Secure Navigation and Authentication. Sherman Lo November 2008



Similar documents
GNSS integrity monitoring for the detection and mitigation of interference

Secure Navigation and Timing Without Local Storage of Secret Keys

GENERAL INFORMATION ON GNSS AUGMENTATION SYSTEMS

RAIM for Ship and Rig Management


IEEE C /88 An Alternative Approach for Enhancing Security of WMANs using Physical Layer Encryption

CS263: Wireless Communications and Sensor Networks


Secure Location Verification

Zuverlässige Navigation für die Luftfahrt. Boubeker Belabbas Institute of Communications and Navigation

SPINS: Security Protocols for Sensor Networks

SYSTEM GLOBAL NAVIGATION SATELLITE SYSTEM LANDING TECHNOLOGY/PRODUCT DEVELOPMENT

ASI Agenzia Spaziale Italiana Galileo Workshop Roma 26/07/2012. Alessandro Pozzobon, Project Manager & Co-founder Qascom

Rafael Lucas EUROPEAN SPACE AGENCY.

Security Sensor Network. Biswajit panja

GPS Forensics Crime, Jamming & Spoofing. Professor David Last

CDMA Technology : Pr. S. Flament Pr. Dr. W. sk On line Course on CDMA Technology

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

GPS SPOOFING. Low-cost GPS simulator. HUANG Lin, YANG Qing Unicorn Team Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd.

Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform

Wireless Network Security Spring 2014

Midterm. Name: Andrew user id:

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

3. Designed for installation by the user without further substantial support by the supplier; and

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Problems of Security in Ad Hoc Sensor Network

Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

Bit Chat: A Peer-to-Peer Instant Messenger

Network Security Protocols

A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Privacy and Security in library RFID Issues, Practices and Architecture

FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SFTP (Secure File Transfer Protocol)

Client Server Registration Protocol

Savitribai Phule Pune University

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Modeling a GPS Receiver Using SystemC

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

SSL A discussion of the Secure Socket Layer

Message Authentication Codes

Secure Tracking using Trusted GNSS Receivers and Galileo Authentication Services

PICKPOCKETING MWALLETS. A guide to looting mobile financial services

CDMA Technology : Principles of CDMA/DS Decoding

Maritime Integrated PNT System

CS155. Cryptography Overview

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

How To Make A Multi-User Communication Efficient

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Clocking. Clocking in the Digital Network

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

An Introduction to Cryptography as Applied to the Smart Grid

Overview. SSL Cryptography Overview CHAPTER 1

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Information Security

Development of BeiDou Navigation Satellite System

Computer Networks - CS132/EECS148 - Spring

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CRYPTOGRAPHY IN NETWORK SECURITY

OPNET Network Simulator

An Anti-DoS Attacks Protocol for Satellite Networks Take COMPASS for Instance

Public Key Cryptography Overview

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

European best practices in safe transport of dangerous material supported by GNSS

CSC 774 Advanced Network Security. Outline. Related Work

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

Radio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010

Introduction to Computer Security

MSAS current status. Japan Civil Aviation Bureau S TSAT A ATELLITE-BASED S UGMENTATION. MTSAT Satellite-based Augmentation System

ERserver. iseries. Secure Sockets Layer (SSL)

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Observer Analyzer Provides In-Depth Management

Metrics for Detection of DDoS Attacks

In the first part of the talk, some common location-based security vulnerabilities will be presented. In the second part, the state-of-the-art

Título ponencia: GBAS Concept

CAR/SAM STRATEGY FOR THE EVOLUTION OF AIR NAVIGATION SYSTEMS

Chapter 6 CDMA/802.11i

5. Security in the IPN

VoteID 2011 Internet Voting System with Cast as Intended Verification

MACs Message authentication and integrity. Table of contents

Security Architecture Whitepaper

Briefing Note: Evolution from Loran-C to eloran

Keeping SCADA Networks Open and Secure DNP3 Security

Chapter 37. Secure Networks

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Transcription:

Secure Navigation and Authentication Sherman Lo November 2008 1

Outline Motivating Authentication Proposed techniques for authentication Source authentication Cross checking My research 2

