Phasor Measurement Unit (PMU) in the power grids is a device to measure the voltage of a bus and current of branches connected to the bus. The measured signals are time tagged by GPS signals to synchronize all measurement data all over the grid. PMU dependence on GPS signals makes it vulnerable to GPS spoofing attacks.
Today’s satellite navigation systems rely on constellations of satellites operating in medium earth orbits in several orbital planes. Each satellite broadcasts a signal containing orbital data and the precise time at which the signal was broadcast. The precise time is generated by a very accurate atomic clock on board the satellite. A satellite navigation receiver is able to determine its position very accurately from this information, if it is receiving signals from four or more satellites simultaneously. There are two types of satellite navigation system currently deployed – Regional Satellite Systems (RSS) or Global Navigation Satellite Systems (GNSS).
A cyber attack on the GNSS system could exploit the RF channels used by Receivers for GNSS signal reception, alternatively it could also (at least as easily) exploit the channel used by a Positioning, Navigation and Timing (PNT) system to report its position.
Once it is understood that the evolution of GNSS threats does not only have clear parallels with the way that IP threats have evolved, but shares many of the features of a connected network, it can be seen that many of the lessons learned by the Information Security community apply equally as well to the GNSS community.
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The simulation waveforms are obtained using ModelSim-Altera10.1d
FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
A Field Programmable Gate Array (FPGA) based hardware architecture for the scan-to-scan discriminator using
Fixed Threshold and Clutter Map for radar target detections is developed. Compilation reports and board
programming files have been obtained using Quartus II 13.1. Altera-Stratix V FPGA signal processing board
has been used as a target device for the implementation purpose.
Today’s satellite navigation systems rely on constellations of satellites operating in medium earth orbits in several orbital planes. Each satellite broadcasts a signal containing orbital data and the precise time at which the signal was broadcast. The precise time is generated by a very accurate atomic clock on board the satellite. A satellite navigation receiver is able to determine its position very accurately from this information, if it is receiving signals from four or more satellites simultaneously. There are two types of satellite navigation system currently deployed – Regional Satellite Systems (RSS) or Global Navigation Satellite Systems (GNSS).
A cyber attack on the GNSS system could exploit the RF channels used by Receivers for GNSS signal reception, alternatively it could also (at least as easily) exploit the channel used by a Positioning, Navigation and Timing (PNT) system to report its position.
Once it is understood that the evolution of GNSS threats does not only have clear parallels with the way that IP threats have evolved, but shares many of the features of a connected network, it can be seen that many of the lessons learned by the Information Security community apply equally as well to the GNSS community.
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The simulation waveforms are obtained using ModelSim-Altera10.1d
FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
A Field Programmable Gate Array (FPGA) based hardware architecture for the scan-to-scan discriminator using
Fixed Threshold and Clutter Map for radar target detections is developed. Compilation reports and board
programming files have been obtained using Quartus II 13.1. Altera-Stratix V FPGA signal processing board
has been used as a target device for the implementation purpose.
IDGA is excited to announce registration is now open for the 7th Annual Military Radar Summit – the premier military radar community event of the year! We had an excellent turnout last year and are building on this success through innovative sessions and speakers for 2014.
This year’s event is on the “business of radars” that seeks to bridge gaps between DOD, US Government, OEM’s, subcontractors, academia, and businesses of all sizes. It provides a forum for radar stakeholders to look to the future of military radar while examining projects aimed at prolonging the lives of current US military radars.
Location in ubiquitous computing, LOCATION SYSTEMSSalah Amean
This presentation is a simple effort to survey positioning systems which is part o
Introduction
Location system
Global Positioning System
Active Badge
Active Bat
Cricket
UbiSense
RADAR
Place Lab
PowerLine Positioning
ActiveFloor
Airbus and Tracking with Cameras
Credit:
1-the presentation follows the book of "Ubiquitous computing fundamentals by John Krumm " 2010 .
