MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS,...

35
Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 1 MGA Webinar Series : 5 Threats to GNSS : Can We Falsify GPS Data? Dinesh Manandhar Center for Spatial Information Science The University of Tokyo Contact Information: [email protected] 22 nd June 2018

Transcript of MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS,...

Page 1: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 1

MGA Webinar Series : 5Threats to GNSS : Can We Falsify GPS Data?

Dinesh ManandharCenter for Spatial Information Science

The University of Tokyo

Contact Information: [email protected]

22nd June 2018

Page 2: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 2

Webinar Information• Webinar ID : MGA Webinar # 5

• Webinar Topic : • Threats to GNSS : Can We Falsify GPS Data?

• Date : • 22nd June 2018 Friday, Time : 18:00 (JST) 09:00 (UTC)

• Duration : 45min + 15min (Q/A)

• Resource Person : • Dinesh Manandhar, Associate Professor, The University of Tokyo

• Registration : https://gnss.peatix.com

• Further Information: • http://www.csis.u-tokyo.ac.jp/~dinesh/WEBINAR.htm

Page 3: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 3

Threat Types

• Intentional Threats• Interference, Jamming, Spoofing and Meaconing

• Non-Intentional Threats• Interference, Jamming

• Interference from Cell-towers

• Natural Threats• Solar Flares, Sun Spots (Space Weather)

• Impact on Satellite Orbit

In this webinar, we discuss about SPOOFING Threats

Page 4: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 4

Background Information : GPS Signal Structure900 Phase Reverse

L1 Carrier, 1575.42Mhz

C / A Code, 1.023Mhz

P Code, 10.23Mhz

Navigation Data, 50Hz L1 Band GPS Signal

X1, Clock

10.23Mhz

x154

x1/10

x1/204600

Page 5: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 5

Block Diagram of GPS Receiver

Pre-AmpLNA

Down Converter

A/D ConverterBaseband Signal

Processing

Frequency Generator

Oscillator

AGC

Acquisition

Tracking

Navigation Data

Position Output

Antenna

GPS Signal

Page 6: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 6

How does GPS Signal Look Like?

0 0.005 0.01 0.015 0.02 0.025 0.03 0.035-5

-4

-3

-2

-1

0

1

2

3

4

5

6

Time Domain Plot of IF Data

File: JAX_LIV.dat

Time (ms)

Am

plit

ude

Time-domain Plot of GPS IF Signal

-5 -4 -3 -2 -1 0 1 2 3 4 50

2000

4000

6000

8000

10000

12000

14000

16000

Histogram of IF Data

File: JAX_LIV.dat

Bin Value

Num

ber

of

Sam

ple

s in a

Bin

Histogram of GPS IF Signal

0 2 4 6 8 10 12

-25

-20

-15

-10

-5

0

5

10

15

Frequency (MHz)M

agnitude,

dB

Frequency Domain Plot of IF Data

File: JAX_LIV.datFrequency-domain Plot of GPS IF Signal (Fourier Transform)

Acquisition of GPS L1C/A Signal with Low Noise Acquisition of GPS L1C/A Signal with Higher Noise

Page 7: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 7

Why is GPS Signal So Vulnerable?

• The signal is extremely weak• It is below the thermal noise of the receiver,-111dBm

• No signal protection scheme is implemented • except P(Y) code, military use signal

• Signal specifications are open to everyone

• Even new signals do not have protection plans against spoofing

• QZSS Signal is also equally vulnerable as GPS signal• QZSS signals are almost the same as GPS signals

• JIS devices are commercially available off-the-shelfJIS: Jamming, Interference & Spoofing

Page 8: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 8

GPS Signal Power: How Strong or How Weak?

• GPS satellites are about 22,000km away

• Transmit power is about 30W

• This power when received at the receiver is reduced by 1016 times. • The power reduces by 1/distance2

• This is similar to seeing a 30W bulb 22,000Km far

• GPS signals in the receiver is about 10-16 Watt, which is below the thermal noise

30Watt

10-16 Watt

Page 9: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 9

GPS Signal Power: How Strong or How Weak?

• GPS Signal Power at Receiver• -130dBm or -160dBW

• Thermal Noise Power• Defined by kTeffB, where

• K = 1.380658e-23JK-1, Boltzman Constant• Teff = 362.95, for Room temperature in Kelvin at 290

• Teff is effective Temperature based on Frii’s formula

• B = 2.046MHz, Signal bandwidth

• Thermal Noise Power = -110dBm for 2MHz bandwidth• If Bandwidth is narrow, 50Hz

• Noise Power = -156dBm

Page 10: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 10

GPS Signal Power

Noise Level -111dBm

GPS Signal Level -130dBm

GPS Signal power level is below the thermal noise level of the system. Hence, it is not possible to measure GPS signal level without demodulation (de-spreading).

