SlideShare a Scribd company logo

Protecting third-party timing receivers from cyberattacks with trusted networkwide GNSS assurance

ADVA
ADVA

Our Ensemble Sync Director GNSS assurance is now vendor-agnostic, providing resilient and assured PNT for more customers than ever before. Network operators now have the power to remotely detect issues with GNSS receivers from any vendor, helping to maintain high-quality timing performance, avoid disruptions and reduce operating costs.

1 of 13
Protecting third-party timing receivers from cyberattacks
with trusted networkwide GNSS assurance
Robust PNT services with AI-powered analysis of all GNSS assurance data
© 2022 ADVA. All rights reserved.
2
Which applications are using GNSS for timing ?
Radio access
networks
Highly accurate phase and frequency
synchronization for efficient use of spectrum
Migration from NTP- to PTP-based timing for
increased timestamping accuracy
Financial trading
Digital cable networks
Timing distribution to remote PHY devices in
digital infrastructure deployments
Higher accuracy and uncompromised
reliability for mission-critical applications Power utilities
Data center
infrastructure
Common and precise time basis for
synchronization of distributed data bases
Keeping cameras, mixers, recorders and
monitors tightly synchronized
Broadcast networks
© 2022 ADVA. All rights reserved.
3
Over two million GNSS timing receivers in use …
Source: https://www.gsa.europa.eu/system/files/reports/market_report_issue_6_v2.pdf
Number of GNSS timing receivers is growing steadily
• Telecommunication networks
for timing of base stations and
small cells, fixed networks,
professional mobile radio (PMR),
satellite stations
• Energy networks for
timestamping of synchrophasor
measurements
• Financial applications for
assuring sequence of
transactions in trading
Some of the key use cases
© 2022 ADVA. All rights reserved.
4
Growing GPS/GNSS vulnerabilities and cyber threats
GNSS for
timing
Jamming and
spoofing
Obstruction
Interference with
transmitters at
adjacent bands
Ionospheric
disturbance, solar
activity
GNSS disturbances Multiple threat agents
© 2022 ADVA. All rights reserved.
5
Government mandated resilient PNT requirements
US - Federal Executive Order 13905 of Feb 2020: Strengthening National Resilience Through Responsible Use of Positioning,
Navigation, and Timing Services
PNT cyber
threats
Finance
Power grid
Communications
Data centers
aPNT+™ targets:
critical infrastructure
Transportation
According to RTI and NIST, cost of GPS/PNT disruption is $1 billion per day
• Protect
• Critical government and industry infrastructure against disruptions from
GNSS jamming/spoofing and cyberattacks
• Deploy
• Resilient and self-survivable PNT systems
• Target
• Critical infrastructure threatened by GNSS synchronization
vulnerabilities
• Use
• Published PNT assurance guidelines and standards in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323)
• IEEE P1952 Resilient PNT UE working group
aPNT+™ - assured positioning, navigation and timing
© 2022 ADVA. All rights reserved.
6
Demand for GNSS/GPS receivers is growing rapidly
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
• No visibility of GNSS receiver health and quality of timing information
• Different suppliers with no means to correlate GNSS data and identify issues
such as cyber threats, obstructions or solar disturbance from a single system
 GNSS failures are detected too late, services become impacted
Problem
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver
GPS
receiver

Recommended

ADVA’s telecommunications solutions for smart grids
ADVA’s telecommunications solutions for smart grids ADVA’s telecommunications solutions for smart grids
ADVA’s telecommunications solutions for smart grids ADVA
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timingADVA
 
Best practices for secure synchronization in smart grids
Best practices for secure synchronization in smart gridsBest practices for secure synchronization in smart grids
Best practices for secure synchronization in smart gridsADVA
 
Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!Get your timing right for 5G OpenRAN!
Get your timing right for 5G OpenRAN!ADVA
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceADVA
 
Best practices for resilient NIST/UTC traceable sub-µsec timestamping of fina...
Best practices for resilient NIST/UTC traceable sub-µsec timestamping of fina...Best practices for resilient NIST/UTC traceable sub-µsec timestamping of fina...
Best practices for resilient NIST/UTC traceable sub-µsec timestamping of fina...ADVA
 
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...
The need for GBaaS as GPS/GNSS is no longer a reliable source for critical PN...ADVA
 

More Related Content

Similar to Protecting third-party timing receivers from cyberattacks with trusted networkwide GNSS assurance