2- few videos are downloaded and integrated with the presentation. Most of the videos are important to explain about each topics they are placed in
This presentation is related to the working of Radar Bullet. Radar Bullet is one of the applications of RADARS. It is widely employed in detection of landmines without any risk factor. This presentation was created using several references. Thanks for the valuable information.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The proposed architectures have been designed using MATLAB R2007b.
Data Communications,Data Networks,computer communications,multiplexing,spread spectrum,protocol architecture,data link protocols,signal encoding techniques,transmission media
IDGA is excited to announce registration is now open for the 7th Annual Military Radar Summit – the premier military radar community event of the year! We had an excellent turnout last year and are building on this success through innovative sessions and speakers for 2014.
This year’s event is on the “business of radars” that seeks to bridge gaps between DOD, US Government, OEM’s, subcontractors, academia, and businesses of all sizes. It provides a forum for radar stakeholders to look to the future of military radar while examining projects aimed at prolonging the lives of current US military radars.
Location in ubiquitous computing, LOCATION SYSTEMSSalah Amean
This presentation is a simple effort to survey positioning systems which is part o
Introduction
Location system
Global Positioning System
Active Badge
Active Bat
Cricket
UbiSense
RADAR
Place Lab
PowerLine Positioning
ActiveFloor
Airbus and Tracking with Cameras
Credit:
1-the presentation follows the book of "Ubiquitous computing fundamentals by John Krumm " 2010 .
2- few videos are downloaded and integrated with the presentation. Most of the videos are important to explain about each topics they are placed in
This presentation is related to the working of Radar Bullet. Radar Bullet is one of the applications of RADARS. It is widely employed in detection of landmines without any risk factor. This presentation was created using several references. Thanks for the valuable information.
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...IJERD Editor
For an operational radar, backscatter of the transmitted signal by the elements of the sea surface
often places severe limits on the detect ability of returns from ships, missiles, navigation buoys, and other
targets sharing the radar resolution cell with the sea surface. These interfering signals are commonly referred to
as sea clutter, or sea echo. Maritime surveillance radar experiences serious limitations imposed on their
performance by unwanted sea clutter.
In the marine environment, sea clutter might occur at a random position in one scan but not in the next or
subsequent scans. In contrast, targets will appear from scan to scan with essentially the same amplitude. The
scan-to-scan discriminator eliminates “spiky” clutter by using one of the 3 approaches. They are:
1. Fixed Threshold.
2. Cell Averaging Constant False Alarm Rate (CA- CFAR).
3. Clutter Map.
The output of the scan-to-scan discriminator is then used to tag the speed of small marine targets and gating
approach is used to tag the speed of large marine targets.
The proposed architectures have been designed using MATLAB R2007b.
Data Communications,Data Networks,computer communications,multiplexing,spread spectrum,protocol architecture,data link protocols,signal encoding techniques,transmission media
GPS World wide navigation and tracking systemarafyghazali
completer description about the historu and invention,developmental stages,architecture,working,advantages,errors,signals,functionality,aims,advancements and future prospects and remedies of solution about global positioning system.GPS
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
Wireless sensor networks have been widely applied to various domains such as environmental monitoring
and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio
jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low
network throughput because of jamming signals. Failure of data transmission in sensor networks is due to
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent
years to deal with these jammer attacks. However, each defence technique is suitable for only a limited
network range and specific jamming conditions. This paper proposes an adaptive approach to detect and
isolate the reactive jammers by using status messages and trigger identification service.
An Approach to Spectrum Sensing in Cognitive Radio IOSR Journals
Recent research shows that more than 70% of the available spectrum is not utilized
efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient
utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or
not. The term cognitive radio refers to the adoption of radio parameters using the sensed information
of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is
room for researchers in this field to explore more sophisticated approaches. There are three major
categories of spectrum sensing techniques; transmitter detection, receiver detection and interference
temperature detection. This thesis presents a survey of techniques suggested in the literature for
spectrum sensing with a performance analysis of transmitter-based detection techniques.
