SlideShare a Scribd company logo
1 of 12
Download to read offline
Best practices for
secure PNT
management in a
multi-vendor
environment
3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran
WSTS, March 13-16, Vancouver, BC
2023 © ADTRAN, INC.
2
What’s the cost of GNSS/PNT service disruption?
$1B/day in economic cost*
*source: RTI & NIST 2019
Finance
Communications
Power grids
Transportation
Data centers
All supported by
PNT threats
GPS & US critical infrastructure under national security threats
2023 © ADTRAN, INC.
3
*US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES
Federal* resilient PNT service requirements
Finance
Power Grid
Communications
Data Centers
Transportation
According to RTI & NIST cost of PNT disruption is $1B /Day
• Focus
• On Timing as it enables P & N
• Protect
• Critical gov/industry infrastructure against PNT services disruption from
GNSS & network timing attacks - GPS/GNSS is a single point of failure
• Deploy
• Resilient, multisource & self survivable PNT assurance systems
• Target
• Critical infrastructure sectors under national security threats
• Use
• Published PNT assurance guidelines & standard in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1)
• IEEE P1952 Resilient PNT UE working group
aPNT - assured Positioning, Navigation & Timing
2023 © ADTRAN, INC.
4
Five secure PNT assurance management principles
1) DHS Resilient PNT guideline specifies the use of
multiple sources vs. a user’s risk profile
2) NIST zero-trust PNT source strategy: “never trust,
always verify”
3) For secure PNT services, GNSS is a single point of
failure & needs 1 or more backup sources
4) Secure, resilient & assured PNT needs six 9’s reliability
5) In a multi-vendor network environment, secure PNT can
only be achieved with a vendor-agnostic GNSS
assurance system
2023 © ADTRAN, INC.
5
GNSS vulnerabilities and threats
GNSS for
timing
Jamming and
spoofing
Environmental
obstructions
Interference with
transmitters at
adjacent bands
ionospheric
disturbance,
solar activity
GNSS disturbances Multiple threat agents
2023 © ADTRAN, INC.
6
How to protect millions of GNSS in use worldwide?
Finance
Power Grid
Communications
Data Centers
Transportation
GNSS timing receiver
PNT threats
2023 © ADTRAN, INC.
7
Zero-trust multi-source PNT management architecture
control + visibility+ assurance + scalability + redundancy
detection + verification + backup + mitigation
multisource
monitoring/
management
PNT threats
AI-based PNT assurance platform
2023 © ADTRAN, INC.
8
VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION
AI-based centralized sync assurance
Key functionality
• Visualization of network-wide sync distribution routes
• Visualization of device-level internal timing topology
• Intelligent sync network health indicators and sync performance
reports
• Probing of device-level clock references
• Remote PTP clients monitoring
• Vendor-agnostic GNSS assurance with AI-based threat detection
and mitigation settings
2023 © ADTRAN, INC.
9
AI-based GNSS observables and assurance
Data metrics from GNSS receiver’s API
• Location
• Latitude
• Longitude
• Altitude
• Satellites data
• SV
• Carrier to Noise
• Health
• Azimuth and Elevation
• AGC
AI-based vendor-agnostic analytics from all GNSS
receivers across the network for GNSS assurance
AI-based GNSS
threat detection
2023 © ADTRAN, INC.
10
AI-based GNSS site analysis and performance monitoring
AI-based detection of local
GNSS reception issues
2023 © ADTRAN, INC.
11
AI-based vendor-agnostic GNSS receiver assurance
AI-based threat detection and mitigation capabilities
• Real-time monitoring of GNSS observables
from all the GNSS receivers in the network
• Real-time analysis of relevant data from all
the GNSS receivers in the network
• AI/ML-based algorithms to detect, alert and
mitigate GNSS attacks and vulnerabilities
• Automatic re-routing of synchronization
references across the network for sync
assurance
Key requirements
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
Vendor-agnostic GNSS
receiver assurance system
AI-based GNSS
threat detection
Thank you!

