SlideShare a Scribd company logo
Introducing GPS Spoofing Attack on Power
Grids and Counteract Methods
Applied Control & Robotic Research Laboratory of Shiraz University
Shiraz, Iran
By: Sara Siamak
Contents
▣ Introduction
▣ Global Positioning System (GPS)
▣ PMU Overview
▣ GPS Spoofing Attack
▣ Attack Counteract Methods
▣ Literature Review
▣ Conclusion
▣ References
2
1.
Introduction
3
“ Many navigation systems and network synchronization equipment
rely on GPS signals to determine their location and time.
 The structure of GPS signals is well known to the public, so it is
possible to build a system that produces fake GPS signals.
 Sending fake signals to GPS receivers can make them look for
false signals and cause the receivers to find their location and time
through the fake signals. This is called GPS Spoofing Attack.
4
“
 In the power grid, time synchronization is very valuable because it
is a complex, interconnected and interdependent network.
 One of the most important things to do in a power grid is to
estimate the states of the power system.
 In the last decade, the use of PMU for real-time network estimation
has increased.
 PMUs depend on GPS for time synchronization. This dependency
makes them vulnerable to GPS spoofing attacks.
5
2.
GPS
6
“
 The GPS signal contains location and time
information
 GPS satellites clock have not any offset from
the world clock
 The GPS receiver cannot find its exact position
simply by receiving this signal from the satellite
because the receiver has an uncertain offset
relative to the world clock.
7
Global Positioning System (GPS)
“
 GPS receiver position
 GPS receiver offset
It has 4 unknowns so 4 visible satellites are needed
 Trilateration process: The process of determining relative or
absolute position using geometry that is applicable to GPS.
With this process, the receiver calculates its position and time offset.
8
Unknowns for a GPS Receiver
3 unknowns
(x, y, z)
1 unknown (𝑡 𝑢)
“
GPS Receiver Offset: 𝑡 𝑢
Speed of light: 𝑐
The Pseudo-Distance between the
Receiver and the 1st Satellite: p1
Receiver Coordinates: x, y, z
𝑛th Satellite Coordinates: xn, yn, zn
Local Receiver Time: tl
Sending Time from 𝑛th Satellite:tl
9
Trilateration process
“
GPS satellites contain two important signals:
civilian signal, L1 and military signal, L2.
These signals must pass through the
ionosphere layer in their path to the ground,
causing a delay in them.
Because the frequencies of L1 and L2 are
different, they are delayed with different
values.
10
GPS Signals
“
These signals are modulated by the
pseudo-random noise sequence code
that is unique to each satellite. These
include civilian C/A and P military
codes.
The civilian C/A code is only sent at the
frequency of L1, while the military code
P is sent at the frequency of L1and L2
11
The Structure of Signals L1 and L2
3.
PMU Overview
12
“
 The PMU is a device that is installed
in the post and is able to measure the
voltage of the bus voltage and the
current of the branches connected to
the bus.
 The PMU uses a GPS receiver for
time synchronization.
 GPS signals provide the time labels
for the measured phasors.
13
Phasor Measurement Unit (PMU)
Structure of a PMU
14
4.
GPS Spoofing Attack
15
“
 The attacker simulates the actual GPS signal.
 In this attack, the attacker first causes excessive radio interference on the
L1frequency band.
 This interference is accomplished by sending noise signals in the GPS
frequency range.
 The attacker then sends spoofing signals to the receiver to lock the receiver
onto the fake signal. (With power slightly above the valid signals’ value)
16
GPS Spoofing Attack
“
1- GPS signal simulator
A GPS signal simulator is used to mimic valid GPS signals.
Attributes:
-They are simple
-They do not have GPS receivers, so they are not necessarily synchronized with
actual GPS signals
-They are easily identifiable
17
Techniques for making spoofing signals
“2- Receiver-based spoofers
Includes GPS receiver with spoofing transmitter.
Attributes:
They are more complex than GPS simulators
Synchronized with GPS signals
3. Complex receiver-based spoofers
Attributes:
The most sophisticated and effective type of spoofing classifications
Uses several transmission antennas and knows the exact information of the
target receiver antenna
It is very difficult to achieve these spoofers
18
“
 For a signal with frequency f Hz, the phase measurement error
corresponding to the offset of the receiver is obtained by the following
equation:
φ = 2πft
∈ = [2πf tu
∗
− tu ]
 Changes in the measurement phase can cause
- The generators to become unstable
- Normal showing operation of equipment while they are overloaded
- Overload show equipment while they are normal and so on.