An Approach to Spectrum Sensing in Cognitive RadioIOSR Journals
Abstract: Recent research shows that more than 70% of the available spectrum is not utilized efficiently. The bandwidth becomes expensive due to a shortage of frequencies. Therefore for efficient utilization of spectrum, we need to sniff the spectrum to determine whether it is being used by primary user or not. The term cognitive radio refers to the adoption of radio parameters using the sensed information of the spectrum. There are various spectrum sensing techniques proposed in the literature but still there is room for researchers in this field to explore more sophisticated approaches. There are three major categories of spectrum sensing techniques; transmitter detection, receiver detection and interference temperature detection. This thesis presents a survey of techniques suggested in the literature for spectrum sensing with a performance analysis of transmitter-based detection techniques. Keywords— Include at least 5 keywords or phrases
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016) Adam Paterson
Calnex and Spirent presentation from ITSF 2016, giving an overview of GNSS spoofing, and experimental results of the effects of spoofing on PTP Grandmaster clocks with integrated GNSS receivers.
Signal detection in cognitive radio network (CRN) is influenced by several factors. One of them is
malicious user that emulate primary user (PU) signal. Emulation of PU signal causes detection error. This
paper investigates the impact of malicious user attack to PU signal detection. A number of malicious users
are randomly deployed around secondary user (SU) at a certain distance. They attempt to attack primary
signal detection that is transmitted from 100 km to SU receiver. Then, the received signal power at
secondary receiver and the performance of probability of false alarm and probability of miss detection
under two hypothesis of Neyman Pearson criterion are studied. The derived results show that a number of
malicious users has a significant impact to the performance of received power at SU and detection error
rate.
Jskkgkemgkdigieig
Re igkrkg
U
H
T
Rieogkskkfkfkeokdkdlwd
Feor. Eit eir r rid tnekt rb r r eir jekfkvkvind djcjejd bdicjebskjdbd skocck neb dkckcjcjjebd. Ksjsbd ekebenks d dndke. D dkdmm
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Student information management system project report ii.pdf
Introducing GPS Spoofing Attack on Power Grids and Counteract Methods
1. Introducing GPS Spoofing Attack on Power
Grids and Counteract Methods
Applied Control & Robotic Research Laboratory of Shiraz University
Shiraz, Iran
By: Sara Siamak
2. Contents
▣ Introduction
▣ Global Positioning System (GPS)
▣ PMU Overview
▣ GPS Spoofing Attack
▣ Attack Counteract Methods
▣ Literature Review
▣ Conclusion
▣ References
2
4. “ Many navigation systems and network synchronization equipment
rely on GPS signals to determine their location and time.
The structure of GPS signals is well known to the public, so it is
possible to build a system that produces fake GPS signals.
Sending fake signals to GPS receivers can make them look for
false signals and cause the receivers to find their location and time
through the fake signals. This is called GPS Spoofing Attack.
4
5. “
In the power grid, time synchronization is very valuable because it
is a complex, interconnected and interdependent network.
One of the most important things to do in a power grid is to
estimate the states of the power system.
In the last decade, the use of PMU for real-time network estimation
has increased.
PMUs depend on GPS for time synchronization. This dependency
makes them vulnerable to GPS spoofing attacks.
5
7. “
The GPS signal contains location and time
information
GPS satellites clock have not any offset from
the world clock
The GPS receiver cannot find its exact position
simply by receiving this signal from the satellite
because the receiver has an uncertain offset
relative to the world clock.
7
Global Positioning System (GPS)
8. “
GPS receiver position
GPS receiver offset
It has 4 unknowns so 4 visible satellites are needed
Trilateration process: The process of determining relative or
absolute position using geometry that is applicable to GPS.
With this process, the receiver calculates its position and time offset.
