GNSS integrity monitoring for the detection and mitigation of interference



Similar documents
Secure Navigation and Authentication. Sherman Lo November 2008

GENERAL INFORMATION ON GNSS AUGMENTATION SYSTEMS

GNSS MONITORING NETWORKS

INTEGRITY AND CONTINUITY ANALYSIS OCTOBER TO DECEMBER 2013 QUARTERLY REPORT FROM GPS. Integrity and Continuity Analysis 08/01/14 08/01/14 08/01/14

Rafael Lucas EUROPEAN SPACE AGENCY.

Secure Navigation and Timing Without Local Storage of Secret Keys

GPS Jamming Quantifying the Threat

Radio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010

RAIM for Ship and Rig Management

Bi-Directional DGPS for Range Safety Applications

GEOGRAPHIC INFORMATION SYSTEMS Lecture 21: The Global Positioning System


Título ponencia: GBAS Concept

Alberding GNSS data management & monitoring tools

Post Processing Service

Enabling RTK-like positioning offshore using the global VERIPOS GNSS network. Pieter Toor GNSS Technology Manager

GPS Jamming Threat Scenarios CGSIC 2013 Nashville. Prof. Charles Curry BEng, CEng, FIET Managing Director Chronos Technology Ltd

MSAS current status. Japan Civil Aviation Bureau S TSAT A ATELLITE-BASED S UGMENTATION. MTSAT Satellite-based Augmentation System

Günter Seeber. Satellite Geodesy 2nd completely revised and extended edition

GPS Use in U.S. Critical Infrastructure. and Emergency Communications. Presented to the

International Global Navigation Satellite Systems Service

Doc 9849 AN/457. Approved by the Secretary General and published under his authority. First Edition International Civil Aviation Organization

General GPS Antenna Information APPLICATION NOTE

EVOLUTION AND INDUSTRIALIZATION OF A SBAS REAL-TIME PERFORMANCE MONITORING TOOL (EVORA)

GPS Forensics Crime, Jamming & Spoofing. Professor David Last

Maritime Integrated PNT System

White Paper Assured PNT Inside Military Ground Vehicles Using D3

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Introduction into Real-Time Network Adjustment with Geo++ GNSMART

The Applanix SmartBase TM Software for Improved Robustness, Accuracy, and Productivity of Mobile Mapping and Positioning

Think GPS Offers High Security? Think Again!

CDMA Technology : Pr. S. Flament Pr. Dr. W. sk On line Course on CDMA Technology

INTERNATIONAL CIVIL AVIATION ORGANIZATION GUIDE FOR GROUND BASED AUGMENTATION SYSTEM IMPLEMENTATION

GAGAN-FOP/PMR-05. Indian SBAS System - GAGAN

Monitoring the position integrity in road transport localization based services

VULNERABILITY ASSESSMENT OF THE TRANSPORTATION INFRASTRUCTURE RELYING ON THE GLOBAL POSITIONING SYSTEM. Final Report

Global Positioning System

System Aware Cyber Security

Briefing Note: Evolution from Loran-C to eloran

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform

GPS Precise Point Positioning with a Difference*

Securing GNSS with PTP & SyncE Adam Wertheimer Microsemi Adam.Wertheimer@microsemi.com. Power Matters

Agenda. Agilent GPS Receiver Test Solutions. GPS technology concepts. Basic tests required for GPS receiver verification Test solutions

Internet-Based Satellite Navigation Receivers using EGNOS: the ESA SISNET Project

Remote Calibration of a GPS Timing Receiver to UTC(NIST) via the Internet*

A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing

How To Understand Gate

European best practices in safe transport of dangerous material supported by GNSS

SYSTEM GLOBAL NAVIGATION SATELLITE SYSTEM LANDING TECHNOLOGY/PRODUCT DEVELOPMENT

Robot Perception Continued

EUTERPE - EUROPEAN TEST CENTRE FOR RECEIVER PERFORMANCE EVALUATION

PDHonline Course L105 (12 PDH) GPS Surveying. Instructor: Jan Van Sickle, P.L.S. PDH Online PDH Center

Experiences in positioning and sensor network applications with Ultra Wide Band technology

Vehicle and Object Tracking Based on GPS and GSM

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies

GNSS Anti-Jam Technology for the Mass Market

A totally SDR-based Low Cost Augmentation System for Institutional Applications

National Cybersecurity & Communications Integration Center (NCCIC)

