38
GPS Laboratory Stanford University Aerospace Engineering Sciences University of Colorado GNSS RFI/Spoofing: Detection, Localization, & Mitigation Stanford's 2012 PNT Challenges and Opportunities Symposium 14 - November - 2012 Dennis M. Akos University of Colorado/Stanford University with contributions from many at CU and Stanford

GNSS RFI/Spoofing: Detection, Localization, & Mitigation

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

GNSS RFI/Spoofing: Detection, Localization, & Mitigation

Stanford's 2012 PNT Challenges and Opportunities Symposium

14 - November - 2012

Dennis M. AkosUniversity of Colorado/Stanford University

with contributions from many at CU and Stanford

Page 2: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 3: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 4: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Background & Motivation• GPS/GNSS signals need robustness and integrity for critical applications • Personal privacy devices (PPD) appear to be proliferating• Simplistic/sophisticated GPS spoofing has been demonstrated

• Leverage the receiver’s automatic gain control (AGC) for “event” detection and confidence in the integrity of measurements

$15 GPSJammer

Page 5: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Where to Detect RFI/Spoofing: AGC

To minimize losses the amplitude of the

received signal has to be adjusted to the range of the ADC

2.046 MHz≈ -130 dBm

IF (MHz) Freq

Power

≈ -111 dBm

(2 MHz BW)

-- GPS C/A

-- Noise floor-- RF filter

• AGC measures the noise floor of the antenna/receiver (signal captured in the ADC)

• Any additional energy (RFI or spoofing) in the band will result in an AGC change

• Very low computational metric available on any multibit GPS/GNSS receiver

Page 6: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 7: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Low-Cost GPS RFI Detection/Characterization Sensor

MIX ADC

IF data : 13.7 GB / hr

AGC data : 1.3 MB / hr

GPS

RFIAGC

USB 2 controllerADC

2 channels I/Q

~8MHz 2bits

~100Hz 32bits

Page 8: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Add Notebook PC for Complete System

Recording program

Circular buffers (100sec)

Trigger

IF file100sec

AGC file100sec

AGC fileContinuous

IF data : 13.7 GB / hr

AGC data : 1.3 MB / hr

Post processingReport generator script

Spectrogram generation

AGC plot

LaptopLow computational requirementsLow cost CPU + 3GB RAM

Page 9: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

System Deployment at Two Airports• Systems were deployed at two different

airports and data logged during Aug-2011» LLA – Luleå, Sweden» KHH - Kaohsiung, Taiwan

Page 10: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Description of Luleå, Sweden [LLA]

• Position : 65.550N, 22.122E• ~ 900k passengers in 2010• 7km from the town of Luleå• No highways within 5km • Significant marine traffic in

the area

Page 11: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Description of Kaohsiung, Taiwan [KHH]

• Position: 22.580N,120.332E • ~4000k passengers in 2010• Locate at the downtown of

Kaohsiung city• Neighbors with the Kaohsiung

harbor• Surrounded by several major

roads • Heavy traffic nearby

Page 12: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Data collected at LLA in Aug

Page 13: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Data collected at KHH

Page 14: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Animation of a KHH Trigger/Capture

• In addition to spectrogram, it is possible to animate the captured data

• Summary• • Developed and

deployed a low-cost computationally efficient GPS RFI detection & characterization system

• • Currently operating 5 different stations

Page 15: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 16: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Swedish Military Test Range:Robotförsökplats Norrland (RFN)

• Developed experiment to assess AGC’s ability to detect spoofing

• Difficult to perform such experiments outside of a laboratory environment

• Utilize a simplistic repeater spoofer(meaconing) in live testing

Red: Flight Restricted area 130x70 km

Green: Test range

Page 17: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

AGC Spoofer Detection Experiment

Page 18: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

GPS AGC & XYZ Position Data -Driving Toward Spoofer

• AGC 2-sigma threshold flagged well before GPS RX is captured by spoofer

• Other receivers under test showed similar results

1000

2000

Survey Grade Receiver Triggers: Driving Toward Spoofer

AG

C le

vel

0

100

200

X

(m)

0

300

600

Y

(m)

0 20 40 60 80 100 120 140 160-100-50

0

Time (s)

Z

(m)

Page 19: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

GPS AGC & XYZ Position Data -Driving Away Spoofer

500

1500

2500Survey Grade Receiver Triggers: Driving Away From Spoofer

AG

C le

vel

0

75

150

X

(m)

-400

-200

0

Y

(m)

0 20 40 60 80 100 120-10

10

30

Z

(m)

Time (s)

• AGC 2-sigma threshold exceed when receiver is powered on

• True position only after AGC returns to normal levels

• Other receivers under test showed similar results

Page 20: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 21: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

RFI source

Update Detection System for Localization

» How often does RFI occur ?

» What kind of RFI (CW,

narrowband, white noise) ?