8
Unknowns for a GPS Receiver
3 unknowns
(x, y, z)
1 unknown (𝑡 𝑢)
9. “
GPS Receiver Offset: 𝑡 𝑢
Speed of light: 𝑐
The Pseudo-Distance between the
Receiver and the 1st Satellite: p1
Receiver Coordinates: x, y, z
𝑛th Satellite Coordinates: xn, yn, zn
Local Receiver Time: tl
Sending Time from 𝑛th Satellite:tl
9
Trilateration process
10. “
GPS satellites contain two important signals:
civilian signal, L1 and military signal, L2.
These signals must pass through the
ionosphere layer in their path to the ground,
causing a delay in them.
Because the frequencies of L1 and L2 are
different, they are delayed with different
values.
10
GPS Signals
11. “
These signals are modulated by the
pseudo-random noise sequence code
that is unique to each satellite. These
include civilian C/A and P military
codes.
The civilian C/A code is only sent at the
frequency of L1, while the military code
P is sent at the frequency of L1and L2
11
The Structure of Signals L1 and L2
13. “
The PMU is a device that is installed
in the post and is able to measure the
voltage of the bus voltage and the
current of the branches connected to
the bus.
The PMU uses a GPS receiver for
time synchronization.
GPS signals provide the time labels
for the measured phasors.
13
Phasor Measurement Unit (PMU)
16. “
The attacker simulates the actual GPS signal.
In this attack, the attacker first causes excessive radio interference on the
L1frequency band.
This interference is accomplished by sending noise signals in the GPS
frequency range.
The attacker then sends spoofing signals to the receiver to lock the receiver
onto the fake signal. (With power slightly above the valid signals’ value)
16
GPS Spoofing Attack
17. “
1- GPS signal simulator
A GPS signal simulator is used to mimic valid GPS signals.
Attributes:
-They are simple
-They do not have GPS receivers, so they are not necessarily synchronized with
actual GPS signals
-They are easily identifiable
17
Techniques for making spoofing signals
18. “2- Receiver-based spoofers
Includes GPS receiver with spoofing transmitter.
Attributes:
They are more complex than GPS simulators
Synchronized with GPS signals
3. Complex receiver-based spoofers
Attributes:
The most sophisticated and effective type of spoofing classifications
Uses several transmission antennas and knows the exact information of the
target receiver antenna
It is very difficult to achieve these spoofers
18
19. “
For a signal with frequency f Hz, the phase measurement error
corresponding to the offset of the receiver is obtained by the following
equation:
φ = 2πft
∈ = [2πf tu
∗
− tu ]
Changes in the measurement phase can cause
- The generators to become unstable
- Normal showing operation of equipment while they are overloaded
- Overload show equipment while they are normal and so on.
19
The Effect of GPS Spoofing on the Power Grid
𝜑∗
= 𝜑+ ∈
φ: Signal phase before attack
𝜑∗
: Signal phase after attack
𝑡 𝑢: Receiver offset before attack
𝑡 𝑢
∗
: Receiver offset after attack
21. “
1) Signal processing defenses
2) Cryptographic defenses
3) Correlation with other timing sources
4) Radio spectrum and antenna defenses
21
Counteract GPS Spoofing Attack
22. 1- Defense Based on Signal Processing
22
Correlation
Peak
Monitoring
Doppler Shift
Detection
Discrimination
of Time of
Arrival
Absolute
Power
Signal to
Interference
Plus Noise
Ratio
Receiver
Autonomous
Integrity
Monitoring
(RAIM)
23. Receiver Autonomous Integrity Monitoring (RAIM)
Predict the location of each satellite using astronomical data from the signals
Finding a conflict by comparing prediction results with the position reported in the
navigation message in the received signals can be caused by an attack.
Defect:
Invalidity of this method when spoofing signals are in the majority
23
24. Signal to Interference Plus Noise Ratio
SINR: Ratio of received signal power to noise power plus other signal interference
A sudden change in the SINR rate could indicate an attack.