CAR/SAM STRATEGY FOR THE EVOLUTION OF AIR NAVIGATION SYSTEMS

A GPS Digital Phased Array Antenna and Receiver

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Global Positioning System (GPS) Automated Vehicle Location (AVL) Geographic Information System (GIS) and Routing/Scheduling System

OPTICAL CLOCKS IN FUTURE GLOBAL NAVIGATION SATELLITES

European Position Determination System. Guidelines For Cross- Border Data Exchange

Satellite Monitoring as a Legal Compliance Tool in the Environment Sector. Case Study Four: The Global Positioning System and Waste Tracking

Presentation Outline. The NavSAS group; Examples of Software-Radio Technology in GNSS;

Engineers from Geodetics select KVH for versatile high-performance inertial sensors. White Paper. kvh.com

Prediction of DDoS Attack Scheme

Greg Keel P.Eng. Parallel Geo Services

How To Build An Integrated Navigation System

Threats of Ionosphere on GNSS an general overview of CIGALA and CALIBRA Projects

GPS SPOOFING. Low-cost GPS simulator. HUANG Lin, YANG Qing Unicorn Team Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd.

Augmentation of Low Cost GPS Receivers via Web Services and Wireless Mobile Devices

Doppler Traffic Flow Sensor For Traveler Information Systems. October,

GAGAN - The Indian satellite based augmentation system

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities

Evaluation for Cargo Tracking Systems in Railroad Transportation

Tracking IRNSS Satellites. for Multi-GNSS Positioning in Finland

EPN, seminar AFIS, september 2013 Instrument approach procedures, PBN, GNSS

WAAS Performance Analysis Report October 2005 WIDE-AREA AUGMENTATION SYSTEM PERFORMANCE ANALYSIS REPORT. Report #14

Propagation Channel Emulator ECP_V3

CELL PHONE TRACKING. Index. Purpose. Description. Relevance for Large Scale Events. Options. Technologies. Impacts. Integration potential

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

Development of GBAS Ionosphere Anomaly Monitor Standards to Support Category III Operations

MULTI-GNSS DEMONTRATION CAMPAIGN IN ASIA OCEANIA REGION

Alberding DGNSS solutions for inland waterways

DFS Deutsche Flugsicherung GmbH

Antennas & Propagation. CS 6710 Spring 2010 Rajmohan Rajaraman

To facilitate the trials, MagicSBAS

Transcription:

GNSS integrity monitoring for the detection and mitigation of interference Dr. Shaojun Feng Centre for Transport Studies

Outline GNSS vulnerability GNSS integrity monitoring Cases study GAARDIAN ERAIM Conclusions

GNSS Vulnerability Technical barriers in system design >20000km Radio Signal Data Code Carrier Power~50w Amplitude Phase Power ~ -158dBW Lower than thermal noise?

Vulnerability disturbances GNSS signal Amplitude Phase Power~50w interference Power~ -158dBW

Vulnerability Cause interference with GNSS PRN code Real signal (Reflected, retransmitted) NLOS signal ( lower signal strength) Multipath signal (resulting higher or lower signal strength) Shadowing (lower signal strength) Faked signal (e.g. spoofing, Simulator) Signal strength higher or lower than nominal strength

Vulnerability Cause interference without GNSS PRN code Interference frequency Out-band In-band Types Narrow-band-limited Gaussian interference Wide-band-limited Gaussian interference Continuous-wave interference Pulsed interference Light-Squared-like interference Characteristics Time stationary and time varying Power level

Impact of interference to a GNSS receiver Denial of service e.g. jamming Degraded performance e.g. outband radio Deceived e.g. spoofing Clear evidence of threats acknowledged by (e.g.) the Royal Academy of Engineering, UK Volpe National Transportation System Centre, DOT USA Department of Homeland Security, USA

Impact of interference to Critical GNSS applications Safety (e.g. aircraft navigation, emergence service) Liability ( e.g. GNSS based road charging) Security Mobile network synchronization Theft (jamming GNSS based tracking assets) Terrorist (spoofing attack on aircraft) Motivation of jamming and spoofing Fun Criminal / terrorist Commercial Privacy protection Others

Examples of inteference San Diego US Navy ship Newark airport $33, 200mW GPS jammer University of Texas experiment Performed spoofing attack successfully

Integrity of a navigation system Trust navigation system? System integrity trust placed on the correctness of navigation solution- key safety parameter for aviation navigation system required to deliver a warning (an alarm) of any malfunction (i.e. alarm limit exceeded) to users within a given period of time (time-to-alarm) and with a given probability (1- integrity risk).

