460 likes | 476 Views
The Vulnerability of GPS. Robert James CSE 914 Spring 2019. Presentation Overview. Introduction Brief History of GPS Development How GPS Works GPS Security Issues GPS Security Tools Conclusion Addendum – Time permitting. Introduction.
E N D
The Vulnerability of GPS Robert James CSE 914 Spring 2019
Presentation Overview • Introduction • Brief History of GPS Development • How GPS Works • GPS Security Issues • GPS Security Tools • Conclusion • Addendum – Time permitting
Introduction • Successful travel is dependent on accurate determination of location. The Global Positioning System (GPS) has, since the mid 1990’s, seen wide spread use in providing this functionality. The problem is that GPS messages can be compromised.
Introduction II • As GPS is to be incorporated into autonomous vehicles it is imperative that such vehicles be capable of detecting and mitigating attacks attempting to compromise GPS performance and accuracy.
Introduction III • Major goal of this project was to determine what aspects of GPS security need scrutiny. The first step taken was to examine the current research pertaining to GPS security. Only by examining the current research can determination be made regarding the direction future research need take.
2.1 Key People in GPS Development The accredited inventors of the GPS: (From left to right) Bradford Parkinson, Dr. Ivan Getting, and Roger Easton (from [2]). Dr. Gladys West (far right) was an instrumental member of the development team. All pictures from: https://geoawesomeness.com/who-invented-the-gps/
2.2 GPS Time Table • 1973, a Labor Day weekend meeting led to the design of the Global Positioning System. • 1977, the first receiver test. • 1978, February. First satellite is launched. • 1978-1985, eleven Block I satellites were placed in orbit • 1983, following the shooting down of South Korean flight 007, which had inadvertently trespassed into the Soviet Union’s airspace, GPS was extended to the civilian sector. • 1989, the first of the Block II satellites was put into orbit. Magellan Corporation releases the first handheld GPS receiver. • 1994, the last of the Block II satellites is put into orbit. • 1995, GPS is formally activated and declared fully operational. • 2000, Selective Availability (SA) was deactivated by presidential decree. This allowed for accuracy to go from ~100 meters to ~20 meters (or less).
2.3 GPS Today From: A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing [2]
2.4 GPS Areas of Usage • Navigation • Cellphone towers (Verizon), to calibrate the frequency and timing of transmissions. • Power grid, to coordinate time stamps for phasor movements. • Traffic lights. • Air traffic control towers. • Tracking parolee movement, ankle bracelet. • Internet timestamps • Stock transactions
How GPS Work Figure 1: GPS Signal Structure C/A: Coarse Acquisition From: A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing [2]
How GPS Works Figure 2: An Example of GPS signal time delay. From: A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing [2]
How GPS Works A 2-D Representation of Finding a Position From: A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing [2]
How GPS WorksA Review • Each satellite has a unique identification code (C/A code) that is repeated every millionth of a second. • NAV/System provides system with information about the position of the satellite and precise timing data from the satellite’s (Cesium) clock. • GPS receiver reads C/A code and generates a matching internal C/A code. This technique is used to determine the travel time of the signal (Figure 2). Once that is known the distance between the satellite and receiver can be determined. • Figure 3, look at overlap to determine position and GPS receiver’s clock error From: A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing [2]
The Start of Documented Concern Over GPS Security Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System August 29, 2001 Prepared by John A. Volpe National Transportation Systems Center [5]
Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System “[a]s GPS further penetrates into the civil infrastructure, it becomes a tempting target that could be exploited by individuals, groups or countries”. From: Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System [5]
Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System A.2 GPS DISRUPTION MECHANISMS GPS is susceptible to disruption by both unintentional and intentional mechanisms. Unintentional mechanisms include ionospheric effects, interference from other RF emitters, and signal blockage. Human error can also disrupt GPS services. Intentional disruption mechanisms include jamming, spoofing and meaconing. From: Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System [5] page 64
4.1 GPS Jamming In 2009 Newark Liberty International Airport was testing a new air traffic control system called Smartpath. It worked so well that the product was purchased. As they continued testing Smartpath airport personnel noticed that occasionally, seemingly at random, it would stop working. The culprit wasn’t the product, rather one Gary Bojczak took exception to having his employer track his movements via the GPS installed in his assigned truck. He installed a GPS jamming device in his truck which, as he drove by the airport, interfered with Smartpath’s GPS receivers. After a three month investigation Mr. Bojczak was caught and fined $32,000 [6 ]. From “Why GPS is more Vulnerable Than Ever”