𝑺𝑰𝑵𝑹 =
𝑷
𝑰 𝑨𝒖𝒕𝒉
𝟐 + 𝑰 𝑺𝒑𝒐𝒐𝒇
𝟐
+ (
𝝈 𝟐
𝑵
)
24
𝑰 𝑨𝒖𝒕𝒉 : Interference term caused by correlation
with other valid signals
𝑰 𝑺𝒑𝒐𝒐𝒇: Interference term due to correlation with
fake signals
𝝈 𝟐
𝑵
: Filtered noise variance
P: Power of received signal
25. Absolute Power
The spoofer sends its signals at slightly higher power than valid signals to force the
receiver to follow its own signals.
Detection method: Comparison of the absolute power level of the received signal with
the valid signal power
Defects:
Increased receiver hardware complexity
Power of signal changes due to interference from the atmosphere and the sun's gravity
25
26. Doppler Shift Detection
Relative motion between satellite and receiver creating detectable effects caused by
Doppler effect on signal frequency
By simulating the motion of the satellites and comparing them to the real state, he
observed the Doppler collision and detected the attack.
Doppler Effect: Shortening the wavelength when moving to an object or increasing the wavelength
when moving away
26
27. Correlation Peak Monitoring
In the absence of interference between the receiver and the satellite, the power for the
valid signals corresponds to a distribution of 𝜒2.
The correlation peak power of valid signals can be used to detect an attack.
Defects :
Spoofer attempts to approach its signal correlation peak to the peak of the GPS signal
correlation
Invalidity of the distribution assumption 𝜒2
when there is a barrier between the
receiver and the satellite.
27
28. Discrimination of Time of Arrival
The P code is sent at both frequencies 𝐿1and 𝐿2. Therefore, the correlation between
two versions of the P code can be used to calculate the delay.
The delay between the two signals can be calculated for the receiver. And if there is a
conflict between computing and the real state, it could be an attack.
Defect:
A professional spoofer can handle this delay.
28
29. 2- Cryptographic Defense
Using authentication techniques to detect spoofing threats
Applicable for Military version of GPS signals and civilian version of GPS signals
Requires changes to the GPS signal structure.
Bugs:
Delay in diagnosis
It's a costly way.
29
30. 3- Detection based on Correlation Analysis with Other Time
Sources
Received signals can be sent to other GNSS sources for validation.
Sources other than the Global Navigation Satellite System can be used for
validation.
Defects:
Sending many signals to get authorities creates traffic and make them
unreliable.
The accuracy of time sources is less than the global satellite navigation system
30
31. 4- Defense Based on Radio Spectrum and Antenna
31
Discrimination
of Angle of
Arrival
Removable
Antenna
32. “
The signals received from a spoofing
source have a different input angle than
the satellite signals.
This method uses two antennas that
intersect at a certain distance and
calculate the angle of entry of the
signals.
Defect:
This technique may fail in a multi-
antenna-based spoofing attack.
32
Discrimination of Angle of Arrival
33. “
Moving a single antenna along a
random path
For a model that is not under attack,
different effects of the antenna motion
on different satellites are predicted.
The correlation between the received
signals in the spoofing attack mode
indicates the occurrence of the attack.
33
Removable Antenna
35. 35
…
Dana
First came up
with the idea
of RAIM
McDowell et
al.
Introduces the
SINR
evaluation
method
Jovanovic et
al.
Validation of
the Doppler
effect change
observation
method
Montgomery
et al.
Applying the
angle of arrival
technique
Wesson et al.
Evaluation of
correlation
peak detection
method
1997 2007 2008 2009 2011
36. 36
…
Zhang et al.
Using two
different
types of
antennas to
detect attack
Jiang et al.
Formulate a
GPS spoofing
attack on the
PMU with
solving a
maximization
problem
Psiaki et al.
Introducing
the idea of a
removable
antenna
Yu et al.
Using a set of
GPS receivers
to detect
spoofing attack
on power grids
Fan et al.
Applying the
mechanism of
cross-layer
detection of
physical layer and
upper layer of
network against
GPS spoofing
attack on PMUs
2012 2013 2014 2015
Konovaltsev
et al.
Use array
antenna and
angle of
arrival entry
technique
37. 37
…
Fan et al.
