SlideShare a Scribd company logo
1 of 44
Introducing GPS Spoofing Attack on Power
Grids and Counteract Methods
Applied Control & Robotic Research Laboratory of Shiraz University
Shiraz, Iran
By: Sara Siamak
Contents
▣ Introduction
▣ Global Positioning System (GPS)
▣ PMU Overview
▣ GPS Spoofing Attack
▣ Attack Counteract Methods
▣ Literature Review
▣ Conclusion
▣ References
2
1.
Introduction
3
“ Many navigation systems and network synchronization equipment
rely on GPS signals to determine their location and time.
 The structure of GPS signals is well known to the public, so it is
possible to build a system that produces fake GPS signals.
 Sending fake signals to GPS receivers can make them look for
false signals and cause the receivers to find their location and time
through the fake signals. This is called GPS Spoofing Attack.
4
“
 In the power grid, time synchronization is very valuable because it
is a complex, interconnected and interdependent network.
 One of the most important things to do in a power grid is to
estimate the states of the power system.
 In the last decade, the use of PMU for real-time network estimation
has increased.
 PMUs depend on GPS for time synchronization. This dependency
makes them vulnerable to GPS spoofing attacks.
5
2.
GPS
6
“
 The GPS signal contains location and time
information
 GPS satellites clock have not any offset from
the world clock
 The GPS receiver cannot find its exact position
simply by receiving this signal from the satellite
because the receiver has an uncertain offset
relative to the world clock.
7
Global Positioning System (GPS)
“
 GPS receiver position
 GPS receiver offset
It has 4 unknowns so 4 visible satellites are needed
 Trilateration process: The process of determining relative or
absolute position using geometry that is applicable to GPS.
With this process, the receiver calculates its position and time offset.
8
Unknowns for a GPS Receiver
3 unknowns
(x, y, z)
1 unknown (𝑡 𝑢)
“
GPS Receiver Offset: 𝑡 𝑢
Speed of light: 𝑐
The Pseudo-Distance between the
Receiver and the 1st Satellite: p1
Receiver Coordinates: x, y, z
𝑛th Satellite Coordinates: xn, yn, zn
Local Receiver Time: tl
Sending Time from 𝑛th Satellite:tl
9
Trilateration process
“
GPS satellites contain two important signals:
civilian signal, L1 and military signal, L2.
These signals must pass through the
ionosphere layer in their path to the ground,
causing a delay in them.
Because the frequencies of L1 and L2 are
different, they are delayed with different
values.
10
GPS Signals
“
These signals are modulated by the
pseudo-random noise sequence code
that is unique to each satellite. These
include civilian C/A and P military
codes.
The civilian C/A code is only sent at the
frequency of L1, while the military code
P is sent at the frequency of L1and L2
11
The Structure of Signals L1 and L2
3.
PMU Overview
12
“
 The PMU is a device that is installed
in the post and is able to measure the
voltage of the bus voltage and the
current of the branches connected to
the bus.
 The PMU uses a GPS receiver for
time synchronization.
 GPS signals provide the time labels
for the measured phasors.
13
Phasor Measurement Unit (PMU)
Structure of a PMU
14
4.
GPS Spoofing Attack
15
“
 The attacker simulates the actual GPS signal.
 In this attack, the attacker first causes excessive radio interference on the
L1frequency band.
 This interference is accomplished by sending noise signals in the GPS
frequency range.
 The attacker then sends spoofing signals to the receiver to lock the receiver
onto the fake signal. (With power slightly above the valid signals’ value)
16
GPS Spoofing Attack
“
1- GPS signal simulator
A GPS signal simulator is used to mimic valid GPS signals.
Attributes:
-They are simple
-They do not have GPS receivers, so they are not necessarily synchronized with
actual GPS signals
-They are easily identifiable
17
Techniques for making spoofing signals
“2- Receiver-based spoofers
Includes GPS receiver with spoofing transmitter.
Attributes:
They are more complex than GPS simulators
Synchronized with GPS signals
3. Complex receiver-based spoofers
Attributes:
The most sophisticated and effective type of spoofing classifications
Uses several transmission antennas and knows the exact information of the
target receiver antenna
It is very difficult to achieve these spoofers
18
“
 For a signal with frequency f Hz, the phase measurement error
corresponding to the offset of the receiver is obtained by the following
equation:
φ = 2πft
∈ = [2πf tu
∗
− tu ]
 Changes in the measurement phase can cause
- The generators to become unstable
- Normal showing operation of equipment while they are overloaded
- Overload show equipment while they are normal and so on.
19
The Effect of GPS Spoofing on the Power Grid
𝜑∗
= 𝜑+ ∈
φ: Signal phase before attack
𝜑∗
: Signal phase after attack
𝑡 𝑢: Receiver offset before attack
𝑡 𝑢
∗
: Receiver offset after attack
5.
Counteract Methods
20
“
1) Signal processing defenses
2) Cryptographic defenses
3) Correlation with other timing sources
4) Radio spectrum and antenna defenses
21
Counteract GPS Spoofing Attack
1- Defense Based on Signal Processing
22
Correlation
Peak
Monitoring
Doppler Shift
Detection
Discrimination
of Time of
Arrival
Absolute
Power
Signal to
Interference
Plus Noise
Ratio
Receiver
Autonomous
Integrity
Monitoring
(RAIM)
Receiver Autonomous Integrity Monitoring (RAIM)
 Predict the location of each satellite using astronomical data from the signals
 Finding a conflict by comparing prediction results with the position reported in the
navigation message in the received signals can be caused by an attack.
Defect:
 Invalidity of this method when spoofing signals are in the majority
23
Signal to Interference Plus Noise Ratio
 SINR: Ratio of received signal power to noise power plus other signal interference
 A sudden change in the SINR rate could indicate an attack.
𝑺𝑰𝑵𝑹 =
𝑷
𝑰 𝑨𝒖𝒕𝒉
𝟐 + 𝑰 𝑺𝒑𝒐𝒐𝒇
𝟐
+ (
𝝈 𝟐
𝑵
)
24
𝑰 𝑨𝒖𝒕𝒉 : Interference term caused by correlation
with other valid signals
𝑰 𝑺𝒑𝒐𝒐𝒇: Interference term due to correlation with
fake signals
𝝈 𝟐
𝑵
: Filtered noise variance
P: Power of received signal
Absolute Power
 The spoofer sends its signals at slightly higher power than valid signals to force the
receiver to follow its own signals.
 Detection method: Comparison of the absolute power level of the received signal with
the valid signal power
Defects:
 Increased receiver hardware complexity
 Power of signal changes due to interference from the atmosphere and the sun's gravity
25
Doppler Shift Detection
 Relative motion between satellite and receiver creating detectable effects caused by
Doppler effect on signal frequency
 By simulating the motion of the satellites and comparing them to the real state, he
observed the Doppler collision and detected the attack.
Doppler Effect: Shortening the wavelength when moving to an object or increasing the wavelength
when moving away
26
Correlation Peak Monitoring
 In the absence of interference between the receiver and the satellite, the power for the
valid signals corresponds to a distribution of 𝜒2.
 The correlation peak power of valid signals can be used to detect an attack.
Defects :
 Spoofer attempts to approach its signal correlation peak to the peak of the GPS signal
correlation
 Invalidity of the distribution assumption 𝜒2
when there is a barrier between the
receiver and the satellite.
27
Discrimination of Time of Arrival
 The P code is sent at both frequencies 𝐿1and 𝐿2. Therefore, the correlation between
two versions of the P code can be used to calculate the delay.
 The delay between the two signals can be calculated for the receiver. And if there is a
conflict between computing and the real state, it could be an attack.
Defect:
 A professional spoofer can handle this delay.
28
2- Cryptographic Defense
 Using authentication techniques to detect spoofing threats
 Applicable for Military version of GPS signals and civilian version of GPS signals
 Requires changes to the GPS signal structure.
Bugs:
 Delay in diagnosis
 It's a costly way.
29
3- Detection based on Correlation Analysis with Other Time
Sources
 Received signals can be sent to other GNSS sources for validation.
Sources other than the Global Navigation Satellite System can be used for
validation.
Defects:
 Sending many signals to get authorities creates traffic and make them
unreliable.
 The accuracy of time sources is less than the global satellite navigation system
30
4- Defense Based on Radio Spectrum and Antenna
31
Discrimination
of Angle of
Arrival
Removable
Antenna
“
 The signals received from a spoofing
source have a different input angle than
the satellite signals.
 This method uses two antennas that
intersect at a certain distance and
calculate the angle of entry of the
signals.
Defect:
 This technique may fail in a multi-
antenna-based spoofing attack.
32
Discrimination of Angle of Arrival
“
 Moving a single antenna along a
random path
 For a model that is not under attack,
different effects of the antenna motion
on different satellites are predicted.
 The correlation between the received
signals in the spoofing attack mode
indicates the occurrence of the attack.
33
Removable Antenna
6.
Literature Review
34
35
…
Dana
First came up
with the idea
of RAIM
McDowell et
al.
Introduces the
SINR
evaluation
method
Jovanovic et
al.
Validation of
the Doppler
effect change
observation
method
Montgomery
et al.
Applying the
angle of arrival
technique
Wesson et al.
Evaluation of
correlation
peak detection
method
1997 2007 2008 2009 2011
36
…
Zhang et al.
Using two
different
types of
antennas to
detect attack
Jiang et al.
Formulate a
GPS spoofing
attack on the
PMU with
solving a
maximization
problem
Psiaki et al.
Introducing
the idea of a
removable
antenna
Yu et al.
Using a set of
GPS receivers
to detect
spoofing attack
on power grids
Fan et al.
Applying the
mechanism of
cross-layer
detection of
physical layer and
upper layer of
network against
GPS spoofing
attack on PMUs
2012 2013 2014 2015
Konovaltsev
et al.
Use array
antenna and
angle of
arrival entry
technique
37
…
Fan et al.
Spoofing-matched
algorithm using signal
processing techniques and
estimation of power
system modes based on
synchronous phasers (this
method detects an attack
on a PMU and corrects its
data)...
Yasinzadeh and Akhbari
- Providing a method based on
power Grid Infrastructure using
measured phase analysis and
state estimation
This method is compatible with
other available anti-spoofing
methods
In addition to detecting an
attack, it also corrects false data
2017 2018
7.
Conclusion
38
“ Research suggests that GPS-based networks are
vulnerable to GPS spoofing attack.
 Power grids are also vulnerable to cyberattacks, and GPS
spoofing is part of the danger.
 A spoofer can cause network operators to perform
improper or unnecessary control actions.
 Therefore, protection of these damages is essential in
modern power networks.
39
8.
References
40
41
[1] Kaplan, E. D., Leva, J. L., & Pavloff, M. S. (1996). Fundamentals of satellite navigation. Understanding GPS-
Principles and applications(A 96-41027 11-17), Norwood, MA, Artech House, 1996,, 15-57.
[2] Infrastructure, T. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning
system. Technical Report, Center, John A. Volpe National Transportation Systems
[3] McDowell, C. E. (2007). U.S. Patent No. 7,250,903. Washington, DC: U.S. Patent and Trademark Office.
Papadimitratos, P., & Jovanovic, A. (2008, November). GNSS-based positioning: Attacks and countermeasures. In
Military Communications Conference, 2008. MILCOM 2008. IEEE (pp. 1-7). IEEE.
[4] Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009). A multi-antenna defense: Receiver-autonomous GPS
spoofing detection. Inside GNSS, 4(2), 40-46.
[5] Humphreys, T., Bhatti, J., & Ledvina, B. (2010). The GPS Assimilator: a method for upgrading existing GPS user
equipment to improve accuracy, robustness, and resistance to spoofing.
[6] Wesson, K. D., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2011, September). An evaluation of the vestigial
signal defense for civil GPS anti-spoofing. In Proceedings of the ION GNSS Meeting.
[7] Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a
review of antispoofing techniques. International Journal of Navigation and Observation, 2012.
[8] Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units
to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5(3-4), 146-153.
42
[9] Jafarnia-Jahromi, A., Daneshmand, S., & Lachapelle, G. (2013). Spoofing countermeasure for GNSS receivers–a
review of current and future research trends. Proc. on the 4th Intern Colloquim on Scientific and Fundamental Aspects of
the Galileo Programme, 1-8.
[10] Psiaki, M. L., Powell, S. P., & O’hanlon, B. W. (2013, September). GNSS spoofing detection using high-frequency
antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting (pp. 2949-2991).
[11] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., & Basin, D. (2014, July). Short paper: detection of GPS spoofing
attacks in power grids. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile
networks (pp. 99-104). ACM.
[12] Konovaltsev, A., Caizzone, S., Cuntz, M., & Meurer, M. (2014, September). Autonomous spoofing detection and
mitigation with a miniaturized adaptive antenna array. In Proceedings of the 27th Technical Meeting of Satellite Division
of The Institute of Navigation ION GNSS+ 2014 (pp. 2853-2861). The Institue of Navigation, USA.
[13] Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., & Li, H. (2015). A cross-layer defense mechanism
against GPS spoofing attacks on PMUs in smart grids. IEEE Transactions on Smart Grid, 6(6), 2659-2668.
[14] Schmidt, D., Radke, K., Camtepe, S., Foo, E., & Ren, M. (2016). A survey and analysis of the gnss spoofing threat
and countermeasures. ACM Computing Surveys (CSUR), 48(4), 64.
[15] Fan, X., Du, L., & Duan, D. (2017). Synchrophasor data correction under gps spoofing attack: A state estimation
based approach. IEEE Transactions on Smart Grid.
[16] Yasinzadeh, M., & Akhbari, M. (2018). Detection of PMU spoofing in power grid based on phasor measurement
analysis. IET Generation, Transmission & Distribution, 12(9), 1980-1987.
“
Thank you
Any questions?
43
Sara Siamak
You can find me at s.siyamak@shirazu.ac.ir
44

More Related Content

What's hot

Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Industrial Partnerships Office
 
An Introduction about Radar
An Introduction about RadarAn Introduction about Radar
An Introduction about RadarTom Chen
 
3_Igarss2011RFI.ppt
3_Igarss2011RFI.ppt3_Igarss2011RFI.ppt
3_Igarss2011RFI.pptgrssieee
 
MISSILE CONTROL AND COMMUNICATION
MISSILE CONTROL AND COMMUNICATIONMISSILE CONTROL AND COMMUNICATION
MISSILE CONTROL AND COMMUNICATIONNITESH KHATIKMARE
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switchingMDKAWSARAHMEDSAGAR
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSSalah Amean
 
Landmine detection using impulse ground penetrating radar
Landmine  detection  using         impulse  ground  penetrating radarLandmine  detection  using         impulse  ground  penetrating radar
Landmine detection using impulse ground penetrating radarPRADEEP Cheekatla
 
Doppler weather radar
Doppler weather radarDoppler weather radar
Doppler weather radarPawankumarm65
 
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...IJERD Editor
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrumHarshit Gupta
 

What's hot (20)

Military Radar
Military RadarMilitary Radar
Military Radar
 
Radar Application
Radar ApplicationRadar Application
Radar Application
 
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
 
An Introduction about Radar
An Introduction about RadarAn Introduction about Radar
An Introduction about Radar
 
3_Igarss2011RFI.ppt
3_Igarss2011RFI.ppt3_Igarss2011RFI.ppt
3_Igarss2011RFI.ppt
 
MISSILE CONTROL AND COMMUNICATION
MISSILE CONTROL AND COMMUNICATIONMISSILE CONTROL AND COMMUNICATION
MISSILE CONTROL AND COMMUNICATION
 
Military radar Summit
Military radar Summit Military radar Summit
Military radar Summit
 
Chirps
ChirpsChirps
Chirps
 
Military radar and satellite switching
Military radar and satellite switchingMilitary radar and satellite switching
Military radar and satellite switching
 
Location in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMSLocation in ubiquitous computing, LOCATION SYSTEMS
Location in ubiquitous computing, LOCATION SYSTEMS
 
RADAR BULLET
RADAR BULLET RADAR BULLET
RADAR BULLET
 
Lesson ssr
Lesson ssrLesson ssr
Lesson ssr
 
Landmine detection using impulse ground penetrating radar
Landmine  detection  using         impulse  ground  penetrating radarLandmine  detection  using         impulse  ground  penetrating radar
Landmine detection using impulse ground penetrating radar
 
Doppler weather radar
Doppler weather radarDoppler weather radar
Doppler weather radar
 
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
Radar
RadarRadar
Radar
 
Airborne radar
Airborne  radarAirborne  radar
Airborne radar
 
Frequency hopping spread spectrum
Frequency hopping spread spectrumFrequency hopping spread spectrum
Frequency hopping spread spectrum
 
Spread Spectrum
Spread SpectrumSpread Spectrum
Spread Spectrum
 

Similar to GPS Spoofing Detection and Countermeasures for Power Grids

Countermeasures to GPS Spoofing
Countermeasures to GPS SpoofingCountermeasures to GPS Spoofing
Countermeasures to GPS SpoofingRoger Johnston
 
GPS World wide navigation and tracking system
GPS World wide navigation and tracking systemGPS World wide navigation and tracking system
GPS World wide navigation and tracking systemarafyghazali
 
GPS modulation/demodulation and noise
GPS modulation/demodulation and noise GPS modulation/demodulation and noise
GPS modulation/demodulation and noise syuhaimi
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
Lecture satellite navigation
Lecture   satellite navigationLecture   satellite navigation
Lecture satellite navigationzannuar
 
#2 gnss errors,its sources & mitigation techniques
#2 gnss errors,its sources & mitigation techniques#2 gnss errors,its sources & mitigation techniques
#2 gnss errors,its sources & mitigation techniquesMohammedHusain20
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
 
Gps systems m. emin özgünsür
Gps systems   m. emin özgünsürGps systems   m. emin özgünsür
Gps systems m. emin özgünsüremin_oz
 
Assessment of the Accuracy of Processing GPS Static Baselines Up To 40 Km Us...
Assessment of the Accuracy of Processing GPS Static Baselines  Up To 40 Km Us...Assessment of the Accuracy of Processing GPS Static Baselines  Up To 40 Km Us...
Assessment of the Accuracy of Processing GPS Static Baselines Up To 40 Km Us...IJMER
 
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016) Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016) Adam Paterson
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksTELKOMNIKA JOURNAL
 
Latest Advances in GPS technology Seminar report
Latest Advances in GPS technology Seminar reportLatest Advances in GPS technology Seminar report
Latest Advances in GPS technology Seminar reportMode Gautam Raj
 
Sources of GPS Errors in a Glance (2016)
Sources of GPS Errors in a Glance (2016)Sources of GPS Errors in a Glance (2016)
Sources of GPS Errors in a Glance (2016)Atiqa khan
 
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdksk
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdkskGROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdksk
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdkskKingKong787511
 
Perspectives and Trends of Satellite Navigation.pptx
Perspectives and Trends of Satellite Navigation.pptxPerspectives and Trends of Satellite Navigation.pptx
Perspectives and Trends of Satellite Navigation.pptxroshan375533
 

Similar to GPS Spoofing Detection and Countermeasures for Power Grids (20)

Countermeasures to GPS Spoofing
Countermeasures to GPS SpoofingCountermeasures to GPS Spoofing
Countermeasures to GPS Spoofing
 
TRS
TRSTRS
TRS
 
GPS World wide navigation and tracking system
GPS World wide navigation and tracking systemGPS World wide navigation and tracking system
GPS World wide navigation and tracking system
 
Gps in protection scheme
Gps in protection schemeGps in protection scheme
Gps in protection scheme
 
GPS modulation/demodulation and noise
GPS modulation/demodulation and noise GPS modulation/demodulation and noise
GPS modulation/demodulation and noise
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Lecture satellite navigation
Lecture   satellite navigationLecture   satellite navigation
Lecture satellite navigation
 
#2 gnss errors,its sources & mitigation techniques
#2 gnss errors,its sources & mitigation techniques#2 gnss errors,its sources & mitigation techniques
#2 gnss errors,its sources & mitigation techniques
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
An Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive RadioAn Approach to Spectrum Sensing in Cognitive Radio
An Approach to Spectrum Sensing in Cognitive Radio
 
Gps systems m. emin özgünsür
Gps systems   m. emin özgünsürGps systems   m. emin özgünsür
Gps systems m. emin özgünsür
 
Gps2
Gps2Gps2
Gps2
 
Assessment of the Accuracy of Processing GPS Static Baselines Up To 40 Km Us...
Assessment of the Accuracy of Processing GPS Static Baselines  Up To 40 Km Us...Assessment of the Accuracy of Processing GPS Static Baselines  Up To 40 Km Us...
Assessment of the Accuracy of Processing GPS Static Baselines Up To 40 Km Us...
 
Gps
GpsGps
Gps
 
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016) Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
 
Malicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio NetworksMalicious User Attack in Cognitive Radio Networks
Malicious User Attack in Cognitive Radio Networks
 
Latest Advances in GPS technology Seminar report
Latest Advances in GPS technology Seminar reportLatest Advances in GPS technology Seminar report
Latest Advances in GPS technology Seminar report
 
Sources of GPS Errors in a Glance (2016)
Sources of GPS Errors in a Glance (2016)Sources of GPS Errors in a Glance (2016)
Sources of GPS Errors in a Glance (2016)
 
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdksk
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdkskGROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdksk
GROUP 3 (GPS).pptxbskfkdkfjndkfkdkfkdksk
 
Perspectives and Trends of Satellite Navigation.pptx
Perspectives and Trends of Satellite Navigation.pptxPerspectives and Trends of Satellite Navigation.pptx
Perspectives and Trends of Satellite Navigation.pptx
 

More from Mohammad Sabouri

Extremely low-cost lower limb prostheses_G12.pptx
Extremely low-cost lower limb prostheses_G12.pptxExtremely low-cost lower limb prostheses_G12.pptx
Extremely low-cost lower limb prostheses_G12.pptxMohammad Sabouri
 
MECHANICAL DESIGN METHODS IN ROBOTICS.pptx
MECHANICAL DESIGN METHODS IN ROBOTICS.pptxMECHANICAL DESIGN METHODS IN ROBOTICS.pptx
MECHANICAL DESIGN METHODS IN ROBOTICS.pptxMohammad Sabouri
 
Human Computer Interaction (HCI).pptx
Human Computer Interaction (HCI).pptxHuman Computer Interaction (HCI).pptx
Human Computer Interaction (HCI).pptxMohammad Sabouri
 
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptxIntelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptxMohammad Sabouri
 
Introducing the services of Iran Patent Center- PDF
Introducing the services of Iran Patent Center- PDFIntroducing the services of Iran Patent Center- PDF
Introducing the services of Iran Patent Center- PDFMohammad Sabouri
 
Introduction to Lens database -in Persian (powerful site for searching)
Introduction to Lens database -in Persian (powerful site for searching)Introduction to Lens database -in Persian (powerful site for searching)
Introduction to Lens database -in Persian (powerful site for searching)Mohammad Sabouri
 
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...Mohammad Sabouri
 
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...Mohammad Sabouri
 
Traffic monitoring using drone_ACRRL_Shiraz University
Traffic monitoring using drone_ACRRL_Shiraz UniversityTraffic monitoring using drone_ACRRL_Shiraz University
Traffic monitoring using drone_ACRRL_Shiraz UniversityMohammad Sabouri
 
Labview2_Computer Applications in Control_ACRRL
Labview2_Computer Applications in Control_ACRRLLabview2_Computer Applications in Control_ACRRL
Labview2_Computer Applications in Control_ACRRLMohammad Sabouri
 
Labview1_ Computer Applications in Control_ACRRL
Labview1_ Computer Applications in Control_ACRRLLabview1_ Computer Applications in Control_ACRRL
Labview1_ Computer Applications in Control_ACRRLMohammad Sabouri
 

More from Mohammad Sabouri (15)

Extremely low-cost lower limb prostheses_G12.pptx
Extremely low-cost lower limb prostheses_G12.pptxExtremely low-cost lower limb prostheses_G12.pptx
Extremely low-cost lower limb prostheses_G12.pptx
 
MECHANICAL DESIGN METHODS IN ROBOTICS.pptx
MECHANICAL DESIGN METHODS IN ROBOTICS.pptxMECHANICAL DESIGN METHODS IN ROBOTICS.pptx
MECHANICAL DESIGN METHODS IN ROBOTICS.pptx
 
Human Computer Interaction (HCI).pptx
Human Computer Interaction (HCI).pptxHuman Computer Interaction (HCI).pptx
Human Computer Interaction (HCI).pptx
 
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptxIntelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
 
Introducing the services of Iran Patent Center- PDF
Introducing the services of Iran Patent Center- PDFIntroducing the services of Iran Patent Center- PDF
Introducing the services of Iran Patent Center- PDF
 
Introduction to Lens database -in Persian (powerful site for searching)
Introduction to Lens database -in Persian (powerful site for searching)Introduction to Lens database -in Persian (powerful site for searching)
Introduction to Lens database -in Persian (powerful site for searching)
 
CV_ nov.2019
CV_ nov.2019CV_ nov.2019
CV_ nov.2019
 
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
 
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
 
Traffic monitoring using drone_ACRRL_Shiraz University
Traffic monitoring using drone_ACRRL_Shiraz UniversityTraffic monitoring using drone_ACRRL_Shiraz University
Traffic monitoring using drone_ACRRL_Shiraz University
 
Robotic introduction
Robotic introductionRobotic introduction
Robotic introduction
 
Recurrent Neural Network
Recurrent Neural NetworkRecurrent Neural Network
Recurrent Neural Network
 
Labview2_Computer Applications in Control_ACRRL
Labview2_Computer Applications in Control_ACRRLLabview2_Computer Applications in Control_ACRRL
Labview2_Computer Applications in Control_ACRRL
 
Labview1_ Computer Applications in Control_ACRRL
Labview1_ Computer Applications in Control_ACRRLLabview1_ Computer Applications in Control_ACRRL
Labview1_ Computer Applications in Control_ACRRL
 
Haptic technology ppt
Haptic technology pptHaptic technology ppt
Haptic technology ppt
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 

GPS Spoofing Detection and Countermeasures for Power Grids

  • 1. Introducing GPS Spoofing Attack on Power Grids and Counteract Methods Applied Control & Robotic Research Laboratory of Shiraz University Shiraz, Iran By: Sara Siamak
  • 2. Contents ▣ Introduction ▣ Global Positioning System (GPS) ▣ PMU Overview ▣ GPS Spoofing Attack ▣ Attack Counteract Methods ▣ Literature Review ▣ Conclusion ▣ References 2
  • 4. “ Many navigation systems and network synchronization equipment rely on GPS signals to determine their location and time.  The structure of GPS signals is well known to the public, so it is possible to build a system that produces fake GPS signals.  Sending fake signals to GPS receivers can make them look for false signals and cause the receivers to find their location and time through the fake signals. This is called GPS Spoofing Attack. 4
  • 5. “  In the power grid, time synchronization is very valuable because it is a complex, interconnected and interdependent network.  One of the most important things to do in a power grid is to estimate the states of the power system.  In the last decade, the use of PMU for real-time network estimation has increased.  PMUs depend on GPS for time synchronization. This dependency makes them vulnerable to GPS spoofing attacks. 5
  • 7. “  The GPS signal contains location and time information  GPS satellites clock have not any offset from the world clock  The GPS receiver cannot find its exact position simply by receiving this signal from the satellite because the receiver has an uncertain offset relative to the world clock. 7 Global Positioning System (GPS)
  • 8. “  GPS receiver position  GPS receiver offset It has 4 unknowns so 4 visible satellites are needed  Trilateration process: The process of determining relative or absolute position using geometry that is applicable to GPS. With this process, the receiver calculates its position and time offset. 8 Unknowns for a GPS Receiver 3 unknowns (x, y, z) 1 unknown (𝑡 𝑢)
  • 9. “ GPS Receiver Offset: 𝑡 𝑢 Speed of light: 𝑐 The Pseudo-Distance between the Receiver and the 1st Satellite: p1 Receiver Coordinates: x, y, z 𝑛th Satellite Coordinates: xn, yn, zn Local Receiver Time: tl Sending Time from 𝑛th Satellite:tl 9 Trilateration process
  • 10. “ GPS satellites contain two important signals: civilian signal, L1 and military signal, L2. These signals must pass through the ionosphere layer in their path to the ground, causing a delay in them. Because the frequencies of L1 and L2 are different, they are delayed with different values. 10 GPS Signals
  • 11. “ These signals are modulated by the pseudo-random noise sequence code that is unique to each satellite. These include civilian C/A and P military codes. The civilian C/A code is only sent at the frequency of L1, while the military code P is sent at the frequency of L1and L2 11 The Structure of Signals L1 and L2
  • 13. “  The PMU is a device that is installed in the post and is able to measure the voltage of the bus voltage and the current of the branches connected to the bus.  The PMU uses a GPS receiver for time synchronization.  GPS signals provide the time labels for the measured phasors. 13 Phasor Measurement Unit (PMU)
  • 14. Structure of a PMU 14
  • 16. “  The attacker simulates the actual GPS signal.  In this attack, the attacker first causes excessive radio interference on the L1frequency band.  This interference is accomplished by sending noise signals in the GPS frequency range.  The attacker then sends spoofing signals to the receiver to lock the receiver onto the fake signal. (With power slightly above the valid signals’ value) 16 GPS Spoofing Attack
  • 17. “ 1- GPS signal simulator A GPS signal simulator is used to mimic valid GPS signals. Attributes: -They are simple -They do not have GPS receivers, so they are not necessarily synchronized with actual GPS signals -They are easily identifiable 17 Techniques for making spoofing signals
  • 18. “2- Receiver-based spoofers Includes GPS receiver with spoofing transmitter. Attributes: They are more complex than GPS simulators Synchronized with GPS signals 3. Complex receiver-based spoofers Attributes: The most sophisticated and effective type of spoofing classifications Uses several transmission antennas and knows the exact information of the target receiver antenna It is very difficult to achieve these spoofers 18
  • 19. “  For a signal with frequency f Hz, the phase measurement error corresponding to the offset of the receiver is obtained by the following equation: φ = 2πft ∈ = [2πf tu ∗ − tu ]  Changes in the measurement phase can cause - The generators to become unstable - Normal showing operation of equipment while they are overloaded - Overload show equipment while they are normal and so on. 19 The Effect of GPS Spoofing on the Power Grid 𝜑∗ = 𝜑+ ∈ φ: Signal phase before attack 𝜑∗ : Signal phase after attack 𝑡 𝑢: Receiver offset before attack 𝑡 𝑢 ∗ : Receiver offset after attack
  • 21. “ 1) Signal processing defenses 2) Cryptographic defenses 3) Correlation with other timing sources 4) Radio spectrum and antenna defenses 21 Counteract GPS Spoofing Attack
  • 22. 1- Defense Based on Signal Processing 22 Correlation Peak Monitoring Doppler Shift Detection Discrimination of Time of Arrival Absolute Power Signal to Interference Plus Noise Ratio Receiver Autonomous Integrity Monitoring (RAIM)
  • 23. Receiver Autonomous Integrity Monitoring (RAIM)  Predict the location of each satellite using astronomical data from the signals  Finding a conflict by comparing prediction results with the position reported in the navigation message in the received signals can be caused by an attack. Defect:  Invalidity of this method when spoofing signals are in the majority 23
  • 24. Signal to Interference Plus Noise Ratio  SINR: Ratio of received signal power to noise power plus other signal interference  A sudden change in the SINR rate could indicate an attack. 𝑺𝑰𝑵𝑹 = 𝑷 𝑰 𝑨𝒖𝒕𝒉 𝟐 + 𝑰 𝑺𝒑𝒐𝒐𝒇 𝟐 + ( 𝝈 𝟐 𝑵 ) 24 𝑰 𝑨𝒖𝒕𝒉 : Interference term caused by correlation with other valid signals 𝑰 𝑺𝒑𝒐𝒐𝒇: Interference term due to correlation with fake signals 𝝈 𝟐 𝑵 : Filtered noise variance P: Power of received signal
  • 25. Absolute Power  The spoofer sends its signals at slightly higher power than valid signals to force the receiver to follow its own signals.  Detection method: Comparison of the absolute power level of the received signal with the valid signal power Defects:  Increased receiver hardware complexity  Power of signal changes due to interference from the atmosphere and the sun's gravity 25
  • 26. Doppler Shift Detection  Relative motion between satellite and receiver creating detectable effects caused by Doppler effect on signal frequency  By simulating the motion of the satellites and comparing them to the real state, he observed the Doppler collision and detected the attack. Doppler Effect: Shortening the wavelength when moving to an object or increasing the wavelength when moving away 26
  • 27. Correlation Peak Monitoring  In the absence of interference between the receiver and the satellite, the power for the valid signals corresponds to a distribution of 𝜒2.  The correlation peak power of valid signals can be used to detect an attack. Defects :  Spoofer attempts to approach its signal correlation peak to the peak of the GPS signal correlation  Invalidity of the distribution assumption 𝜒2 when there is a barrier between the receiver and the satellite. 27
  • 28. Discrimination of Time of Arrival  The P code is sent at both frequencies 𝐿1and 𝐿2. Therefore, the correlation between two versions of the P code can be used to calculate the delay.  The delay between the two signals can be calculated for the receiver. And if there is a conflict between computing and the real state, it could be an attack. Defect:  A professional spoofer can handle this delay. 28
  • 29. 2- Cryptographic Defense  Using authentication techniques to detect spoofing threats  Applicable for Military version of GPS signals and civilian version of GPS signals  Requires changes to the GPS signal structure. Bugs:  Delay in diagnosis  It's a costly way. 29
  • 30. 3- Detection based on Correlation Analysis with Other Time Sources  Received signals can be sent to other GNSS sources for validation. Sources other than the Global Navigation Satellite System can be used for validation. Defects:  Sending many signals to get authorities creates traffic and make them unreliable.  The accuracy of time sources is less than the global satellite navigation system 30
  • 31. 4- Defense Based on Radio Spectrum and Antenna 31 Discrimination of Angle of Arrival Removable Antenna
  • 32. “  The signals received from a spoofing source have a different input angle than the satellite signals.  This method uses two antennas that intersect at a certain distance and calculate the angle of entry of the signals. Defect:  This technique may fail in a multi- antenna-based spoofing attack. 32 Discrimination of Angle of Arrival
  • 33. “  Moving a single antenna along a random path  For a model that is not under attack, different effects of the antenna motion on different satellites are predicted.  The correlation between the received signals in the spoofing attack mode indicates the occurrence of the attack. 33 Removable Antenna
  • 35. 35 … Dana First came up with the idea of RAIM McDowell et al. Introduces the SINR evaluation method Jovanovic et al. Validation of the Doppler effect change observation method Montgomery et al. Applying the angle of arrival technique Wesson et al. Evaluation of correlation peak detection method 1997 2007 2008 2009 2011
  • 36. 36 … Zhang et al. Using two different types of antennas to detect attack Jiang et al. Formulate a GPS spoofing attack on the PMU with solving a maximization problem Psiaki et al. Introducing the idea of a removable antenna Yu et al. Using a set of GPS receivers to detect spoofing attack on power grids Fan et al. Applying the mechanism of cross-layer detection of physical layer and upper layer of network against GPS spoofing attack on PMUs 2012 2013 2014 2015 Konovaltsev et al. Use array antenna and angle of arrival entry technique
  • 37. 37 … Fan et al. Spoofing-matched algorithm using signal processing techniques and estimation of power system modes based on synchronous phasers (this method detects an attack on a PMU and corrects its data)... Yasinzadeh and Akhbari - Providing a method based on power Grid Infrastructure using measured phase analysis and state estimation This method is compatible with other available anti-spoofing methods In addition to detecting an attack, it also corrects false data 2017 2018
  • 39. “ Research suggests that GPS-based networks are vulnerable to GPS spoofing attack.  Power grids are also vulnerable to cyberattacks, and GPS spoofing is part of the danger.  A spoofer can cause network operators to perform improper or unnecessary control actions.  Therefore, protection of these damages is essential in modern power networks. 39
  • 41. 41 [1] Kaplan, E. D., Leva, J. L., & Pavloff, M. S. (1996). Fundamentals of satellite navigation. Understanding GPS- Principles and applications(A 96-41027 11-17), Norwood, MA, Artech House, 1996,, 15-57. [2] Infrastructure, T. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning system. Technical Report, Center, John A. Volpe National Transportation Systems [3] McDowell, C. E. (2007). U.S. Patent No. 7,250,903. Washington, DC: U.S. Patent and Trademark Office. Papadimitratos, P., & Jovanovic, A. (2008, November). GNSS-based positioning: Attacks and countermeasures. In Military Communications Conference, 2008. MILCOM 2008. IEEE (pp. 1-7). IEEE. [4] Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009). A multi-antenna defense: Receiver-autonomous GPS spoofing detection. Inside GNSS, 4(2), 40-46. [5] Humphreys, T., Bhatti, J., & Ledvina, B. (2010). The GPS Assimilator: a method for upgrading existing GPS user equipment to improve accuracy, robustness, and resistance to spoofing. [6] Wesson, K. D., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2011, September). An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In Proceedings of the ION GNSS Meeting. [7] Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation, 2012. [8] Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5(3-4), 146-153.
  • 42. 42 [9] Jafarnia-Jahromi, A., Daneshmand, S., & Lachapelle, G. (2013). Spoofing countermeasure for GNSS receivers–a review of current and future research trends. Proc. on the 4th Intern Colloquim on Scientific and Fundamental Aspects of the Galileo Programme, 1-8. [10] Psiaki, M. L., Powell, S. P., & O’hanlon, B. W. (2013, September). GNSS spoofing detection using high-frequency antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting (pp. 2949-2991). [11] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., & Basin, D. (2014, July). Short paper: detection of GPS spoofing attacks in power grids. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (pp. 99-104). ACM. [12] Konovaltsev, A., Caizzone, S., Cuntz, M., & Meurer, M. (2014, September). Autonomous spoofing detection and mitigation with a miniaturized adaptive antenna array. In Proceedings of the 27th Technical Meeting of Satellite Division of The Institute of Navigation ION GNSS+ 2014 (pp. 2853-2861). The Institue of Navigation, USA. [13] Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., & Li, H. (2015). A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids. IEEE Transactions on Smart Grid, 6(6), 2659-2668. [14] Schmidt, D., Radke, K., Camtepe, S., Foo, E., & Ren, M. (2016). A survey and analysis of the gnss spoofing threat and countermeasures. ACM Computing Surveys (CSUR), 48(4), 64. [15] Fan, X., Du, L., & Duan, D. (2017). Synchrophasor data correction under gps spoofing attack: A state estimation based approach. IEEE Transactions on Smart Grid. [16] Yasinzadeh, M., & Akhbari, M. (2018). Detection of PMU spoofing in power grid based on phasor measurement analysis. IET Generation, Transmission & Distribution, 12(9), 1980-1987.
  • 44. Sara Siamak You can find me at s.siyamak@shirazu.ac.ir 44