GPS and Solar Radio Burst Forensics Brady O`Hanlon, Paul Kintner

advertisement
GPS Spoofing Detection System
Mark Psiaki & Brady O’Hanlon, Cornell Univ., Todd Humphreys & Jahshan Bhatti, Univ. of Texas at Austin
Abstract:
Challenges
A real-time method for detecting GPS spoofing in a
narrow-bandwidth civilian GPS receiver is being developed. It is
needed in order to detect malicious spoofed signals that seek to
deceive a C/A-code civilian GPS receiver regarding its position or
time. The ability to detect a spoofing attack is important to the
reliability of systems ranging from cell-phone towers, the power grid,
and commercial fishing monitors. The spoofing detector mixes and
accumulates base-band quadrature channel samples from two
receivers, one a secure reference receiver, and the other the
defended User Equipment (UE) receiver. The resulting statistic
detects the presence or absence of the encrypted P(Y) code that
should be present in both signals in the absence of spoofing.
Trusted
Receiver
π/2
Additional
C/A code
processing
L1 RF
Front end
Internet link
Carrier replica
generator
UE Receiver
Needing Spoofing
Detection
Solutions
• Use known, tracked civilian C/A code and known relationships
between C/A and P(Y) code to guide correlation times and
expected signal levels
• Analyze narrow-band filter power losses and distortion
• Develop signal detection statistical analysis to design reasonable
accumulation intervals
• Use semi-codeless detection techniques by estimating W antispoofing bits in reference receiver and transmitting only those to
UE
• Broadcast spoofing detection data over internet in real-time
• Encrypted military P(Y) signal necessitates squaring
operations and SNR loss
• Wide bandwidth of P(Y) code causes 75-80% power
loss, further degrading SNR, and significant
waveform distortions in narrow-band civilian receiver
• Bandwidth of communications link from trusted
reference receiver to defended UE receiver
• Constrained real-time signal processing capabilities
in low-power UE receiver
feedback
P(Y) code crosscorrelation
π/2
L1 RF
Front end
Codeless Detection Statistical Analysis
• Normalized detection statistic:
M
Additional
C/A code
processing
Sampled,
quantized
data at IF
Carrier replica
generator
 RFA  RFB
feedback
Tcorr Δt (C/ N 0) A (C/ N 0) B
 2
1  2 Δt (C/ N 0) A
1  2 Δt (C/ N 0) A  (C/ N 0) B 
 
1  2 Δt (C/ N 0) A
10
gamma
Predicted Mean Value
based on C/A code
• Detection threshold and probability of detection:
Spoofing Detection Threshold,
PFA = 0.01%, Pdetect = 99.9999999999972%'
gamma, (Normalized Spoofing Detection Stat)
12
PRN 12 predicted mean value
based on C/A code
Onset of
spoofing attack
0.05
PRN 02 (unspoofed)
detection statistic
Successful
Verification of lack
of Spoofing
for PRN 02
10
8
6
4
Successful
Spoofing Detection
for PRN 12
2
0
PRN 02 Spoofing Detection
Threshold, P FA = 0.01%,
P detect = 99.99999999972%
-2
PRN 12 Spoofing Detection
Threshold, P FA = 0.01%,
P detect = 96.6673%
before spoofing event
P detect = 99.99999999953%
before spoofing event
P detect = 99.9939% after event
-4
0
20
60
80
100
120
Time (sec)
Figure 4. Codeless detection of a spoofing attack.
140
160
180
Sure +1/-1 W Chips
Expected W Chips in range -1 to +1
0.03
0.02
0.01
0
-1
0
Time (microsec)
1
Figure 5. Comparison of 2 semi-codeless detection
statistics, case of no spoofing.
 th


 th
 th


Pdetect   p( | H1)d   N ( ;0,1)d
150
0.04
-0.01
-2
PRN 12 (spoofed)
Detection Statistic
after event
40
100
Time (sec)
Figure 3. Codeless verification of no spoofing.
Normalized UE Receiver Correlation
PRN02 predicted mean value
based on C/A code
50
 th
   p( | H 0 )d   N ( ;  ,  )d
5
14
M
1  2 Δt (C/N 0 ) A 
4
• Predicted mean and variance absent spoofing:
15
Figure 2. Hardware & profile of a spoofing attack.
i 1
 
Figure 1. Spoofing detection receiver architecture.
0
0
 y rawAi y rawBi
2
Results & Conclusions
• Narrow-band-filtered P(Y) code useful for spoofing
detection
• 20-25% of P(Y) power suffices to detect spoofing
• Spoofing detection threshold analysis requires
characterization of power loss
• W-bits semi-codeless detection requires distortion
model
• Codeless & semi-codeless techniques both work
• Successful codeless detection of real spoofing
attack (first ever demonstration) with 1.2 sec
detection interval
• Semi-codeless detection intervals as short as 0.1
sec possible.
• Needed Efforts
• Modest UE receiver modifications for after-the-fact
detection
• Significant modifications for real-time detection
• Establishment of reference station network or
intermittent after-the-fact W-bits declassification
Download