Spoofing-matched
algorithm using signal
processing techniques and
estimation of power
system modes based on
synchronous phasers (this
method detects an attack
on a PMU and corrects its
data)...
Yasinzadeh and Akhbari
- Providing a method based on
power Grid Infrastructure using
measured phase analysis and
state estimation
This method is compatible with
other available anti-spoofing
methods
In addition to detecting an
attack, it also corrects false data
2017 2018
39. “ Research suggests that GPS-based networks are
vulnerable to GPS spoofing attack.
Power grids are also vulnerable to cyberattacks, and GPS
spoofing is part of the danger.
A spoofer can cause network operators to perform
improper or unnecessary control actions.
Therefore, protection of these damages is essential in
modern power networks.
39
41. 41
[1] Kaplan, E. D., Leva, J. L., & Pavloff, M. S. (1996). Fundamentals of satellite navigation. Understanding GPS-
Principles and applications(A 96-41027 11-17), Norwood, MA, Artech House, 1996,, 15-57.
[2] Infrastructure, T. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning
system. Technical Report, Center, John A. Volpe National Transportation Systems
[3] McDowell, C. E. (2007). U.S. Patent No. 7,250,903. Washington, DC: U.S. Patent and Trademark Office.
Papadimitratos, P., & Jovanovic, A. (2008, November). GNSS-based positioning: Attacks and countermeasures. In
Military Communications Conference, 2008. MILCOM 2008. IEEE (pp. 1-7). IEEE.
[4] Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009). A multi-antenna defense: Receiver-autonomous GPS
spoofing detection. Inside GNSS, 4(2), 40-46.
[5] Humphreys, T., Bhatti, J., & Ledvina, B. (2010). The GPS Assimilator: a method for upgrading existing GPS user
equipment to improve accuracy, robustness, and resistance to spoofing.
[6] Wesson, K. D., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2011, September). An evaluation of the vestigial
signal defense for civil GPS anti-spoofing. In Proceedings of the ION GNSS Meeting.
[7] Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a
review of antispoofing techniques. International Journal of Navigation and Observation, 2012.
[8] Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units
to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5(3-4), 146-153.
42. 42
[9] Jafarnia-Jahromi, A., Daneshmand, S., & Lachapelle, G. (2013). Spoofing countermeasure for GNSS receivers–a
review of current and future research trends. Proc. on the 4th Intern Colloquim on Scientific and Fundamental Aspects of
the Galileo Programme, 1-8.
[10] Psiaki, M. L., Powell, S. P., & O’hanlon, B. W. (2013, September). GNSS spoofing detection using high-frequency
antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting (pp. 2949-2991).
[11] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., & Basin, D. (2014, July). Short paper: detection of GPS spoofing
attacks in power grids. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile
networks (pp. 99-104). ACM.
[12] Konovaltsev, A., Caizzone, S., Cuntz, M., & Meurer, M. (2014, September). Autonomous spoofing detection and
mitigation with a miniaturized adaptive antenna array. In Proceedings of the 27th Technical Meeting of Satellite Division
of The Institute of Navigation ION GNSS+ 2014 (pp. 2853-2861). The Institue of Navigation, USA.
[13] Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., & Li, H. (2015). A cross-layer defense mechanism
against GPS spoofing attacks on PMUs in smart grids. IEEE Transactions on Smart Grid, 6(6), 2659-2668.
[14] Schmidt, D., Radke, K., Camtepe, S., Foo, E., & Ren, M. (2016). A survey and analysis of the gnss spoofing threat
and countermeasures. ACM Computing Surveys (CSUR), 48(4), 64.
[15] Fan, X., Du, L., & Duan, D. (2017). Synchrophasor data correction under gps spoofing attack: A state estimation
based approach. IEEE Transactions on Smart Grid.
[16] Yasinzadeh, M., & Akhbari, M. (2018). Detection of PMU spoofing in power grid based on phasor measurement
analysis. IET Generation, Transmission & Distribution, 12(9), 1980-1987.