4.2 GPS Spoofing • Ranganathan et. al., [6] have four categories for spoofing attacks. Category is determined by, 1. the faux signal’s time synchronicity with real signals, and 2. consistency with respect to the navigation messages. • 1. Non-coherent and modified message contents. Easy to do, requires no technical expertise. • 2. Non-coherent but unmodified message contents. By modifying timing an attacker can spoof the receiver to a desired (by the attacker) location. In this category is Meaconing. • 3. Coherent but modified message contents. It has been shown that a variety of commercial GPS receivers are susceptible to this attack [3]. Can physically damage GPS receiver. (Phase two of seamless takeover attack). • 4 Coherent and unmodified message contents. Phase one of the seamless takeover attack. • Seamless lock takeover and Meaconing attacks are considered to be a very strong attacks. Required is considerable technical expertise and access to sophisticated equipment. SPREE: A Spoofing Resistant GPS Receiver
GPS SpoofingNo Expertise Required Attack RTL-SDR Blog R820T2 RTL2832U 1PPM TCXO SMA Software Defined Radio with 2x Telescopic Antennas Price $29.95 (Amazon) Demo/Instructions on how to use the equipment for GPS spoofing: Courtesy of Crazy Danish Hacker https://www.crazydanishhacker.com/tag/gps/
At Least One GPS Spoofing Attack Against Automobiles Has Occurred • https://cyware.com/news/seven-car-manufacturers-hit-by-gps-spoofing-attacks-146701c4
4.2.1 The Seamless Lock Takeover Attack Spoofing Steps: • Fabricate valid PRN code for each satellite • Broadcast weak (faint) signals carrying the same codes of all nearby satellites at once. • Next comes “drag-off” where the attacker(s) slowly override the true signals. They slowly increase the power of the faux signals until the receiver catches onto these signals. Once the receiver latches onto the false signals the attacker is free to do what they set out to do. • Requires expensive equipment and extensive technical know-how and close proximity. Protecting GPS From Spoofers Is Critical to the Future of Navigation
Other Instances of GPS Spoofing, Rumored or Verified. • There are rumors of the Russians having “weaponized” GPS spoofing. • https://www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/ • Iranians may have used GPS spoofing to mislead US sailors and hijack CIA stealth drone. (Meaconing) • In 2013 students from the University of Texas were able to affect a super yacht’s course via GPS spoofing [6]. • Pokemon Go – GPS spoofing was used to lure players to locations where they were robbed. • Australia – iPhone GPS malfunction led vacationers into desert where they had to be rescued. • A demonstration of a successful GPS spoofing attack on a military grade drone was conducted at the White Sands Military Base.
5.0 GPS Security Tools Advanced receivers will perform the Receiver Autonomous Integrity Monitoring (RAIM) algorithm. RAIM checks navigation data and other parameters to see if they comply with the current orbital parameters. Problem is that spoofing may start out with all the correct data and hence is not caught by RAIM. [8] GPS Spoofing Detection using RAIM with INS Coupling
SPREE Enter SPREE. According to Ranganathan et. al.[6], SPREE is the first commercial off-the-shelf (COTS), single antenna, GPS receiver capable of detecting and limiting all known GPS spoofing attacks. • SPREE reduces the maximum spoofing distance to one kilometer. • SPREE consists of two key components: • Auxiliary Peak Tracker (APT). The APT can track multiple signals, not just the strongest. Multiple signals originating from the same satellite are examined and if found to be beyond a certain time threshold a spoofing attack is declared. • Navigation Message Inspector (NAVI). Checks time stamp of consecutive messages. Compares navigational data of consecutive messages and from all satellites. • SPREE requires no additional hardware and supports all platform and file sources supported by GNSS-SDR. • SPREE only detects spoofing, it doesn’t determine action to take. • It acknowledges possibility of false alarms, but gives no number. SPREE: A Spoofing Resistant GPS Receiver
Antennae Array Processing • Is based on fact that almost all spoofing attacks produce signals that radiate from a single source. So, simplistically speaking, if multiple GPS signals have the same direction of arrival (DOA) a spoofing detection alert can be produced. It has been found more reliable to compare phase delays rather than actual DOAs. • Gives high probability of detection and low probability of a false alarm. • Requires minimum of four satellite signals. If only four satellites, there must not be a low signal-to-noise ratio. • Could be extended to provide a mitigation solution. Allows for detecting source of spoofing signal and rejecting signals from that source. • Requires additional hardware, more expensive. • Currently most robust technique [9]. Detection and Mitigation of GPS Spoofing Based on Antennae Array Processing [8]
