Detecting GNSS misbehavior leveraging secure heterogeneous time sources

05/05/2023
by   Marco Spanghero, et al.
0

Civilian Global Navigation Satellite Systems (GNSS) vulnerabilities are a threat to a wide gamut of critical systems. GNSS receivers, as part of the encompassing platform, can leverage external information to detect GNSS attacks. Specifically, cross-checking the time produced by the GNSS receiver against multiple trusted time sources can provide robust and assured PNT. In this work, we explore the combination of secure remote, network-based time providers and local precision oscillators. This multi-layered defense mechanism detects GNSS attacks that induce even small time offsets, including attacks mounted in cold start. Our system does not require any modification to the current structure of the GNSS receiver, it is agnostic to the satellite constellation and the attacker type. This makes time-based data validation of GNSS information compatible with existing receivers and readily deployable.

READ FULL TEXT
research
02/22/2022

POSTER: Detecting GNSS misbehaviour with high-precision clocks

To mitigate spoofing attacks targeting global navigation satellite syste...
research
02/23/2022

High-precision Hardware Oscillators Ensemble for GNSS Attack Detection

A wide gamut of important applications rely on global navigation satelli...
research
02/22/2022

Protecting GNSS-based Services using Time Offset Validation

Global navigation satellite systems (GNSS) provide pervasive accurate po...
research
02/23/2022

Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals

With the introduction of Navigation Message Authentication (NMA), future...
research
09/22/2021

Using PPP Information to Implement a Global Real-Time Virtual Network DGNSS Approach

Global Navigation Satellite Systems (GNSS) provide positioning services ...
research
02/22/2022

Authenticated time for detecting GNSS attacks

Information cross-validation can be a powerful tool to detect manipulate...
research
08/14/2018

Multicast Triangular Semilattice Network

We investigate the structure of the code graph of a multicast network th...

Please sign up or login with your details

Forgot password? Click here to reset