Gps Time Authentication Against Spoofing Via A Network Of Receivers For Power Systems

2018 IEEE/ION POSITION, LOCATION AND NAVIGATION SYMPOSIUM (PLANS)(2018)

引用 15|浏览14
暂无评分
摘要
Due to the unencrypted structure of civil GPS signals, the timing information supplied to the PMUs in the power grid is vulnerable to spoofing attacks. We propose our GPS time authentication algorithm using a network of widely dispersed static receivers and their known positions. Without requiring the knowledge of the exact P(Y) code sequences, we cross-check for the presence of these encrypted codes across the receivers to detect spoofing attacks.First, we perform pair-wise cross-correlation of the conditioned quadrature-phase, carrier wiped-off incoming signal across the receivers. Later, we utilize position-information aiding to estimate the expected time offset between the received P(Y) codes at different receivers. Thereafter, we authenticate each receiver by analyzing the weighted summation of the pair-wise cross-correlation peak offset and magnitude across the receivers and their common satellites.To validate our networked spoofing detection algorithm, we utilize four GPS receivers located in Idaho, Illinois, Colorado and Ohio. Under the presence of simulated spoofing attacks, namely signal-level spoofing and a record-and-replay attack, we demonstrate that our networked approach successfully detects these spoofing events with high probability.
更多
查看译文
关键词
power systems,unencrypted structure,civil GPS signals,timing information,power grid,GPS time authentication algorithm,widely dispersed static receivers,exact P(Y) code sequences,encrypted codes,incoming signal,position-information aiding,expected time,received P(Y) codes,pair-wise cross-correlation peak,networked spoofing detection algorithm,GPS receivers,simulated spoofing attacks,signal-level spoofing,networked approach,spoofing events,record-and-replay attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要