Best sync practices and architecture strategies for secure, resilient PNT in ...
Best sync practices and architecture strategies for secure, resilient PNT in ...Best sync practices and architecture strategies for secure, resilient PNT in ...
Best sync practices and architecture strategies for secure, resilient PNT in ...ADVA
 
Time as a service for the IoT world of tomorrow
Time as a service for the IoT world of tomorrowTime as a service for the IoT world of tomorrow
Time as a service for the IoT world of tomorrowADVA
 
Best practices for secure PNT management in a multi vendor environment
Best practices for secure PNT management in a multi vendor environmentBest practices for secure PNT management in a multi vendor environment
Best practices for secure PNT management in a multi vendor environmentAdtran
 
2020-07-07 Stargate RTK for service information
2020-07-07 Stargate RTK for service information2020-07-07 Stargate RTK for service information
2020-07-07 Stargate RTK for service informationSimon Litvinov
 
OSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesOSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesADVA
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timingADVA
 
Meet the industry's first pluggable module for precise synchronization
Meet the industry's first pluggable module for precise synchronizationMeet the industry's first pluggable module for precise synchronization
Meet the industry's first pluggable module for precise synchronizationADVA
 
Introducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsIntroducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsADVA
 
Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsADVA
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA
 
Achieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksAchieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksADVA
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase DeliveryADVA
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication SystemMayank Srivastava
 
19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdfgowravnagula
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networksADVA
 
Gridstream Evolution
Gridstream EvolutionGridstream Evolution
Gridstream EvolutionLandis+Gyr
 
Inject precise synchronization into open compute servers
Inject precise synchronization into open compute serversInject precise synchronization into open compute servers
Inject precise synchronization into open compute serversADVA
 
Centralized GNSS monitoring and assurance
Centralized GNSS monitoring and assuranceCentralized GNSS monitoring and assurance
Centralized GNSS monitoring and assuranceADVA
 
Managing and monetizing data growth on your network
Managing and monetizing data growth on your networkManaging and monetizing data growth on your network
Managing and monetizing data growth on your networkAmdocs
 

Similar to Protecting third-party timing receivers from cyberattacks with trusted networkwide GNSS assurance (20)

Best sync practices and architecture strategies for secure, resilient PNT in ...
Best sync practices and architecture strategies for secure, resilient PNT in ...Best sync practices and architecture strategies for secure, resilient PNT in ...
Best sync practices and architecture strategies for secure, resilient PNT in ...
 
Time as a service for the IoT world of tomorrow
Time as a service for the IoT world of tomorrowTime as a service for the IoT world of tomorrow
Time as a service for the IoT world of tomorrow
 
Best practices for secure PNT management in a multi vendor environment
Best practices for secure PNT management in a multi vendor environmentBest practices for secure PNT management in a multi vendor environment
Best practices for secure PNT management in a multi vendor environment
 
2020-07-07 Stargate RTK for service information
2020-07-07 Stargate RTK for service information2020-07-07 Stargate RTK for service information
2020-07-07 Stargate RTK for service information
 
OSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart citiesOSA 5405-MB – precise edge timing for 5G and smart cities
OSA 5405-MB – precise edge timing for 5G and smart cities
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Meet the industry's first pluggable module for precise synchronization
Meet the industry's first pluggable module for precise synchronizationMeet the industry's first pluggable module for precise synchronization
Meet the industry's first pluggable module for precise synchronization
 
Introducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applicationsIntroducing ultra-precise time for server-hosted applications
Introducing ultra-precise time for server-hosted applications
 
Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey Results
 
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
Achieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networksAchieving resilient and assured PNT in secure information networks
Achieving resilient and assured PNT in secure information networks
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase Delivery
 
Advanced Integrated Communication System
Advanced Integrated Communication SystemAdvanced Integrated Communication System
Advanced Integrated Communication System
 
19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf19X01A0413.SEMIAR.pdf
19X01A0413.SEMIAR.pdf
 
Precise and assured timing for enterprise networks
Precise and assured timing for enterprise networksPrecise and assured timing for enterprise networks
Precise and assured timing for enterprise networks
 
IoT SCADA
IoT SCADAIoT SCADA
IoT SCADA
 
Gridstream Evolution
Gridstream EvolutionGridstream Evolution
Gridstream Evolution
 
Inject precise synchronization into open compute servers
Inject precise synchronization into open compute serversInject precise synchronization into open compute servers
Inject precise synchronization into open compute servers
 
Centralized GNSS monitoring and assurance
Centralized GNSS monitoring and assuranceCentralized GNSS monitoring and assurance
Centralized GNSS monitoring and assurance
 
