of the GNSS signal, the attacker estimates the data bit based on the early fraction of the bit period, and then switches to transmitting the estimate to the victim receiver. Consequently, the DD signal arrives at the victim receiver earlier than the genuine GNSS signals would have, which in effect shortens the pseudorange measurement between the sender (satellite) and the victim receiver, consequently, affecting the calculated position and time of the receiver. We study how the DD attacks affect the bit error rate (BER) of the received signals at the victim, and analyze its effectiveness, that is, the ability to shorten pseudorange measurements, on different GNSS signals. Several approaches are considered for the attacker to mount a DD attack with high probability of success (without being detected) against a victim receiver, for cryptographically unprotected and protected signals. We analyze the tracking output of the DD signals at the victim receiver and propose a Goodness of Fit (GoF) test and a Generalized Likelihood Ratio Test (GLRT) to detect the attacks. The evaluation of the two tests shows that they are effective, with the result being perhaps more interesting when considering DD attacks against Galileo signals that can be cryptographically protected.       

Moreover, this thesis investigates the feasibility of validating the authenticity of the GNSS signals with the help of opportunistic signals, which is information readily available in modern communication environments, e.g., 3G, 4G and WiFi. We analyze the time synchronization accuracy of different technologies, e.g., Network Time Protocol (NTP), WiFi and local oscillator, as the basis for detecting a discrepancy with the GNSS-obtained time. Two detection approaches are proposed and one testbench is designed for the evaluation. A synthesized spoofing attack is used to verify the effectiveness of the approaches.       

Beyond attack detection, we develop algorithms to detect and exclude faulty signals, namely the Clustering-based Solution Separation Algorithm (CSSA) and the Fast Multiple Fault Detection and Exclusion (FM-FDE). They both utilize the redundant available satellites, more than the minimum a GNSS receiver needs for position and time offset calculation. CSSA adopts data clustering to group subsets of positions calculated with different subsets of available satellites. Basically, these positions, calculated with subsets not containing any faulty satellites, should be close to each other, i.e., in a dense area; otherwise they should be scattered. FM-FDE is a more efficient algorithm that uses distances between positions, calculated with fixed-size subsets, as test statistics to detect and exclude faulty satellite signals. As the results show, FM-FDE runs faster than CSSA and other solution-separation fault detection and exclusion algorithms while remaining equally effective.

Place, publisher, year, edition, pages
KTH Royal Institute of Technology, 2021. , p. 71
Series
TRITA-EECS-AVL ; 2021:19
National Category
Communication Systems Computer Systems Other Electrical Engineering, Electronic Engineering, Information Engineering Signal Processing Geotechnical Engineering and Engineering Geology
Research subject
Electrical Engineering
Identifiers
URN: urn:nbn:se:kth:diva-291548ISBN: 978-91-7873-811-3 (print)OAI: oai:DiVA.org:kth-291548DiVA, id: diva2:1537307
Public defence
2021-04-01, https://kth-se.zoom.us/webinar/register/WN_IFbfmOPTSVCODSCFxTnMDA, Online, Stockholm, 09:00 (English)
Opponent
Supervisors
Note

QC 20210316

Available from: 2021-03-16 Created: 2021-03-15 Last updated: 2025-02-05Bibliographically approved
List of papers
1. GNSS receiver tracking performance analysis under distance-decreasing attacks
Open this publication in new window or tab >>GNSS receiver tracking performance analysis under distance-decreasing attacks
2015 (English)In: Proceedings of 2015 International Conference on Localization and GNSS, IEEE , 2015Conference paper, Published paper (Refereed)
Abstract [en]

Numerous works have investigated the vulnerability of Global Navigation Satellite Systems (GNSS) against attacks. Upcoming systems make provisions for cryptographic civilian signal protection. However, this alone does not fully protect GNSS-based localization. In this paper, we show that attacks at the physical layer, without modification of navigation messages, can be severely effective. We analyze the influence of the, so called distance decreasing attacks, and we investigate their feasibility and we find that they can be practical and effective. Finally, we consider signal quality monitoring, but it can not readily serve as a countermeasure.