GPS Signal is hidden inside Thermal Noise due to Spread Spectrum

Page 11: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 11

Power of GPS Signal vs. Other SignalsSignal Type Power (based on calculations, not measured)

Watt dBW dBmMobile Phone

Handset TX Power *1W 0dBW 30dBm

RX Power at Mobile Phone Handset*

100e-6W -40dBW -70dBm

ZigBee 316e-16W -115dBW -85dBm

VHF 200e-16W -137dBW -107dBm

Thermal Noise 79e-16W -141dBW -111dBm

GPS** 1e-16W -160dBW -130dBm

• * Actual power values will differ. These are just for comparison purpose• ** GPS Signals are hidden under the noise. Thus, it can’t be measured directly

e.g. using a Spectrum Analyzer

Ab

ove

N

ois

eB

elo

w

No

ise

Page 12: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 12

Impact on Signal Processing due to Noise or Interference Signal PRN 13

Integration Time : 1msPRN 13

Integration Time : 3msPRN 13

Integration Time : 6ms

PRN 22Integration Time : 1ms

PRN 22Integration Time : 3ms

PRN 22Integration Time : 6ms

PRN 3Integration Time : 1ms

PRN 3Integration Time : 3ms

PRN 3Integration Time : 6ms

Presence of high level noiseThis requires longer integration of dataMore processing power

Presence of noise

Very small noise

Page 13: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 13

GPS Spoofing

Page 14: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 14

Quiz : Can You Trust GPS Position & Time Data?

Yes, You can……But Need to Verify

Because of Spoofing Issues

11:26:28 PM

Page 15: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 15

What is Location Spoofing?

• Falsify Location Data as If it were True Location

Where is it? Tokyo or Hawaii?

TOKYOHAWAII

TOKYOOr

Hawaii?

Spoofer

James Bond’s Tomorrow Never Dies movie is all about GPS

Spoofing by using a Spy Satellite to

broadcast GPS like spoof signal.

Page 16: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 16

Why SPOOFING is Dangerouscompared to Interference & Jamming?

Spoofing Jamming and Interference

IntentionalIntentional and Non-Intentional

Difficult to Detect Can be Detected

Available of Service but Lead to False Position Data

Denial of Service

No Effective Solution forExisting Signals

Many Solutions Exist

Fewer Research and Studies Many Research and Studies

Page 17: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 17

Software-Based GPS Signal Generator (Spoofer?)

Ephemeris DataRINEX File

Generate Signal

User Motion Data

Static or Dynamic

Select Visible

Satellites

Simulation Date, Time and Duration

Antenna Gain

Pattern

Adjust Signal Output Power

Digital Signal Properties

(Sampling Freq, Bit Rate, IF etc)

Digital I/Q Signal

Output

Software

Digital to Analog(D/A) Conversion

Transmit Signal

Hardware

Signal GenerationDigital IQ

Signal

Digital IQ Signal

fs = 26MHzA/D = 12bit

GPS L1C/Af = 1575.42MHz

Page 18: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 18

SPOOFing a Car: Is he driving the car?

Page 19: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 19

GPS Spoofing in Black Sea?24th June 2017A GPS spoofing attack in June, involving over 20 vessels in the Black Sea, has been reported. Probably the first official record of spoofing. More……….

https://www.rin.org.uk/newsitem/4969/GPS-Spoofing-in-Black-Sea

Black Sea

Page 20: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 20

No Ships

shall Enter

this Zone

for Fishing

Exclusion Zone

Fishing Vessels might be Spoofed !

Based on JRC Technical notes: Report on Authentication in Fisheries Monitoring

AB

Vessel B approaches Vessel A

A

The Spoofing System is disabled.

Vessel A and Vessel B takes

normal route to go to their

destinations.

B

AB

Vessel B setup the Spoofing

System for Vessel A.

Vessel A uses Vessel B’s

Coordinates A

B

Vessel A enters Exclusion Zone

but it Transmits Vessel B’s

Coordinates.

So, the Authority sees Vessel A

at the location of Vessel B.