» Add camera capability

Detection configuration

Detection area

Localization configuration

Localization area

» Type of vehicle (car, truck, motorcycle)

» Quickly identify spurious RFI sources

Camera

Critical area(ex : airport)

Page 22: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

System : Host Computer for Localization

Recording program

Circular buffers (100sec)

Trigger

IF file100sec

AGC file100sec

AGC fileContinuous

IF data : 13.7 GB / hr

AGC data : 1.3 MB / hr

Network

LaptopLow computational requirementsLow cost CPU + 3GB RAM

TCP/IP capable network(LAN, WAN, 3G)

Camera

Page 23: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

System : Network Operation

23

Running as clientsRunning as a client + server

Recording program (client)

Server program

Post-processing script

Wait for an event

Download IF and AGC data

4 4

PROCESSING

Page 24: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Processing Principles• Two possible methods

» Time Difference of Arrival : cross-correlation» Power Difference of Arrival : AGC processing

• Both result in hyperbolic equations (like LORAN)

• Cross-correlation requires coherent signals» File alignment & clock error model leverage “clean” 40 sec of GPS data

Master

Slave 1

Slave 2

Page 25: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Department of Homeland Security (DHS) GPS Jammer Testing at White Sands Missile Range (WSMR) – 18-22 June 2012

Focused on two testing days

• 20-June-2012: Dynamic 250mW/2.5W jammers » Station deployment :

~1.8km apart • Scenario 3 02:45 to 03:30

– 1 vehicle RR7– 1 vehicle RR20– 2.5W jammers

• 22-June-2012: Stationary 25W jammers» Station deployment :

~15km apart (9.4 mi)Station Jammer’s path

Page 26: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Experiment : Dynamic 250mW/2.5W jammers

in areaWEST EAST WEST EAST

turn around turn around turn aroundNORTH NORTH

turn around

in area

RR20

RR7

200 sec

Page 27: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Zoomed View: Dynamic 2.5W jammers

Navigation solution + clock model estimate

Cross-correlation + jammer localization

Page 28: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Localization Results: Animation

Page 29: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 30: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Controlled Radiation Pattern Antenna (CRPA) Software Receiver • All-in-view real-time CRPA software receiver for GPS/WAAS L1 C/A

» 4 elements, 12 channels, 4 MHz sampling rate, 14 bits ADC resolution for I/Q» Minimum Variance Distortionless Response (MVDR) & power minimization algorithms

11

14

141

11

12

121

11

13

131

141

131

121

1

j

j

j

eee

• Based on all COTS components» Patch antennas» USRP front-ends» Intel i7 PC processing computer

Page 31: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Return to Swedish RFN Test Range: Oct 2012• Testing Panavia Tornado

aircraft with munitions in GPS denied conditions

» “Piggybacking” on this test

• Operating Stanford 4 element CRPA in parallel with mass market RX

» Provides real time operation & IF recording

• Assess/compare performance in RFI environment

Red: Flight Restricted area 130x70 km

Green: Test range

Page 32: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

RFN Antenna Array Testing – Oct 2012

Page 33: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

RFN Antenna Array Testing – 14-Oct-2012

Page 34: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

J/N & PRN18 C/No for Power Ramp Test

• Shown are the J/N and C/No (PRN18 -mass market GPS RX) for stepped BBN jamming

• Assess/compare performance of CRPA processing 0 50 100 150 200 250 300 350 400 450 500

0

5

10

15

20

25

30

35

40

45

50

55

Time (s)

C/N

o (d

B-H

z)

0 50 100 150 200 250 300 350 400 450 5000

5

10

15

20

25

30

35

40

45

50

55

J/N

(dB

)

60

-120

30

-150

0

180

-30

150

-60

120

-90 9018

Page 35: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Page 36: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

J/N & PRN18 C/No for Power Ramp Test

60

-120

30

-150

0

180

-30

150

-60

120

-90 9018

0 50 100 150 200 250 300 350 400 450 5000

5

10

15

20

25

30

35

40

45

50

55

Time (s)

C/N

o (d

B-H

z)

ublox C/NoSU CRPA C/NoJammer J/N

0 50 100 150 200 250 300 350 400 450 5000

5

10

15

20

25

30

35

40

45

50

55

J/N

(dB

)

• SU CRPA (MVDR) maintained lock for the entire jamming cycle

• SDR implementation using low cost COTS components

Page 37: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Presentation Overview

• Motivation & Background

• Concept & Experimental Results

I. RFI Detection/Characterization

II. Spoofer Detection

III. RFI/Spoofer Localization

IV. RFI/Spoofer Mitigation via CPRA

• Summary & Conclusions

Page 38: GNSS RFI/Spoofing: Detection, Localization, & Mitigation

GPS Laboratory Stanford University

Aerospace Engineering Sciences University of Colorado

Summary & Conclusions• Automatic Gain Control (AGC) is a powerful yet

computational simplistic means to detect RFI/spoofing

• Localization of RFI/spoofing sources can be done effectively, easily and low-cost via time/power difference of arrival

• CRPAs can be developed using COTS hardware and provide a powerful tool to mitigate RFI/spoofing