Place, publisher, year, edition, pages
IEEE, 2015
Keywords
Distance decreasing attacks, GNSS, Tracking
National Category
Signal Processing
Identifiers
urn:nbn:se:kth:diva-187134 (URN)10.1109/ICL-GNSS.2015.7217163 (DOI)000380461600030 ()2-s2.0-84959559446 (Scopus ID)
Conference
International Conference on Localization and GNSS, ICL-GNSS 2015; Gothenburg; Sweden
Note

QC 20160518

Available from: 2016-05-18 Created: 2016-05-17 Last updated: 2024-03-18Bibliographically approved
2. Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks
Open this publication in new window or tab >>Detection and Exclusion RAIM Algorithm against Spoofing/Replaying Attacks
2015 (English)In: International Symposium on GNSS, 2015Conference paper, Published paper (Refereed)
National Category
Engineering and Technology
Identifiers
urn:nbn:se:kth:diva-221059 (URN)
Conference
International Symposium on GNSS 2015, Kyoto, Japan
Note

QC 20180115

Available from: 2018-01-11 Created: 2018-01-11 Last updated: 2024-09-23Bibliographically approved
3. Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm
Open this publication in new window or tab >>Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm
2019 (English)In: Proceedings of the IEEE Aerospace Conference 2019, IEEE Computer Society, 2019, article id 8742021Conference paper, Published paper (Refereed)
Abstract [en]

Because of the limited satellite visibility, reduced signal reception reliability and constraining spatial geometry, e.g., in urban areas, the development of multi-constellation global navigation satellite systems (GNSS) has gained traction rapidly. GNSS-based applications are expected to handle observations from different navigation systems, e.g., GPS, GLONASS, Bei-Dou and Galileo, in order to improve positioning accuracy and reliability. Furthermore, multi-constellation receivers present an opportunity to better counter spoofing and replaying attacks, leveraging approaches take advantage of the redundant measurements. In particular, cluster-based solution separation algorithm (CSSA) proposes to detect and identify faulty/malicious signals in a single GPS constellation by checking the consistency of receiver positions calculated with different number of satellites. Intuitively, the algorithm targets directly the consequence of spoofing/replaying attacks: the victim receiver position error estimation. It works independently of how the attacks are launched, either through modifying pseudorange measurements or manipulating the navigation messages, without changing the receiver hardware. Multi-constellation GNSS receivers utilize all observations from different navigation systems, there are more than 30 available satellites at each epoch after Galileo and BeiDou systems become fully operational; in other words using abundant redundancy. Therefore, we introduce such a CSSA to a multi-constellation receiver. The work shows that a multi-constellation GNSS receiver equipped with our algorithm works effectively against a strong spoofing/replaying attacker that can manipulate a large number of signals, or even an entire constellation. The results show that CSSA with multi-constellation significantly improves the performance of detecting and identifying the malicious signals; particularly, when the adversary cannot control all the constellations, a multi-constellation receiver can identify the faults even the adversary induces very small errors to pseudorange measurements, comparing with a single constellation receiver. Moreover, when the attacker is powerful to manipulate most of signals of all the constellations, a multi-constellation receiver with CSSA can still detect and identify the faulty signals with high probability when the attacker tries to mislead the victim more than a couple of hundred meters from its true location.

Place, publisher, year, edition, pages
IEEE Computer Society, 2019
Series
IEEE Aerospace Conference Proceedings, ISSN 1095-323X
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-248027 (URN)10.1109/AERO.2019.8742021 (DOI)000481648203027 ()2-s2.0-85068331338 (Scopus ID)
Conference
IEEE Aerospace Conference 2019, Mar 2 - Mar 9, 2019, Yellowstone Conference Center, Big Sky, Montana,
Note

QC 20190403

Part of ISBN 9781538668542

Available from: 2019-04-02 Created: 2019-04-02 Last updated: 2024-10-18Bibliographically approved
4. On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals
Open this publication in new window or tab >>On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals
2019 (English)In: Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, Institute of Navigation , 2019, p. 363-372Conference paper, Published paper (Refereed)
Abstract [en]

The security of global navigation satellite systems draws attention increasingly, and authentication mechanisms for civilian services seem very effective in thwarting malicious behavior. For example, the Galileo E1 Open Service introduces navigation message authentication. Authentication, as well as encryption at navigation message or spreading code level, can prevent spoofing attacks, but do not preclude replay attacks. In this work, we consider a type of strong replay attacks, distance-decreasing attacks, against cryptographically protected GNSS signals. Distance-decreasing attack enhance an attacker’s capability of allowing it to mislead the victim receiver that the GNSS signals arrive earlier than true signals. We analyze the instantiation and the effects of the distance-decreasing attacks on unprotected GNSS signals, on navigation message authenticated signals, and on spreading-code encrypted signals. We discuss different strategies that the attacker can adopt to introduce the least bit errors to the re-transmitted signals and avoid being detected at the victim receiver. We provide evaluation results of distance-decreasing attacks on unprotected signals and authenticated navigation message signals, based on different strategies and configurations, and we sketch countermeasures to the different strategies.