GNSS: Position, Navigation & Time 3

How do I know it is right??pizza? I m hungry! 4

Authentication: What is it & Why? GPS (and GNSS) being increasingly used for vital applications Safety: aviation Infrastructure: timing for cellular, power grid Asset tracking & location Creates strong incentives to spoof Reasons: Financial, Terrorism Transport of valuable, dangerous material Emergency response, geo fencing Road tolls, taxi fare, & other financial transactions using navigation information Current civil signal easy to generate Authentication is the ability to verify the navigation signal s source or content 5

Need for Location Assurance Location Assurance is important in many applications Valuable Goods/Asset Tracking Emergency Response Road Tolling Any app with significant or $ tied to location!!!!!!? 6

Incentive for Self Spoofing 7

GNSS (and Navigation) as a security tool Position as Security Security of Position First responders Auto tolling Cargo access Route auditing Content Control Marine Fishery Management Cargo delivery Route auditing 8

Spoofing civil GPS signals is quite feasible GPS Satellite Constellation GPS RF Simulator = Humphreys, IONGNSS 2008 9

Future Signals have Encryption for Restricted Users 10

Some Techniques 1. Data Authentication Message contains unforgeable hash of information that verifies it has not been changed Encryption key used to verify source 2. Public spreading code Relies on GNSS signal below noise & difficult to extract Delayed release of spreading code means not spoofable a priori/immediately 3. Private spreading code Uses secret key that is never revealed Requires secure receiver 1-3 still source data authentication Verify source generated the info & that it has not been altered Limit possible potential delay (hence spoofing) 4. Consistency checks of location related information 11

Classifying Proposed Techniques Hidden info revealed later TESLA (symmetric key authentication) Public Spreading Code Requires some time synchronization Hidden info revealed never Digital signatures (asymmetric key authentication) Military service: W code, M code Galileo PRS Private Spreading Code Info hidden info for each sat cannot be extracted, no time sync is needed Position dependent properties Different properties are observed at different locations (can determine this a priori) May be possible but difficult 12

1. Data Authentication Techniques Digitally signed hash Asymmetric key based Private key signs hash Validated by public key & msg hash MAC Tag generated using msg and key Difficult for attacker to generate valid msg, tag pair without key Symmetric key is more efficient (data, computation) HASH Tx Msg(s) Rx Msg(s) HASH 0F53A DB1B2 0F53A DB1B2 =? 0F53A DB1B2 Tx Msg(s) Tx Msg(s) Rx Msg(s) MAC Algo SIGN (Encrypt) 1C5A5 4D9E7 VERIFY (Decrypt) MAC Algo Tx MAC Rx MAC =? MAC Out Transmitter Private Key Transmitter Public Key Symmetric Key 13

Signed Hash Msg M 1. Msg M n Msg A 1. Msg A m Msg M 1. Msg M n Msg A 1. Msg A m Time [A 1 A m ]= SIG K (HASH([M 1 M n ] )) Authentication accomplished by checking that the signed (with private key K) of hash of messages is correct User has public key (requires key distribution) With signature, data cannot be easily spoofed Delay is incurred Must wait n+m messages to verify message M 1 Elliptic Curve allows for greater data & computational efficiency 14

Basic TESLA tag m = MAC ( data m key m ) data 2 key 1 tag 2 data 3 key 2 tag 3 data n Key n-1 tag n Verify Yes/No MAC tag TESLA uses time (delayed key disclosure) to achieve the asymmetry property required for secure broadcast authentication Kuhn (2004), Wullems, et. al. (2005) proposed its use Developed for networks Send data & hash, later reveal key to check that the data Creates time window where spoofer cannot generate valid msg Key checked with based key using one way hash functions If n hashes of key n = base key, then key is from valid source 15