Integrity Monitoring of GNSS System level Global Signal-in-Space (SIS) Network Level Satellite Based Augmentation System (SBAS) Wide area SIS + Ionosphere Ground Based Augmentation System (GBAS) Local area SIS + Ionosphere + troposphere User level Receiver Autonomous Integrity Monitoring User location SIS + Ionosphere + troposphere + multipath All these methods are not designed for interference

Interference detection and mitigation measures Independent monitoring Purposes Situational awareness Law enforcement Set up independent monitoring network New monitoring network Upgrade existing monitoring network Define communication protocol/channels Broadcast to users Receiver / User level Signal processing based Solutions based Multiple sensors based

An independent monitoring approach- GAARDIAN GNSS Availability, Accuracy, Reliability and Integrity Assessment for timing and Navigation capture and definition of user requirements for wide-range of applications focus on intelligent integrity monitoring

Overall GAARDIAN Architecture PROBE ICL+UoB monitors ICL Monitor Range/geometry error Event decision algorithm UoB Monitor SNR error GAARDIAN Probe Flag SV if NAV - orbit/clock error Flag Event info (e.g. SV & error type) checksum... GAARDIAN Server SERVER Quality of Service Inputs from all probes Scope of event (local, regional, global) Error type (as far as feasible) SV monitor NAV message: validate most recent message at server using NAV files from OS network and IGS Ultra Rapid orbits Clock Step error detector Clock Ramp/Acceleration error detector Ionosphere monitor (proof-of-concept only) Ionosphere-induced delays from OS data Not for real-time implementation Internet User Flag requested info about event (e.g. SV & error type) RINEX Navigation Files & Ultra Rapid orbit and clock prediction files IGS Server Dual-frequency data from OS stations OS Server

Monitoring network

GAARDIAN Probe Using atomic clock Placed in a known position Comparison of computed and surveyed positions Integrity of ranging signals flag satellites aid failure identification Output set of metrics user-configurable thresholds intelligent data reduction enable users to decide whether LBS can be provided for their application

GAARDIAN Server Two components: space-segment health monitor (SSHM) network-domain monitoring (NDM) SSHM inputs from real-time data from OS stations monitors early detection of space segment failures (user range errors) metric to detect ramp errors using time differential carrier phase outputs: status of visible satellites» estimated performance» monitoring level NDM inputs from network of probe integrity monitors qualifies type of failure for each satellite enables users to determine (according to threshold) whether LBS is supported QoS

Example Result

A user level monitoring approach- ERAIM Receiver Autonomous Integrity Monitoring (RAIM) Based on pseudorange measurement Based on consistency check One failure assumption Conventional RAIM Achieved a certain level of success e.g. NPA Incapable in the presence of interference multiple failures consistent multiple failures (e.g. spoofing)

Matrix of spoofer characteristics A. Signal retransmission B. Signal record and playback C. General signal generator D. GNSS signal simulator E. Modified pesudolite F. Dedicated spoofer I. Height of transmitter antenna II. III. IV. Sparse distribution of transmitter Distance between transmitter and receiver Synchronization with real signal V. Knowledge of targeted receiver VI. VII. Multiple PRNs Attack scheme A B C D E F Real I Low Low Low Low Low Low High II No No No No Possible Possible Yes III Short Short Short Short Short Short Long IV Almost No No No Yes Yes NA V No No No location No location No VI Yes Yes Yes Yes Possible Yes Yes VII Stronger signal Stronger signal Stronger signal Jamming before spoofing Stronger signal Hide, fool and attack NA

Extended RAIM (ERAIM)

Normalised SNR model Example Results The hide-fool-attack scheme is taken as an example for testing. The signal strengths of theoretical and measured are used to generate a SNR model and factor respectively (Fig. left). It is therefore used to detect potential spoofing (Fig. right). 1.1 1 0.9 0.8 0.7 0.6 0.5 SNR Factor Upper threshold Lower threshold Model 0.4 0 0.5 1 1.5 2 Samples ( in model ascending order) x 10 4

Conclusions GNSS is vulnerable There are challenges in the detection and mitigation of interference Integrity monitoring targeting interference at both network and user level are necessary GAARDIAN Architecture implemented shown to be successful Offline testing successfully show GAARDIAN performs as required ERAIM The spoofing can not be perfect RAIM needs to be extended to include angle of arrival, signal strength and Doppler measurements. ERAIM can effectively detect most malicious interference spoofing.

Thank you for your attention More information http://www3.imperial.ac.uk/geomatics