Ratio Text Metric • Is an extension of the work by Ledvina et. al. [10]. Unfortunately this document is buried in the ION vault. • Authors feel that their results show promise and merit further research. GNSS Spoofing Detection: Theoretical Analysis and Performance of the Ration Test Metric in Open Sky [9]
Multistage Anti-Spoof GPS Interference Correlator (MAGIC) • MAGIC is an algorithm designed to cope with jamming and spoofing. • Filters strong jammers and extracts weak GPS signals. • Detect and extract Spoofers. • Shows promise, but authors admit more research is required. Multistage Anti-Spoof GPS Interference Correlator (MAGIC) [11]
Onboard Inertial Measurement Unit • Target usage is drones. • Idea is to use an inertial measurement unit (IMU) as an inertial navigational system (INS). • Concept is linear acceleration and angular velocity can be integrated over time to calculate the position of the receiver. Problem is that the integration process introduces errors which accumulate. • Tries to minimize integration. • Results were decent, all spoofing attacks were detected. However, under certain conditions, false alarms can be as high as eight percent. An Efficient UAV Hijacking Detection Method Using Onboard Inertial Measure Unit [12]
Conclusions • Advanced receivers use the Receiver Autonomous Integrity Monitoring (RAIM) algorithm. RAIM does not perform well when dealing with flat trajectories. Works well aircraft, not sure it is adequate for surface vehicles. Needs testing to determine its functionality for surface vehicles. • Currently SPREE is the only commercially available spoofing detector. Does not mitigate spoofing. • Several techniques show promise, at least on paper, but are not thoroughly tested. Some of these techniques can mitigate spoofing/jamming. • There is a need for a navigational backup system in event of GPS failure. Recommend INS coupled with visual scanning to locate landmarks that will correlate to current location e.g., mile markers, street signs, overpasses, cell towers, readily identifiable/unique structures. • Other possibilities for backups include eLORAN and cell towers. eLORAN is reputedly cheap, in a relative sense, but the infrastructure needs to be built. Not sure how well it works on land.
Addendum • We’ve scrutinized the GPS vulnerability in regards to GPS signals, but what about the hardware side of GPS? • Referring to GPS receivers, not GPS satellites. • Only one paper, Nighswander et. al. [3], covers this aspect and it was published in 2012. • Can affect more than navigation and autonomous vehicles. • Updated Research definitely needed here.
Vulnerability of GPS Receivers • GPS receivers often are full OSes. • The higher end receivers may include network services. • GPS signals are treated as correct though they are in fact unauthenticated.
Data Layer Attacks • A portion of the Nav/System data pertains to the square root of the semi-major axis of the satellite’s orbit. Set this value to zero (satellite is at the earth’s center) in bogus GPS signal, send signal.
Data Layer Attacks • Good News! • All receiver models tested, but one, rejected the bogus signal. • A description of the behavior of the model that didn’t reject the bogus signal. • The Trimble NetRS threw an exception and tried to resolve the error by doing a warm reboot. System restarted, using the cached data the gpssd daemon tries to do what it is supposed to do i.e. process the data, and throws an exception. Infinite reboot cycle. • Only way out is a cold reboot.
Data Layer Attacks • Bad News! • The NetRS represents 30% and 20% of the global CORS and NTRIP networks, respectively. • National Continuously Operating Reference Station (CORS) • Networked Transport of RTCM via Internet Protocol (NTRIP) • Radio Technical Commission for Maritime Services (RTCM)
Data Layer Attacks • Also possible through GPS signals to alter the GPS date. This should be caught, but in the case of the Arbiter system it is not. To make matters worse the Arbiter’s GPS clock can not be decremented.
OS Layer Attacks • NetRS runs Linux and can be networked via an Ethernet port. Numerous security flaws allow for root access.
Receiver Susceptibility to Attacks From: GPS Software Attacks [3]
Conclusions • Data is old, needs to be reexamined. • Most vulnerabilities appear to be patchable. • Results do show that awareness of the need for GPS receiver security needs to be strengthened.
References [1] J. A. Volpe National Transportation Systems Center, Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System, Final Report, August 2001. [2] J. S. Warner and R. G. Johnston, A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing, The Journal of Security Administration, 25, pp 19-28, 2002. [3] M. L. Psiaki and T.E. Humphreys, Protecting GPS From Spoofers Is Critical to the Future of Navigation, IEEE Spectrum, 2016. [4] K. Zeng, Y. Shu, S. Liu, Y. Dou, and Y. Yang, A Practical GPS Location Spoofing Attack in Road Navigation Scenario, ACM, 2017. [5] J. Uchill, Why GPS is More Vulnerable Than Ever, The Christian Science Monitor, Jan. 2016. [6] A. Ranganathan, H. Olafsdottir, and S. Capkun, SPREE: A Spoofing Resistant GPS Receiver, ACM MobiCom, 2016. [7] T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, and D. Brumley, GPS Software Attacks, Proceedings of the ACM Conference on Computer and Communications Security, 2012.