More Related Content

Similar to Best practices for secure PNT management in a multi vendor environment

First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
sarancbe2002
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 

Similar to Best practices for secure PNT management in a multi vendor environment (20)

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
SEDRP
SEDRPSEDRP
SEDRP
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

More from Adtran

More from Adtran (17)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
 

Recently uploaded

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Best practices for secure PNT management in a multi vendor environment

  • 1. Best practices for secure PNT management in a multi-vendor environment 3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran WSTS, March 13-16, Vancouver, BC
  • 2. 2023 © ADTRAN, INC. 2 What’s the cost of GNSS/PNT service disruption? $1B/day in economic cost* *source: RTI & NIST 2019 Finance Communications Power grids Transportation Data centers All supported by PNT threats GPS & US critical infrastructure under national security threats
  • 3. 2023 © ADTRAN, INC. 3 *US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES Federal* resilient PNT service requirements Finance Power Grid Communications Data Centers Transportation According to RTI & NIST cost of PNT disruption is $1B /Day • Focus • On Timing as it enables P & N • Protect • Critical gov/industry infrastructure against PNT services disruption from GNSS & network timing attacks - GPS/GNSS is a single point of failure • Deploy • Resilient, multisource & self survivable PNT assurance systems • Target • Critical infrastructure sectors under national security threats • Use • Published PNT assurance guidelines & standard in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1) • IEEE P1952 Resilient PNT UE working group aPNT - assured Positioning, Navigation & Timing
  • 4. 2023 © ADTRAN, INC. 4 Five secure PNT assurance management principles 1) DHS Resilient PNT guideline specifies the use of multiple sources vs. a user’s risk profile 2) NIST zero-trust PNT source strategy: “never trust, always verify” 3) For secure PNT services, GNSS is a single point of failure & needs 1 or more backup sources 4) Secure, resilient & assured PNT needs six 9’s reliability 5) In a multi-vendor network environment, secure PNT can only be achieved with a vendor-agnostic GNSS assurance system
  • 5. 2023 © ADTRAN, INC. 5 GNSS vulnerabilities and threats GNSS for timing Jamming and spoofing Environmental obstructions Interference with transmitters at adjacent bands ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 6. 2023 © ADTRAN, INC. 6 How to protect millions of GNSS in use worldwide? Finance Power Grid Communications Data Centers Transportation GNSS timing receiver PNT threats
  • 7. 2023 © ADTRAN, INC. 7 Zero-trust multi-source PNT management architecture control + visibility+ assurance + scalability + redundancy detection + verification + backup + mitigation multisource monitoring/ management PNT threats AI-based PNT assurance platform
  • 8. 2023 © ADTRAN, INC. 8 VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION AI-based centralized sync assurance Key functionality • Visualization of network-wide sync distribution routes • Visualization of device-level internal timing topology • Intelligent sync network health indicators and sync performance reports • Probing of device-level clock references • Remote PTP clients monitoring • Vendor-agnostic GNSS assurance with AI-based threat detection and mitigation settings
  • 9. 2023 © ADTRAN, INC. 9 AI-based GNSS observables and assurance Data metrics from GNSS receiver’s API • Location • Latitude • Longitude • Altitude • Satellites data • SV • Carrier to Noise • Health • Azimuth and Elevation • AGC AI-based vendor-agnostic analytics from all GNSS receivers across the network for GNSS assurance AI-based GNSS threat detection
  • 10. 2023 © ADTRAN, INC. 10 AI-based GNSS site analysis and performance monitoring AI-based detection of local GNSS reception issues
  • 11. 2023 © ADTRAN, INC. 11 AI-based vendor-agnostic GNSS receiver assurance AI-based threat detection and mitigation capabilities • Real-time monitoring of GNSS observables from all the GNSS receivers in the network • Real-time analysis of relevant data from all the GNSS receivers in the network • AI/ML-based algorithms to detect, alert and mitigate GNSS attacks and vulnerabilities • Automatic re-routing of synchronization references across the network for sync assurance Key requirements GNSS Receiver GNSS Receiver GNSS Receiver GNSS Receiver Vendor-agnostic GNSS receiver assurance system AI-based GNSS threat detection