TESLA F(K i ) F(K i+1 ) F(K i+2 ) F(K i+3 ) K i-1 K i K i+2 Ki+1 F (K i ) F (K i+1 ) F (K i+2 ) F (K i+3 ) K i-1 K i K i+1 K i+2 Interval i-1 Interval i Interval i+1 Interval i+2 time M i-1 M i M i+1 M i+2 P j P j+1 P j+2 P j+3 K i-2 K i-1 K i K i+1 MAC(M i-1, K i-1 ) MAC(M i, K i ) MAC(M i+1, K i+1 ) MAC(M i+2, K i+2 ) P i-1 P i P i+1 P i+2 Pre-compute a sequence of key values using one-way hash functions or pseudo-random functions. K n-1 = F(K n ),, K 1 = F(K 2 ) Use another hash function to compute K. K i = F (K i ) Generate MAC using K and Message M Send packet P. P i = <M i, K i-d, MAC i > Distribute key K 0 via secure means (check K i are from same source) 16

Authentication Strength and MAC Length Strength of authentication depends on choice of hash functions and bits used Hash Function Hash Length (bits) Effective Strength (bits) Time to break* MD4 128 20 <1 sec MD5 128 32 1 sec SHA1 160 69 34 years SHA256 256 128 10 19 years * $100K Hardware brute-force attack SHA 1 now 63 bits 17

Strength of MAC Time from today (years) 0 12 18 24 Time to break SHA1 34 years 1.6 months 3 days 4.5 hrs Time to break SHA256 10 19 years 4x10 16 years 2.4x10 15 years 1.5x10 14 years Table of strength vs. time to crack above (give year) + Projection in 12 years (Moore s law 2^8) Strength is limited by the length of the authentication data 18

2. Public Spreading Code Known PRN code Unknown PRN code Data 1 SC 1 Data N SC N SC Info Dig Sig SC 1 SC 2 SC N X Verify that signal is there & consistent Time Scott (2003), Kuhn (2004) Spreading code segments stored until code revealed Segments are transmitted at same time from each SV (overlap) Not spoofable until spreading code info is revealed Time window dictates how synchronized the clock must be 19

3. Private Spreading Code Known PRN code Unknown PRN code Data 1 SC 1 PSC 1 Data N SC N PSC N SC Info Dig Sig PSC 1 SC 2 PSC N X Verify that signal/info is there & consistent Time Secure Module Similar to Military codes Implementation above is based on Scott (2003) Limits some vulnerabilities of public spreading code but also retains some Other ways to implement 20

4. Authentication through Information Consistency Doppler and other location measures Difficult to spoof wide area & replicate Loran and other ground based nav systems have many other measures Multisystem measurements: GNSS, ground transmitters (DTV, Loran), INS, etc. 21

Consistency Checks Example: Doppler Aircraft can check Doppler with expected value since tx and user location is known However, spoofer can add doppler to affect 22

Current Civilian Authentication Constrain transmission CAT II/III Requirements Development: Modifications to GBAS for VDB Authentication Presented July 2008 by Tim Murphy Cross check measurements or info content RAIM, AIME & other navigation related information Checking consistency of measurements not spoofing Data authentication is still not common 23

Example: VDB Authentication Proposal Cat III Subgroup July 2008 24

VDB Authentication Goals Pilot identifies RPI (ref path id) first char identifies 1 to 8 (SSID of gnd station) using Type 4 message matches approach plate Type 2 message give slot group def (SGP) which identifies slot of msg of the GS Broadcast in the slot indicated by SSID Prevents spoofing to open slots Does not prevent overpowering GS or turning off GS and spoofing If Type 4 or Type 2 msg hijacked, then spoofer can operate without interference 25

Securing Loran and Using Loran to Secure GPS Jammer GPS Non-stationary satellites High absolute accuracy High repeatable accuracy Global coverage Low SNR Easy to jam and spoof Indoor NOT capable Data channel Loran Stationary transmitters Low absolute accuracy High Repeatable accuracy Northern hemisphere High SNR Hard to jam and spoof Indoor capable Data channel (e-loran) 26

Thoughts Secure navigation info & authentication will become increasingly important Navigation and GNSS becomes more important in economy and people s lives Techniques do exist for authentication Difficult to build into satellite Must work easily within current infrastructure Solution not requiring sat changes more likely/rapid Receiver/ground based processing Very possible to provide strong authentication With secure navigation, can use location to enable or strengthen various applications discussed Valuable asset management, road tolling, emergency response, many others 27