Managing and monetizing data growth on your network
Managing and monetizing data growth on your networkManaging and monetizing data growth on your network
Managing and monetizing data growth on your network
 

More from ADVA

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockADVA
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clockADVA
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureADVA
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandADVA
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ADVA
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareADVA
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingADVA
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkADVA
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...ADVA
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)ADVA
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networksADVA
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceADVA
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™ADVA
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environmentsADVA
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networksADVA
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum servicesADVA
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edgeADVA
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockADVA
 

More from ADVA (20)

Industrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clockIndustrial optically pumped cesium beam clock
Industrial optically pumped cesium beam clock
 
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350  SePRC™ optical cesium clockIndustry's longest holdover with the OSA 3350  SePRC™ optical cesium clock
Industry's longest holdover with the OSA 3350 SePRC™ optical cesium clock
 
Addressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructureAddressing PNT threats in critical defense infrastructure
Addressing PNT threats in critical defense infrastructure
 
Introducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demandIntroducing Ensemble Cloudlet for on-premises cloud demand
Introducing Ensemble Cloudlet for on-premises cloud demand
 
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
ePRTC in data centers - GNSS-backup-as-a-service (GBaaS)
 
Sync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with softwareSync on TAP - Syncing infrastructure with software
Sync on TAP - Syncing infrastructure with software
 
Meet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networkingMeet stringent latency demands with time-sensitive networking
Meet stringent latency demands with time-sensitive networking
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Quantum threat: How to protect your optical network
Quantum threat: How to protect your optical networkQuantum threat: How to protect your optical network
Quantum threat: How to protect your optical network
 
Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...Optical networks and the ecodesign tradeoff between climate change mitigation...
Optical networks and the ecodesign tradeoff between climate change mitigation...
 
Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)Trends in next-generation data center interconnects (DCI)
Trends in next-generation data center interconnects (DCI)
 
Open optical edge connecting mobile access networks
Open optical edge connecting mobile access networksOpen optical edge connecting mobile access networks
Open optical edge connecting mobile access networks
 
Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Meet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation deviceMeet the industry's first pluggable 10G demarcation device
Meet the industry's first pluggable 10G demarcation device
 
Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™Introducing ADVA AccessWave25™
Introducing ADVA AccessWave25™
 
10G edge technology for outdoor environments
10G edge technology for outdoor environments10G edge technology for outdoor environments
10G edge technology for outdoor environments
 
The quantum age - secure transport networks
The quantum age - secure transport networksThe quantum age - secure transport networks
The quantum age - secure transport networks
 
From leased lines to optical spectrum services
From leased lines to optical spectrum servicesFrom leased lines to optical spectrum services
From leased lines to optical spectrum services
 
The coherent optical edge
The coherent optical edgeThe coherent optical edge
The coherent optical edge
 
Introducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clockIntroducing the market's first high-performance optical cesium clock
Introducing the market's first high-performance optical cesium clock
 

Recently uploaded

Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?MENGSAYLOEM1
 
Imaging and Design for the Online Environment Part 1.pptx
Imaging and Design for the Online Environment Part 1.pptxImaging and Design for the Online Environment Part 1.pptx
Imaging and Design for the Online Environment Part 1.pptxPower Point
 
Enterprise Architecture As Strategy - Book Review
Enterprise Architecture As Strategy - Book ReviewEnterprise Architecture As Strategy - Book Review
Enterprise Architecture As Strategy - Book ReviewAshraf Fouad
 
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes", Volodymyr TsapFwdays
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, GoogleISPMAIndia
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor FesenkoFwdays
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Adrian Sanabria
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsInflectra
 
My sample product research idea for you!
My sample product research idea for you!My sample product research idea for you!
My sample product research idea for you!KivenRaySarsaba
 
AI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementAI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementMimmo Squillace
 
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...Product School
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...ISPMAIndia
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...UiPathCommunity
 
Relationship Counselling: From Disjointed Features to Product-First Thinking ...
Relationship Counselling: From Disjointed Features to Product-First Thinking ...Relationship Counselling: From Disjointed Features to Product-First Thinking ...
Relationship Counselling: From Disjointed Features to Product-First Thinking ...Product School
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringMassimo Talia
 
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner,  Challenge Like a VC by former CPO, TripadvisorAct Like an Owner,  Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner, Challenge Like a VC by former CPO, TripadvisorProduct School
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERNRonnelBaroc
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...Fwdays
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys VasylievFwdays
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceVijayananda Mohire
 

Recently uploaded (20)

Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?Are Human-generated Demonstrations Necessary for In-context Learning?
Are Human-generated Demonstrations Necessary for In-context Learning?
 
Imaging and Design for the Online Environment Part 1.pptx
Imaging and Design for the Online Environment Part 1.pptxImaging and Design for the Online Environment Part 1.pptx
Imaging and Design for the Online Environment Part 1.pptx
 
Enterprise Architecture As Strategy - Book Review
Enterprise Architecture As Strategy - Book ReviewEnterprise Architecture As Strategy - Book Review
Enterprise Architecture As Strategy - Book Review
 
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap"Running Open-Source LLM models on Kubernetes",  Volodymyr Tsap
"Running Open-Source LLM models on Kubernetes", Volodymyr Tsap
 
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
"The Transformative Power of AI and Open Challenges" by Dr. Manish Gupta, Google
 
"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko"Platform Engineering with Development Containers", Igor Fesenko
"Platform Engineering with Development Containers", Igor Fesenko
 
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
 
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+PluginsFrom Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
From Challenger to Champion: How SpiraPlan Outperforms JIRA+Plugins
 
My sample product research idea for you!
My sample product research idea for you!My sample product research idea for you!
My sample product research idea for you!
 
AI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvementAI Act & Standardization: UNINFO involvement
AI Act & Standardization: UNINFO involvement
 
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...
Harnessing the Power of GenAI for Exceptional Product Outcomes by Booking.com...
 
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
AI MODELS USAGE IN FINTECH PRODUCTS: PM APPROACH & BEST PRACTICES by Kasthuri...
 
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
Dev Dives: Leverage APIs and Gen AI to power automations for RPA and software...
 
Relationship Counselling: From Disjointed Features to Product-First Thinking ...
Relationship Counselling: From Disjointed Features to Product-First Thinking ...Relationship Counselling: From Disjointed Features to Product-First Thinking ...
Relationship Counselling: From Disjointed Features to Product-First Thinking ...
 
Dynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineeringDynamical systems simulation in Python for science and engineering
Dynamical systems simulation in Python for science and engineering
 
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner,  Challenge Like a VC by former CPO, TripadvisorAct Like an Owner,  Challenge Like a VC by former CPO, Tripadvisor
Act Like an Owner, Challenge Like a VC by former CPO, Tripadvisor
 
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
21ST CENTURY LITERACY FROM TRADITIONAL TO MODERN
 
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions..."How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
"How we created an SRE team in Temabit as a part of FOZZY Group in conditions...
 
"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev"AIRe - AI Reliability Engineering", Denys Vasyliev
"AIRe - AI Reliability Engineering", Denys Vasyliev
 
My Journey towards Artificial Intelligence
My Journey towards Artificial IntelligenceMy Journey towards Artificial Intelligence
My Journey towards Artificial Intelligence
 

Protecting third-party timing receivers from cyberattacks with trusted networkwide GNSS assurance

  • 1. Protecting third-party timing receivers from cyberattacks with trusted networkwide GNSS assurance Robust PNT services with AI-powered analysis of all GNSS assurance data
  • 2. © 2022 ADVA. All rights reserved. 2 Which applications are using GNSS for timing ? Radio access networks Highly accurate phase and frequency synchronization for efficient use of spectrum Migration from NTP- to PTP-based timing for increased timestamping accuracy Financial trading Digital cable networks Timing distribution to remote PHY devices in digital infrastructure deployments Higher accuracy and uncompromised reliability for mission-critical applications Power utilities Data center infrastructure Common and precise time basis for synchronization of distributed data bases Keeping cameras, mixers, recorders and monitors tightly synchronized Broadcast networks
  • 3. © 2022 ADVA. All rights reserved. 3 Over two million GNSS timing receivers in use … Source: https://www.gsa.europa.eu/system/files/reports/market_report_issue_6_v2.pdf Number of GNSS timing receivers is growing steadily • Telecommunication networks for timing of base stations and small cells, fixed networks, professional mobile radio (PMR), satellite stations • Energy networks for timestamping of synchrophasor measurements • Financial applications for assuring sequence of transactions in trading Some of the key use cases
  • 4. © 2022 ADVA. All rights reserved. 4 Growing GPS/GNSS vulnerabilities and cyber threats GNSS for timing Jamming and spoofing Obstruction Interference with transmitters at adjacent bands Ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 5. © 2022 ADVA. All rights reserved. 5 Government mandated resilient PNT requirements US - Federal Executive Order 13905 of Feb 2020: Strengthening National Resilience Through Responsible Use of Positioning, Navigation, and Timing Services PNT cyber threats Finance Power grid Communications Data centers aPNT+™ targets: critical infrastructure Transportation According to RTI and NIST, cost of GPS/PNT disruption is $1 billion per day • Protect • Critical government and industry infrastructure against disruptions from GNSS jamming/spoofing and cyberattacks • Deploy • Resilient and self-survivable PNT systems • Target • Critical infrastructure threatened by GNSS synchronization vulnerabilities • Use • Published PNT assurance guidelines and standards in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323) • IEEE P1952 Resilient PNT UE working group aPNT+™ - assured positioning, navigation and timing
  • 6. © 2022 ADVA. All rights reserved. 6 Demand for GNSS/GPS receivers is growing rapidly GPS receiver GPS receiver GPS receiver GPS receiver • No visibility of GNSS receiver health and quality of timing information • Different suppliers with no means to correlate GNSS data and identify issues such as cyber threats, obstructions or solar disturbance from a single system  GNSS failures are detected too late, services become impacted Problem GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver GPS receiver
  • 7. © 2022 ADVA. All rights reserved. 7 The solution: centralized vendor-agnostic monitoring and assurance Integrating third-party GNSS receiver data makes PNT services resilient and secure • Gathering networkwide performance data from any GNSS receiver in real-time • AI-assisted analysis for predictive maintenance, fast threat/alarm detection and performance control The intelligent centralized approach Ensemble Controller and Sync Director • Lower operational cost with real time access to any GNSS/GPS receiver data • Networkwide control, visibility and management through Ensemble Sync Director's GNSS assurance • Uninterrupted network services with trusted end-to- end GNSS receiver health analytics Key advantages
  • 8. © 2022 ADVA. All rights reserved. 8 Remote GNSS health test – bad site Easy identification of local reception issues
  • 9. © 2022 ADVA. All rights reserved. 9 Remote GNSS health test – good site
  • 10. © 2022 ADVA. All rights reserved. 10 Ensemble Sync Director GNSS assurance – monitoring and analysis of Global Navigation Satellite System Key features • Geomap GNSS sites and health visualization • GNSS data collection from sync devices and external sources (various dashboard views, live and historical) • Control of GNSS cyber threats and satellite signal quality • “Smart” graphs for GNSS stats presentation and comparison between sites and time intervals • Built-in health test – GNSS installation acceptance • AI/ML-based prediction of obstructions/jamming/spoofing Benefits • Short term: active monitoring, identification of GNSS installation/blocking issues and fast detection of cyber threats • Long term: optimized antenna positioning for perfect time synchronization across a transport network
  • 11. © 2022 ADVA. All rights reserved. 11 Ensemble Sync Director GNSS assurance – enhanced capability for integrating third-party GNSS receiver data Key features • User-defined (custom) script to retrieve GNSS parameters from any third-party vendor's GNSS device (per type/model/version) • User-friendly GUI to manage custom scripts (upload/update/delete) • GNSS data collection from third-party devices through the GNSS assurance application • Third-party monitoring through the extended GNSS assurance application Benefits • Centralized multi-vendor GNSS monitoring solution • Networkwide GNSS health analytics • Trusted GNSS assurance capability OSA GNSS assurance Custom GNSS CLI Script Mediation server Custom GNSS CLI script Third-party scripts manager Ensemble Sync Director GNSS third party
  • 12. © 2022 ADVA. All rights reserved. 12 Summary GNSS assurance with third-party vendor's GNSS data provides trusted assured PNT • Trusted PNT services require end-to-end, multi-vendor GNSS receiver monitoring and management • Ensemble Sync Director GNSS assurance provides resiliency, robustness and security for defense-in-depth capability against growing cyberattacks • Integration of multi-vendor GNSS receiver data lowers operational cost and mitigates network disruption • Networkwide AI-assisted GNSS analytics are critical for fast fault detection and predictive maintenance
  • 13. Thank you IMPORTANT NOTICE ADVA is the exclusive owner or licensee of the content, material, and information in this presentation. Any reproduction, pub lication or reprint, in whole or in part, is strictly prohibited. The information in this presentation may not be accurate, complete or up to date, and is provided without warranties or repre sentations of any kind, either express or implied. ADVA shall not be responsible for and disclaims any liability for any loss or damages, including without limitation, direct, indirect, incidental, consequential and special damages, alleged to have been caused by or in connection with using a nd/or relying on the information contained in this presentation. Copyright © for the entire content of this presentation: ADVA. www.oscilloquartz.com | info@adva.com