Secure Navigation and Timing Without Local Storage of Secret Keys



Similar documents
Secure Navigation and Authentication. Sherman Lo November 2008

GNSS integrity monitoring for the detection and mitigation of interference

Practical Cryptographic Civil GPS Signal Authentication

Detection Strategy for Cryptographic GNSS Anti-Spoofing

GPS SPOOFING. Low-cost GPS simulator. HUANG Lin, YANG Qing Unicorn Team Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd.

How To Understand And Understand The Power Of A Cdma/Ds System

3. Designed for installation by the user without further substantial support by the supplier; and

White Paper Assured PNT Inside Military Ground Vehicles Using D3

Problems of Security in Ad Hoc Sensor Network

A DATA AUTHENTICATION SOLUTION OF ADS-B SYSTEM BASED ON X.509 CERTIFICATE

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Security and protection of digital images by using watermarking methods

PATRIOTWATCHTM PATRIOTSHIELDTM PATRIOTSWORDTM

Client Server Registration Protocol

CDMA Technology : Principles of CDMA/DS Decoding

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Security Goals Services

A Model-based Methodology for Developing Secure VoIP Systems

PNT Evolution: Future Benefits and Policy Issues. Scott Pace Director, Space Policy Institute George Washington University Washington, D.C.

Privacy and Security in library RFID Issues, Practices and Architecture

Attestation and Authentication Protocols Using the TPM

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Authentication requirement Authentication function MAC Hash function Security of

European best practices in safe transport of dangerous material supported by GNSS

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CONNECT PROTECT SECURE. Communication, Networking and Security Solutions for Defense

CRYPTOGRAPHY IN NETWORK SECURITY

Think GPS Offers High Security? Think Again!

Rafael Lucas EUROPEAN SPACE AGENCY.

Revision of Lecture Eighteen

GEOGRAPHIC INFORMATION SYSTEMS Lecture 21: The Global Positioning System

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Demystifying Wireless for Real-World Measurement Applications

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

VoteID 2011 Internet Voting System with Cast as Intended Verification

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

GNSS MONITORING NETWORKS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Radio Technical Commission for Maritime Services. GPS Update. Bob Markle RTCM Arlington, VA USA. NMEA Convention & Expo 2010

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Propsim enabled Aerospace, Satellite and Airborne Radio System Testing

U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer

Biometrics and Cyber Security

CSC 774 Advanced Network Security. Outline. Related Work

CS263: Wireless Communications and Sensor Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Technologies for PRS Receivers

Agilent Technologies E7475A GSM Drive-Test System Product Overview

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

Strengthen RFID Tags Security Using New Data Structure

Keeping SCADA Networks Open and Secure DNP3 Security

GENERAL INFORMATION ON GNSS AUGMENTATION SYSTEMS

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

Apogee Series. > > Motion Compensation and Data Georeferencing. > > Smooth Workflow. Mobile Mapping. > > Precise Trajectory and Direct Georeferencing

GNSS Anti-Jam Technology for the Mass Market

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Department of Homeland Security (DHS) GPS Interference Detection and Mitigation (IDM) Program

GPS Jamming Quantifying the Threat

LW2702/2902: FREQUENTLY ASKED QUESTIONS

Intrusion Detection for Mobile Ad Hoc Networks

Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio

Message Authentication Codes

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Pervasive Computing und. Informationssicherheit

Design and Implementation of an Open Ended Automated Vault Security System

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Randomized Hashing for Digital Signatures

ITL BULLETIN FOR AUGUST 2012

Wireless Sensor Networks Chapter 14: Security in WSNs

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Message Authentication

Propagation Channel Emulator ECP_V3

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities

TABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii xvii

Recommended Wireless Local Area Network Architecture

PFP Technology White Paper

Application Intrusion Detection

Presentation Outline. The NavSAS group; Examples of Software-Radio Technology in GNSS;

Single Sign-On Secure Authentication Password Mechanism

CHAPTER 1 INTRODUCTION

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Common Pitfalls in Cryptography for Software Developers. OWASP AppSec Israel July The OWASP Foundation

Transcription:

Ph.D. Defense The University of Texas at Austin 9 April 2014 Secure Navigation and Timing Without Local Storage of Secret Keys Kyle D. Wesson Committee Dr. Todd E. Humphreys (supervisor) Dr. Brian L. Evans (co-supervisor) Dr. Ross Baldick Dr. Lili Qiu Dr. Ahmed H. Tewfik

GNSS: The Invisible Utility 2 Introduction GNSS GPS, GLONASS, Galileo, Compass/Beidou Sectors Agriculture, Automation, Communication, Defense, Energy, Finance, Safety, Transportation Applications Position, Navigation, and Timing (PNT)