19
The Effect of GPS Spoofing on the Power Grid
𝜑∗
= 𝜑+ ∈
φ: Signal phase before attack
𝜑∗
: Signal phase after attack
𝑡 𝑢: Receiver offset before attack
𝑡 𝑢
∗
: Receiver offset after attack
5.
Counteract Methods
20
“
1) Signal processing defenses
2) Cryptographic defenses
3) Correlation with other timing sources
4) Radio spectrum and antenna defenses
21
Counteract GPS Spoofing Attack
1- Defense Based on Signal Processing
22
Correlation
Peak
Monitoring
Doppler Shift
Detection
Discrimination
of Time of
Arrival
Absolute
Power
Signal to
Interference
Plus Noise
Ratio
Receiver
Autonomous
Integrity
Monitoring
(RAIM)
Receiver Autonomous Integrity Monitoring (RAIM)
 Predict the location of each satellite using astronomical data from the signals
 Finding a conflict by comparing prediction results with the position reported in the
navigation message in the received signals can be caused by an attack.
Defect:
 Invalidity of this method when spoofing signals are in the majority
23
Signal to Interference Plus Noise Ratio
 SINR: Ratio of received signal power to noise power plus other signal interference
 A sudden change in the SINR rate could indicate an attack.
𝑺𝑰𝑵𝑹 =
𝑷
𝑰 𝑨𝒖𝒕𝒉
𝟐 + 𝑰 𝑺𝒑𝒐𝒐𝒇
𝟐
+ (
𝝈 𝟐
𝑵
)
24
𝑰 𝑨𝒖𝒕𝒉 : Interference term caused by correlation
with other valid signals
𝑰 𝑺𝒑𝒐𝒐𝒇: Interference term due to correlation with
fake signals
𝝈 𝟐
𝑵
: Filtered noise variance
P: Power of received signal
Absolute Power
 The spoofer sends its signals at slightly higher power than valid signals to force the
receiver to follow its own signals.
 Detection method: Comparison of the absolute power level of the received signal with
the valid signal power
Defects:
 Increased receiver hardware complexity
 Power of signal changes due to interference from the atmosphere and the sun's gravity
25
Doppler Shift Detection
 Relative motion between satellite and receiver creating detectable effects caused by
Doppler effect on signal frequency
 By simulating the motion of the satellites and comparing them to the real state, he
observed the Doppler collision and detected the attack.
Doppler Effect: Shortening the wavelength when moving to an object or increasing the wavelength
when moving away
26
Correlation Peak Monitoring
 In the absence of interference between the receiver and the satellite, the power for the
valid signals corresponds to a distribution of 𝜒2.
 The correlation peak power of valid signals can be used to detect an attack.
Defects :
 Spoofer attempts to approach its signal correlation peak to the peak of the GPS signal
correlation
 Invalidity of the distribution assumption 𝜒2
when there is a barrier between the
receiver and the satellite.
27
Discrimination of Time of Arrival
 The P code is sent at both frequencies 𝐿1and 𝐿2. Therefore, the correlation between
two versions of the P code can be used to calculate the delay.
 The delay between the two signals can be calculated for the receiver. And if there is a
conflict between computing and the real state, it could be an attack.
Defect:
 A professional spoofer can handle this delay.
28
2- Cryptographic Defense
 Using authentication techniques to detect spoofing threats
 Applicable for Military version of GPS signals and civilian version of GPS signals
 Requires changes to the GPS signal structure.
Bugs:
 Delay in diagnosis
 It's a costly way.
29
3- Detection based on Correlation Analysis with Other Time
Sources
 Received signals can be sent to other GNSS sources for validation.
Sources other than the Global Navigation Satellite System can be used for
validation.
Defects:
 Sending many signals to get authorities creates traffic and make them
unreliable.
 The accuracy of time sources is less than the global satellite navigation system
30
4- Defense Based on Radio Spectrum and Antenna
31
Discrimination
of Angle of
Arrival
Removable
Antenna
“
 The signals received from a spoofing
source have a different input angle than
the satellite signals.
