Developing Defenses Against Jamming & Spoofing of Civilian

advertisement
Developing Defenses Against
Jamming & Spoofing of Civilian
GNSS Receivers
Mark L. Psiaki
Sibley School of Mechanical & Aerospace Engr.,
Cornell University
ION/GNSS 2011, 23 Sept. 2011
Approach of an Estimation Theorist:
Reductionist Problem Solving
Problem Givens:




Spoofers & jammers will be deployed against civilian GNSS
receivers (mostly GPS at present)
GNSS signal structures will not be modified to aid defenses
Likely jammers can be bought & studied
Likely spoofers can be designed/imagined/modeled
Strategies for Developing Defenses:

Jamming:



Acquire, examine, test, & characterize jammers
Design detection, localization, & mitigation systems for known jammers
(like computer anti-virus software)
Spoofing:

Exploit encrypted military signals & known timing/phasing relative to
defended civilian signals
ION/GNSS Sept. ‘11
2 of 11
Jamming Mitigation Strategies

Detection & localization

Deploy networked array of advanced GNSS receivers in defended region



Detection & localization strategies








Simultaneous frequency/time excision
Pose as Kalman-filter-based estimation problem & near/far signal reception problem
Requisite information:


Solve layered sequence of problems
1st detect
2nd rough-locate based on power at several nodes, simple algorithms
3rd fine-locate based on multi-node carrier-phase interferometry or TDOA to within meters –
exploit fine-scale correlations between multiple nodes & precise inter-receiver timing from GPS
4th interdict
Develop scalable algorithms with potential to deal with 100 or more jammers simultaneously
Receiver-based mitigation


Each node is small phased-array; beam steering allows GPS tracking under jamming
Example: on every New Jersey State police car near Newark Airport
Jammer time/frequency models enable efficient/accurate detection & localization
Generalized model-independent detection, localization, & mitigation for
new/unknown jammer types

Like computer anti-virus software that looks for unknown viruses based on suspicious
characteristics/behavior
ION/GNSS Sept. ‘11
3 of 11
Power & Spectral Time Evolution of a CigaretteLighter-Type Jammer *
*
from Mitch et al. “Signal Characteristics of Civil GPS Jammers”, ION/GNSS 2011
ION/GNSS Sept. ‘11
4 of 11
Jammer Effective Ranges from Attenuation Tests *
Faraday
Box
Signal
Combiner
*
GPS
Signal
Simulator
Victim
Receiver
from Mitch et al. “Signal Characteristics of Civil GPS Jammers”, ION/GNSS 2011
ION/GNSS Sept. ‘11
5 of 11
Future Issues in Jammer Detection &
Localization

How can one exploit frequency-sawtooth
structure of many known low-budget jammers
… in detection?
… in fine localization?
… in receiver mitigation? (Kalman-filter-based
coupled time/frequency excision?)
… in an environment with many such jammers?
ION/GNSS Sept. ‘11
6 of 11
Spoofing Detection via P(Y) Correlation *
GPS Satellite
Broadcast segments
of delayed, digitallysigned P(Y) features
Secure uplink of
delayed, digitallysigned P(Y) features
Transmitter of delayed,
digitally-signed P(Y)
features
UE with
- receiver for delayed,
digitally-signed P(Y)
features
- delayed processing
to detect spoofing
via P(Y) feature
correlation
*
GEO “bent-pipe”
transceiver
Secure antenna/receiver
w/processing to estimate
P(Y) features (or a single
antenna or a distributed
set of single-antennas)
from Psiaki et al. “Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals”, ION/GNSS 2011
ION/GNSS Sept. ‘11
7 of 11
Block Diagram of Generalized P(Y)
Correlation Spoofing Detector
UE receiver with
P(Y)fea extraction
processing
Correlation
registers
Spoofing
Detector
P(Y)fea
Digital signature verifier
User
Equipment
GPS
transmitter
P(Y)fea/est
UE receiver (or internet
link) for P(Y)fea
L1 C/A
& P(Y)
Secure
ground- P(Y)
Digital
Secure link to
fea
based
signer
broadcaster
antenna/
receiver
New Infrastructure
ION/GNSS Sept. ‘11
Wireless
(or internet)
broadcaster
8 of 11
Early Codeless Spoofing Attack Detection *
14
12
Successful determination that PRN
23 remains reliable because solid
turquoise detection statistic never
crosses below dashed brown threshold
Onset of spoofing attack
10
gamma
s
8
6
4
2
0
Successful detection of PRN 13
spoofing when solid blue detection
statistic cross below dashed green threshold
PRN 13 gamma detection statistic
PRN 13 predicted gamma mean
PRN 13 spoofing detection threshold
-2
PRN 23 gamma detection statistic
PRN 23 predicted gamma mean
-4
0
*
Build-up of significant spoofed
C/A code-phase error
PRN 23 spoofing detection threshold
50
100
150
Ithaca Receiver Time (sec)
200
250
from Psiaki et al. “Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals”, ION/GNSS 2011
ION/GNSS Sept. ‘11
9 of 11
Early Semi-Codeless Spoofing Attack Detection *
400
gamma detection statistic
Onset of spoofing attack
predicted gamma mean
350
spoofing detection threshold
a priori predicted gamma mean
a priori spoofing detection threshold
300
gamma
s
250
200
150
100
50
0
Successful detection of spoofing
when dashed green threshold crosses
above solid blue detection statistic
Build-up of significant spoofed
C/A code-phase error
-50
0
*
50
100
150
Receiver A Time (sec)
200
250
from Psiaki et al. “Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals”, ION/GNSS 2011
ION/GNSS Sept. ‘11
10 of 11
Future Issues in Defense Against Spoofing
Attack

Real-time implementation



Infrastructure





Sophisticated attack may seek to use pseudo- or estimated P(Y) code
Gaming analysis may guide designs that detect new attack types
Other signals



Capable & secure reference receivers
Help from military (declassify segments of P(Y) shortly after broadcast?)
Comm. infrastructure to transmit P(Y) data between receivers
Defense against alternate attack scenarios


Codeless possible in 6-12 months w/internet transmission
Semi-codeless needs improved algorithmic efficiency for real-time ops
M-code to defend GPS civilian codes
Encrypted Galileo signals to defend open-source Galileo codes
Post-detection receiver actions
ION/GNSS Sept. ‘11
11 of 11
Download