Place, publisher, year, edition, pages
Institute of Navigation, 2019
Keywords
Distance-Decreasing (DD) attacks, Early Detection (ED), Late Commit (LC), Navigation Message Authentication (NMA), Spreading Code Encryption (SCE)
National Category
Engineering and Technology
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-248026 (URN)10.33012/2019.16736 (DOI)000542920400026 ()2-s2.0-85068322902 (Scopus ID)
Conference
2019 International Technical Meeting of The Institute of Navigation, January 28 - 31, 2019, Reston, Virginia
Note

QC 20190412

Available from: 2019-04-02 Created: 2019-04-02 Last updated: 2022-06-26Bibliographically approved
5. Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks
Open this publication in new window or tab >>Safeguarding NMA Enhanced Galileo OS Signals from Distance-Decreasing Attacks
2019 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Increased use of global satellite navigation systems (GNSS), for applications such as autonomous vehicles, intelligent transportationsystems and drones, heightens security concerns. Civil GNSS signals are vulnerable to notably spoofing and replayattacks. To counter such attacks, cryptographic methods are developed: Navigation Message Authentication (NMA) is onesuch scheme, about to be deployed for Galileo E1 Open Service (OS); it allows receivers to verify the signal origin andprotects navigation message integrity. However, NMA signals cannot fully thwart replay attacks, which do not require forgingnavigation messages. Classic replay attacks, e.g, meaconing, retransmit previously recorded signals without any modification,thus highly limiting the capacity of the adversary. Distance-decreasing (DD) attacks are a strong type of replay attack,allowing fine-grained individual pseudorange manipulation in real time. Moreover, DD attacks counterbalance processing andtransmission delays induced by adversary, by virtue of shifting earlier in time the perceived (relayed) signal arrival; thusshortening the pseudorange measurements. In this paper, we first analyze how DD attacks can harm the Galileo E1 OSNMAservice assuming the adversary has no prior information on the navigation message. Moreover,we propose a DD attackdetection method based on a Goodness of Fit test on the prompt correlator outputs of the victim. The results show that themethod can detect the DD attacks even when the receiver has locked to the DD signals.

Place, publisher, year, edition, pages
Miami, Florida: , 2019
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-265517 (URN)10.33012/2019.17114 (DOI)000568618904007 ()2-s2.0-85075269802 (Scopus ID)
Conference
Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019)
Note

QC  20191212

Available from: 2019-12-12 Created: 2019-12-12 Last updated: 2022-06-26Bibliographically approved
6. Protecting GNSS-based Services using Time Offset Validation
Open this publication in new window or tab >>Protecting GNSS-based Services using Time Offset Validation
2020 (English)In: 2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, 2020, p. 575-583Conference paper, Published paper (Refereed)
Abstract [en]

Global navigation satellite systems (GNSS) provide pervasive accurate positioning and timing services for a large gamut of applications, from Time based One-Time Passwords (TOPT), to power grid and cellular systems. However, there can be security concerns for the applications due to the vulnerability of GNSS. It is important to observe that GNSS receivers are components of platforms, in principle having rich connectivity to different network infrastructures. Of particular interest is the access to a variety of timing sources, as those can be used to validate GNSS-provided location and time. Therefore, we consider off-the-shelf platforms and how to detect if the GNSS receiver is attacked or not, by cross-checking the GNSS time and time from other available sources. First, we survey different technologies to analyze their availability, accuracy and trustworthiness for time synchronization. Then, we propose a validation approach for absolute and relative time. Moreover, we design a framework and experimental setup for the evaluation of the results. Attacks can be detected based on WiFi supplied time when the adversary shifts the GNSS provided time, more than 23.942 μs; with Network Time Protocol (NTP) supplied time when the adversary-induced shift is more than 2.046 ms. Consequently, the proposal significantly limits the capability of an adversary to manipulate the victim GNSS receiver.

National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-280850 (URN)10.1109/PLANS46316.2020.9110224 (DOI)000839298400066 ()2-s2.0-85087051578 (Scopus ID)
Conference
2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, Portland, OR, United States of America, 20 April - 23 April 2020
Note

Part of ISBN 978-172810244-3

QC 20230921

Available from: 2020-09-14 Created: 2020-09-14 Last updated: 2025-03-17Bibliographically approved
7. Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
Open this publication in new window or tab >>Protecting GNSS Open Service-Navigation Message Authentication against Distance-Decreasing Attacks
(English)Manuscript (preprint) (Other academic)
Abstract [en]