Civil GPS is Vulnerable to Spoofing 3 Introduction An open access civil GPS standard makes GPS popular but also renders it vulnerable to spoofing [HumLed&08]

4 Inside a Spoofing Attack

Spoofing Field Attacks 5 Introduction Civilian UAV, June 2012 $80M Yacht, July 2013 White Sands Missile Range, NM Mediterranean Sea UAV commanded to hover at 12 m Yacht sailed straight Spoofer at 620 m standoff distance Spoofer at 3 m standoff distance 1 m/s spoofer-induced descent Yacht veered off course 10 degrees Saved from crash by manual override Instantaneous capture without alarms [KerShe&14] [BhaHum14]

Military GPS: Symmetric-Key Encryption 6 Introduction Advantages Near real-time authentication Exclusive user group Low computational cost to decrypt Disadvantages Burdensome key management Tamper resistant hardware Trusted foundries increase cost Expensive, inconvenient receivers [USAF]

Thesis Statement 7 Introduction Both cryptographic and non-cryptographic anti-spoofing techniques can secure civil GPS and GNSS navigation and timing while avoiding the serious drawbacks of local storage of secret cryptographic keys that hinder military symmetric-key-based anti-spoofing.

theory policy technology Contributions: Secure Navigation and Timing Without Local Storage of Secret Keys 8 Introduction Probabilistic Anti-Spoofing Framework Explain insufficiency of traditional data authentication Establish necessary security checks across network layers GPS Spoofing Detection via Composite Hypothesis Testing Explain and exploit power distortion tradeoff Illustrate composite hypothesis testing strategy against simulated and experimental data Asymmetric Cryptographic GNSS Signal Authentication Develop backward compatible authentication scheme Propose practical and effective strategy to embed public key signature in GPS L2 or L5 CNAV message Case Study: Secure Navigation for Aviation [for closed door session due to time constraints]

9 First Contribution Probabilistic Anti-Spoofing Security Framework

Data Message Authentication 10 First Contribution Data message authentication predicated on Performing brute-force search for secret key Reversing one-way hash functions U.S. NIST measures cryptographic security in years [FIPS 186-3] 128-bit symmetric-key-equivalent key strength secure beyond year 2030 [WesEva&13] Takeaway:

Security-Enhanced GPS Signal Model 11 First Contribution Received spread spectrum signal Automatic gain control Spreading code Carrier Security code with period Generalization of binary modulating sequence Either fully encrypted or contains periodic authentication codes Unpredictable prior to broadcast Cryptographically verifiable after broadcast [WesRot&12], [Hum12]

Attacking Security-Enhanced GPS Signals 12 First Contribution 1. Record and Playback or Meaconing : record and re-broadcast radio frequency spectrum re-broadcast with delay and amplitude authentic signal 2. Security Code Estimation and Replay (SCER) Attack: estimate security code in real-time security code estimate can vary per satellite authentic signal [WesRot&12], [Hum12]

Can Authenticate GNSS Signals? 13 First Contribution Consider a replay attack where spoofer has significant amplitude advantage But! Spoofer-induced delay undetectable Spoofer need not read or manipulate data to deceive receiver cannot authenticate GNSS signals because it cannot authenticate signal arrival time!

Authentication Components (1/2) 14 First Contribution Timing Consistency Check Security Code Estimation and Replay (SCER) Detector Hypothesis test on difference between received and predicted code phase of spreading code Hypothesis test at physical layer to detect if security code arrived intact and promptly relative to local clock [WesRot&11] [Hum11]

spoofed un-spoofed Authentication Components (2/2) 15 First Contribution Total In-Band Power Monitor Statistical Distortion Monitor Hypothesis test on measured power Can ensure SCER detector operating assumption that Statistical measure of deviations caused by interaction of authentic and spoofing signals Recorded next to MOPAC/183 [Bha13] [WesEva&13]

Probabilistic Anti-Spoofing Framework 16 First Contribution Measurement combines cryptographic & non-cryptographic checks Extensible to multiple hypotheses (multipath, spoofing, jamming, ) Challenges deriving closed form differentiating between hypotheses (multipath vs. spoofing) Subsequent contributions illustrate framework for practical cryptographic and non-cryptographic techniques

17 Second Contribution GPS Spoofing Detection via Composite Hypothesis Testing

Non-Cryptographic Anti-Spoofing Overview 18 Second Contribution Non-cryptographic techniques are enticing because they require no modification to GPS signal Non-Cryptographic Method Extra Hardware False Alarm Rate Requires Motion Increase Size Addnl. Signals 1 In-Band Power No High No No No Med 2 Sensor Diversity Yes Low No No Yes High 3 4 Single-Antenna Spatial Correlation Correlation Profile Anomaly Detection Yes Low Yes No No High No High No No No Med 5 Multi-Element Antenna Yes Low No No No High Effectiveness 6 Distributed Antennas Yes Low No Yes No Med 1- [Sco10], [DehNie&12], [Ako12]; 2- [HumBha&10]; 3- [BroJaf&12], [PsiPow&13]; 4- [Phe01], [LedBen&10], [MubDem10], [CavMot&10], [WesShe&11], [WesShe&12], [GamMot&13]; 5- [DeLGau&05], [Bor13]; 6- [MonHum&09], [SwaHar13]

Receiver Measurements 19 Second Contribution Total In-Band Power Measurement Symmetric Difference Measurement [WesHum&14] [WesEva&13]

total in-band power [db] Key Insight: Power Distortion Tradeoff 20 Second Contribution Admixture of authentic and spoofed signals causes distortions in correlation function Assume spoofer cannot null or block authentic signals Consider spoofer s power advantage Successful capture requires What happens as [She12]? AGC maintains ensures distortion

Composite Hypothesis Testing 21 Second Contribution How do we decide between hypotheses given? How do we represent uncertainty in interference model?

Parameter Space for Single-Interferer 22 Second Contribution hypothesis multipath spoofing narrowband jamming

total in-band Power power [db] [db] Simulated Observation Space 23 Second Contribution jamming spoofing clean multipath distortion

Simulated Observation Space 24 Second Contribution Weighted marginals of simulated probability space reveal difficulty of detection based on distortion or power alone clean multipath spoofing jamming

TEXBAT Experimental Data 25 Second Contribution 1. ATX wardriving campaign, 2010 Static and dynamic tests in deep urban multipath environments 2. Jammer characterization, 2011 [MitDou&11] 18 personal privacy device recordings 3. Texas Spoofing Test Battery, 2012 [HumBha&12] Only publicly-available spoofing dataset [Lim03]

Experimental Observation Space 26 Second Contribution jamming spoofing (ds2-6) clean (cs,cd) multipath baseline spoofing distortion (ds1)

total in-band power [db] Decision Regions and Performance 27 Second Contribution Attack detection within three seconds and (overall attack vs. no-attack metrics) Allows for time-varying cost and prior probabilities distortion clean multipath spoofing jamming

28 Third Contribution Asymmetric Cryptographic Signal Authentication

Cryptographic Anti-Spoofing Overview 29 Third Contribution Techniques require unpredictable bits Recall: security code in securityenhanced signal model Cryptographic Anti-Spoofing Technique Effectiveness Auth. Rate Network Conn. Implement Time 1 Sec. Spread Code (L1C/A) High Seconds No Years No 2 Sec. Spread Code (WAAS) Low Seconds No Years No 3 Nav. Msg. Auth. (L2/L5) Med. Seconds No Years Yes 4 Nav. Msg. Auth. (WAAS) Low Minutes No Years Yes 5 Cross Correlation of P(Y) High Seconds Yes Months Yes 6 Military GPS P(Y) Signal High Real-time No Implemented No Practical for Civil? [HeiKne&07B]; 1- [Sco03]; 2- [LoEng10]; 3- [Sco03], [PozWul&04] [WulPoz&05], [WesShe&12], [Hum13]; 4- [LoEng10]; 5- [PsiHan&12], [PsiOha13]; 6- [BarBet&06]

NMA on GPS L2/L5 CNAV 30 Third Contribution Signature every five minutes per channel Delivers 476 bits Meets GPS L2/L5 CNAV broadcast requirements First half of Elliptic Curve Digital Signature and cryptographic salt Second half of Elliptic Curve Digital Signature and cryptographic salt [WesRot&12]

How to Authenticate NMA Signals? Code Timing Authentication Code Origin Authentication Sub-Optimal Metrics 31 Standard Receiver [WesRot&12]

How Effective is this Proposed Defense? 32 Third Contribution Challenging SCER attack Spoofer has 3 db carrier-tonoise ratio advantage Received spoofed signals 1.1 times stronger than authentic signals Spoofer introduces timing error of 1 μs False alarm probability for SCER detector is 0.0001 NMA is highly effective [WesRot&12]

theory policy technology Secure Navigation and Timing Without Local Storage of Secret Keys 33 Conclusion Probabilistic Anti-Spoofing Framework Explain insufficiency of traditional data authentication Establish necessary security checks across network layers GPS Spoofing Detection via Composite Hypothesis Testing Explain and exploit power distortion tradeoff Illustrate composite hypothesis testing strategy against simulated and experimental data Asymmetric Cryptographic GNSS Signal Authentication Develop backward compatible authentication scheme Propose practical and effective strategy to embed public key signature in GPS L2 or L5 CNAV message Case Study: Secure Navigation for Aviation [for closed door session due to time constraints]