A

Page 21: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 21

Drug Traffickers Are Spoofing Border Drones: DHS, USA

http://www.defenseone.com/technology/2015/12/DHS-Drug-Traffickers-Spoofing-Border-Drones/124613/

DHS: Department of Homelands Security, USA

Page 22: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 22

US Defense Bill 2018: Use GPS with Galileo and QZSS to Improve Accuracy and

ResiliencyThe House and Senate agreed Wednesday on the final National Defense Authorization Act (NDAA) for 2018. It included at least two provisions of interest to our readers:SEC. 1606. DEMONSTRATION OF BACKUP AND COMPLEMENTARY POSITIONING, NAVIGATION, AND TIMING CAPABILITIES OF GLOBAL POSITIONING SYSTEM - Requires the Departments of Defense, Transportation and Homeland Security to conduct a $10M technology demonstration/ proof of concept for a GPS backup system. This demonstration is to be based upon information gathered from a requirements and alternatives analysis study mandated by last year's NDAA.SEC. 1607. ENHANCEMENT OF POSITIONING, NAVIGATION, AND TIMING CAPACITY - Requires the Secretary of Defense to ensure DoD receivers incorporate Europe's Galileo and Japan's QZSS satellite signals along side GPS in order to improve accuracy and resiliency. It also directs the secretary to assess use of non-allied satellite navigation in DoD receivers.

Published on 10th NOV 2017

Page 23: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 23

US President Signs Law Requiring GPS Backup Demo

Source: https://www.congress.gov/bill/115th-congress/house-bill/2810/text

QZSS could be a part of GPS back-up system for Resiliency

Became Public Law No: 115-91, 12/12/2017

Page 24: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 24

GPS Spoofing Poses Risk of Future HavocGPS 'Spoofing' is No Joke: Dangers of GPS Data Hacking Realized

GNSS spoofing will attain virus status, warns expert– GPS World

Hacking Global Positioning System with GPS ‘Spoofing’ Can Lead To Fatalitieshttp://www.techworm.net/2016/11/gps-spoofing-dangers-gps-data-hacking.html

Dangers of GPS spoofing and hacking for location based services

Faking of GPS Data a growing and potentially lethal danger – The Japan Times, FB

Page 25: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 25

GPS Tracking is Illegal without Warrant: Japan Supreme Court Ruling

15th March 2017

New rules might be implemented to make GPS tracking legal with warrant.

But, there is also fear of GPS Signal Spoofing.

Page 26: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 26

Why Authentication is Necessary ?

Importance of Authentication

Insurance

Pay-As-You-Drive

Toll Fee ADAS

ITS

Auto-Driving

IoT

M2M

V2V / V2XSecured Transport of Dangerous

Goods

Alternate for Fuel Tax

Collection

Geo-Fencing

Geo-Security

Page 27: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 27

Spoofing MethodsSelf-Spoofing

Connect by cableReal Signal Absent

Self-SpoofingConnect by cable

Real Signal Present

Self or 3rd Party SpoofingOver the air transmission

Page 28: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 28

Experiment Setup to Test GPS Spoofing

GNSS Signal Generator

ATT

GNSS Antenna

SPOOFER

PC

GPSReceiver

Attenuator0 – 30dB

SPOOFER

Attenuator

Signal Combiner

Live GPS Signal from

Antenna GPS Receiver

Page 29: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 29

Online Spoofing Demo

Page 30: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 30

Examples of TRUE signal and SPOOF SignalPower Spectrum of IF Data

TRUE Signal SPOOF Signal during the Attack Period

Page 31: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 31

Examples of TRUE signal and SPOOF SignalTime Series IF Data, I & Q Channels

Page 32: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 32

Examples of TRUE signal and SPOOF SignalHistogram of IF Data, I & Q Channels

Page 33: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 33

Examples of TRUE signal and Very Strong SPOOF SignalPower Spectrum, Time Series and Histogram of IF Data

Page 34: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 34

We will cover Anti-Spoof Solutions in the next webinar

Page 35: MGA Webinar Series : 5 Threats to GNSS : Can We …dinesh/WEBINAR_files/...Dinesh Manandhar, CSIS, The University of Tokyo, dinesh@iis.u-tokyo.ac.jp 1 MGA Webinar Series : 5 Threats

Dinesh Manandhar, CSIS, The University of Tokyo, [email protected] 35

Additional Information

Please visit websitesFor Webinar: http://www.csis.u-tokyo.ac.jp/~dinesh/WEBINAR.htm

https://gnss.peatix.com

Contact:

[email protected]