As the security of global navigation satellite systems(GNSS) for civilian usage is becoming increasingly important,navigation message authentication is to significantly improveresilience to spoofing attacks. However, not all attacks can beeffectively countered: a strong variant of replay/relay attacks,distance-decreasing (DD) attacks, can shorten pseudorange mea-surements, without manipulating the cryptographically protectednavigation message, thus manipulating the positiion, velocity, andtime solution undetected. First, we discuss how DD attacks cantamper with GNSS signals, demonstrating the attack effectivenesson a recorded Galileo signal. DD attacks might introduce biterrors to the forged signals, but the adversary can keep this errorrate very low with proper attack parameter settings. Then, basedon our mathematical model of the prompt correlator outputof the tracking phase at the victim receiver, we find that thecorrelator output distribution changes in presence of DD attacks.This leads us to apply hypothesis testing to detect the DD attacks,notably a Goodness of Fit (GoF) test and a generalized likelihoodratio test (GLRT), depending on the victim’s knowledge on theDD attacks. Monte Carlo simulations are used to evaluate thedetection probability and the receiver operating characteristic(ROC) curves for two tests, for different adversary configurationand noise settings. Then, we evaluate the effectiveness of the twotests with a synthesized DD signal. The results show that bothtests can detect DD attacks with similar performance in highsignal-to-noise ratio (SNR) environments. The GLRT detectionprobability is approximately20%higher than that of the GoFtest in low SNR environments

National Category
Signal Processing Communication Systems
Identifiers
urn:nbn:se:kth:diva-281254 (URN)
Note

QC 20200917

Available from: 2020-09-16 Created: 2020-09-16 Last updated: 2022-06-25Bibliographically approved
8. Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers
Open this publication in new window or tab >>Fast Multiple Fault Detection and Exclusion (FM-FDE) Algorithm for Standalone GNSS Receivers
2021 (English)In: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 2, p. 217-234Article in journal, News item (Refereed) Published
Abstract [en]

Numerous applications and devices use Global Navigation Satellite System (GNSS)-provided position, velocity and time (PVT)information. However, unintentional interference and intentional attacks render GNSS-provided information unreliable. ReceiverAutonomous Integrity Monitoring (RAIM) is considered an effective and lightweight protection method when a subset of the availablesatellite measurements is affected. However, the conventional RAIM Fault Detection and Exclusion (FDE), exhaustive iterative searchto exclude faulty signals, can be expensive when there are many potential faults, especially so for multi-constellation GNSS receiversoperating in the presence of several faulty signals. Therefore, we propose a fast multiple fault detection and exclusion (FM-FDE)algorithm, to detect and exclude multiple faults for both single and multi-constellation receivers. The novelty is FM-FDE caneffectively exclude faults withouta lengthy iterative search on candidate fault signals. FM-FDE calculates position distances of anysubset pairs with (3+P) measurements, where P is the number of constellations. Then, the algorithm utilizes statistical testing toexamine the distances, identifies faulty measurements and further excludes them from the computation of the final PVT solution. Weevaluate FM-FDE with synthesized faulty measurements added to a collected data set; the results show that FM-FDE is faster thanconventional Solution Separation (SS) FDE when the number of faults is larger than 3 in a single constellation receiver. Moreover,FM-FDE is much faster when the number of faults is larger than 2 in a GPS-Galileo receiver, when both constellation contains faultymeasurements. The trade-off is that FM-FDE slightly degrades performance in terms of misdetection and false alarm probabilities,compared to the conventional SS FDE.

Place, publisher, year, edition, pages
IEEE Communications Society, 2021
National Category
Control Engineering Communication Systems Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-281255 (URN)10.1109/OJCOMS.2021.3050333 (DOI)2-s2.0-85122047981 (Scopus ID)
Note

QC 20200917

Available from: 2020-09-16 Created: 2020-09-16 Last updated: 2022-06-25Bibliographically approved

Open Access in DiVA

fulltext(1589 kB)960 downloads
File information
File name FULLTEXT01.pdfFile size 1589 kBChecksum SHA-512
ae1e4f7b31f6d223dd8dbb3f670faf67f723491238afb07996b5a49a6c24d84d446b47aa6f3375240904fecc14e214fbe09efa3ff618df40c6a30231cae89df7
Type fulltextMimetype application/pdf

Other links

online defense link

Authority records

Zhang, Kewei

Search in DiVA

By author/editor
Zhang, Kewei
By organisation
Software and Computer systems, SCS
Communication SystemsComputer SystemsOther Electrical Engineering, Electronic Engineering, Information EngineeringSignal ProcessingGeotechnical Engineering and Engineering Geology

Search outside of DiVA

GoogleGoogle Scholar
Total: 962 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

isbn
urn-nbn

Altmetric score

isbn
urn-nbn
Total: 1297 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf