SlideShare a Scribd company logo
Best practices for
secure PNT
management in a
multi-vendor
environment
3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran
WSTS, March 13-16, Vancouver, BC
2023 © ADTRAN, INC.
2
What’s the cost of GNSS/PNT service disruption?
$1B/day in economic cost*
*source: RTI & NIST 2019
Finance
Communications
Power grids
Transportation
Data centers
All supported by
PNT threats
GPS & US critical infrastructure under national security threats
2023 © ADTRAN, INC.
3
*US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES
Federal* resilient PNT service requirements
Finance
Power Grid
Communications
Data Centers
Transportation
According to RTI & NIST cost of PNT disruption is $1B /Day
• Focus
• On Timing as it enables P & N
• Protect
• Critical gov/industry infrastructure against PNT services disruption from
GNSS & network timing attacks - GPS/GNSS is a single point of failure
• Deploy
• Resilient, multisource & self survivable PNT assurance systems
• Target
• Critical infrastructure sectors under national security threats
• Use
• Published PNT assurance guidelines & standard in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1)
• IEEE P1952 Resilient PNT UE working group
aPNT - assured Positioning, Navigation & Timing
2023 © ADTRAN, INC.
4
Five secure PNT assurance management principles
1) DHS Resilient PNT guideline specifies the use of
multiple sources vs. a user’s risk profile
2) NIST zero-trust PNT source strategy: “never trust,
always verify”
3) For secure PNT services, GNSS is a single point of
failure & needs 1 or more backup sources
4) Secure, resilient & assured PNT needs six 9’s reliability
5) In a multi-vendor network environment, secure PNT can
only be achieved with a vendor-agnostic GNSS
assurance system
2023 © ADTRAN, INC.
5
GNSS vulnerabilities and threats
GNSS for
timing
Jamming and
spoofing
Environmental
obstructions
Interference with
transmitters at
adjacent bands
ionospheric
disturbance,
solar activity
GNSS disturbances Multiple threat agents
2023 © ADTRAN, INC.
6
How to protect millions of GNSS in use worldwide?
Finance
Power Grid
Communications
Data Centers
Transportation
GNSS timing receiver
PNT threats
2023 © ADTRAN, INC.
7
Zero-trust multi-source PNT management architecture
control + visibility+ assurance + scalability + redundancy
detection + verification + backup + mitigation
multisource
monitoring/
management
PNT threats
AI-based PNT assurance platform
2023 © ADTRAN, INC.
8
VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION
AI-based centralized sync assurance
Key functionality
• Visualization of network-wide sync distribution routes
• Visualization of device-level internal timing topology
• Intelligent sync network health indicators and sync performance
reports
• Probing of device-level clock references
• Remote PTP clients monitoring
• Vendor-agnostic GNSS assurance with AI-based threat detection
and mitigation settings
2023 © ADTRAN, INC.
9
AI-based GNSS observables and assurance
Data metrics from GNSS receiver’s API
• Location
• Latitude
• Longitude
• Altitude
• Satellites data
• SV
• Carrier to Noise
• Health
• Azimuth and Elevation
• AGC
AI-based vendor-agnostic analytics from all GNSS
receivers across the network for GNSS assurance
AI-based GNSS
threat detection
2023 © ADTRAN, INC.
10
AI-based GNSS site analysis and performance monitoring
AI-based detection of local
GNSS reception issues
2023 © ADTRAN, INC.
11
AI-based vendor-agnostic GNSS receiver assurance
AI-based threat detection and mitigation capabilities
• Real-time monitoring of GNSS observables
from all the GNSS receivers in the network
• Real-time analysis of relevant data from all
the GNSS receivers in the network
• AI/ML-based algorithms to detect, alert and
mitigate GNSS attacks and vulnerabilities
• Automatic re-routing of synchronization
references across the network for sync
assurance
Key requirements
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
Vendor-agnostic GNSS
receiver assurance system
AI-based GNSS
threat detection
Thank you!

More Related Content

Similar to Best practices for secure PNT management in a multi vendor environment

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
ADVA
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET Journal
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
sarancbe2002
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Safe Software
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
ADVA
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
Adtran
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
ADVA
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
ADVA
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar
 
SEDRP
SEDRPSEDRP
file4.pdf
file4.pdffile4.pdf
file4.pdf
RajShah860705
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET Journal
 

Similar to Best practices for secure PNT management in a multi vendor environment (20)

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
SEDRP
SEDRPSEDRP
SEDRP
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

More from Adtran

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Adtran
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
Adtran
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
Adtran
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
Adtran
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
Adtran
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
Adtran
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Adtran
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
Adtran
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
Adtran
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
Adtran
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
Adtran
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
Adtran
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
Adtran
 

More from Adtran (18)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
 

Recently uploaded

Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 

Recently uploaded (20)

Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 

Best practices for secure PNT management in a multi vendor environment

  • 1. Best practices for secure PNT management in a multi-vendor environment 3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran WSTS, March 13-16, Vancouver, BC
  • 2. 2023 © ADTRAN, INC. 2 What’s the cost of GNSS/PNT service disruption? $1B/day in economic cost* *source: RTI & NIST 2019 Finance Communications Power grids Transportation Data centers All supported by PNT threats GPS & US critical infrastructure under national security threats
  • 3. 2023 © ADTRAN, INC. 3 *US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES Federal* resilient PNT service requirements Finance Power Grid Communications Data Centers Transportation According to RTI & NIST cost of PNT disruption is $1B /Day • Focus • On Timing as it enables P & N • Protect • Critical gov/industry infrastructure against PNT services disruption from GNSS & network timing attacks - GPS/GNSS is a single point of failure • Deploy • Resilient, multisource & self survivable PNT assurance systems • Target • Critical infrastructure sectors under national security threats • Use • Published PNT assurance guidelines & standard in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1) • IEEE P1952 Resilient PNT UE working group aPNT - assured Positioning, Navigation & Timing
  • 4. 2023 © ADTRAN, INC. 4 Five secure PNT assurance management principles 1) DHS Resilient PNT guideline specifies the use of multiple sources vs. a user’s risk profile 2) NIST zero-trust PNT source strategy: “never trust, always verify” 3) For secure PNT services, GNSS is a single point of failure & needs 1 or more backup sources 4) Secure, resilient & assured PNT needs six 9’s reliability 5) In a multi-vendor network environment, secure PNT can only be achieved with a vendor-agnostic GNSS assurance system
  • 5. 2023 © ADTRAN, INC. 5 GNSS vulnerabilities and threats GNSS for timing Jamming and spoofing Environmental obstructions Interference with transmitters at adjacent bands ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 6. 2023 © ADTRAN, INC. 6 How to protect millions of GNSS in use worldwide? Finance Power Grid Communications Data Centers Transportation GNSS timing receiver PNT threats
  • 7. 2023 © ADTRAN, INC. 7 Zero-trust multi-source PNT management architecture control + visibility+ assurance + scalability + redundancy detection + verification + backup + mitigation multisource monitoring/ management PNT threats AI-based PNT assurance platform
  • 8. 2023 © ADTRAN, INC. 8 VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION AI-based centralized sync assurance Key functionality • Visualization of network-wide sync distribution routes • Visualization of device-level internal timing topology • Intelligent sync network health indicators and sync performance reports • Probing of device-level clock references • Remote PTP clients monitoring • Vendor-agnostic GNSS assurance with AI-based threat detection and mitigation settings
  • 9. 2023 © ADTRAN, INC. 9 AI-based GNSS observables and assurance Data metrics from GNSS receiver’s API • Location • Latitude • Longitude • Altitude • Satellites data • SV • Carrier to Noise • Health • Azimuth and Elevation • AGC AI-based vendor-agnostic analytics from all GNSS receivers across the network for GNSS assurance AI-based GNSS threat detection
  • 10. 2023 © ADTRAN, INC. 10 AI-based GNSS site analysis and performance monitoring AI-based detection of local GNSS reception issues
  • 11. 2023 © ADTRAN, INC. 11 AI-based vendor-agnostic GNSS receiver assurance AI-based threat detection and mitigation capabilities • Real-time monitoring of GNSS observables from all the GNSS receivers in the network • Real-time analysis of relevant data from all the GNSS receivers in the network • AI/ML-based algorithms to detect, alert and mitigate GNSS attacks and vulnerabilities • Automatic re-routing of synchronization references across the network for sync assurance Key requirements GNSS Receiver GNSS Receiver GNSS Receiver GNSS Receiver Vendor-agnostic GNSS receiver assurance system AI-based GNSS threat detection