 This method uses two antennas that
intersect at a certain distance and
calculate the angle of entry of the
signals.
Defect:
 This technique may fail in a multi-
antenna-based spoofing attack.
32
Discrimination of Angle of Arrival
“
 Moving a single antenna along a
random path
 For a model that is not under attack,
different effects of the antenna motion
on different satellites are predicted.
 The correlation between the received
signals in the spoofing attack mode
indicates the occurrence of the attack.
33
Removable Antenna
6.
Literature Review
34
35
…
Dana
First came up
with the idea
of RAIM
McDowell et
al.
Introduces the
SINR
evaluation
method
Jovanovic et
al.
Validation of
the Doppler
effect change
observation
method
Montgomery
et al.
Applying the
angle of arrival
technique
Wesson et al.
Evaluation of
correlation
peak detection
method
1997 2007 2008 2009 2011
36
…
Zhang et al.
Using two
different
types of
antennas to
detect attack
Jiang et al.
Formulate a
GPS spoofing
attack on the
PMU with
solving a
maximization
problem
Psiaki et al.
Introducing
the idea of a
removable
antenna
Yu et al.
Using a set of
GPS receivers
to detect
spoofing attack
on power grids
Fan et al.
Applying the
mechanism of
cross-layer
detection of
physical layer and
upper layer of
network against
GPS spoofing
attack on PMUs
2012 2013 2014 2015
Konovaltsev
et al.
Use array
antenna and
angle of
arrival entry
technique
37
…
Fan et al.
Spoofing-matched
algorithm using signal
processing techniques and
estimation of power
system modes based on
synchronous phasers (this
method detects an attack
on a PMU and corrects its
data)...
Yasinzadeh and Akhbari
- Providing a method based on
power Grid Infrastructure using
measured phase analysis and
state estimation
This method is compatible with
other available anti-spoofing
methods
In addition to detecting an
attack, it also corrects false data
2017 2018
7.
Conclusion
38
“ Research suggests that GPS-based networks are
vulnerable to GPS spoofing attack.
 Power grids are also vulnerable to cyberattacks, and GPS
spoofing is part of the danger.
 A spoofer can cause network operators to perform
improper or unnecessary control actions.
 Therefore, protection of these damages is essential in
modern power networks.
39
8.
References
40
41
[1] Kaplan, E. D., Leva, J. L., & Pavloff, M. S. (1996). Fundamentals of satellite navigation. Understanding GPS-
Principles and applications(A 96-41027 11-17), Norwood, MA, Artech House, 1996,, 15-57.
[2] Infrastructure, T. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning
system. Technical Report, Center, John A. Volpe National Transportation Systems
[3] McDowell, C. E. (2007). U.S. Patent No. 7,250,903. Washington, DC: U.S. Patent and Trademark Office.
Papadimitratos, P., & Jovanovic, A. (2008, November). GNSS-based positioning: Attacks and countermeasures. In
Military Communications Conference, 2008. MILCOM 2008. IEEE (pp. 1-7). IEEE.
[4] Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009). A multi-antenna defense: Receiver-autonomous GPS
spoofing detection. Inside GNSS, 4(2), 40-46.
[5] Humphreys, T., Bhatti, J., & Ledvina, B. (2010). The GPS Assimilator: a method for upgrading existing GPS user
equipment to improve accuracy, robustness, and resistance to spoofing.
[6] Wesson, K. D., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2011, September). An evaluation of the vestigial
signal defense for civil GPS anti-spoofing. In Proceedings of the ION GNSS Meeting.
[7] Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a
review of antispoofing techniques. International Journal of Navigation and Observation, 2012.
[8] Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units
to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5(3-4), 146-153.
42
[9] Jafarnia-Jahromi, A., Daneshmand, S., & Lachapelle, G. (2013). Spoofing countermeasure for GNSS receivers–a
review of current and future research trends. Proc. on the 4th Intern Colloquim on Scientific and Fundamental Aspects of
the Galileo Programme, 1-8.
[10] Psiaki, M. L., Powell, S. P., & O’hanlon, B. W. (2013, September). GNSS spoofing detection using high-frequency
antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting (pp. 2949-2991).
[11] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., & Basin, D. (2014, July). Short paper: detection of GPS spoofing
attacks in power grids. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile
networks (pp. 99-104). ACM.
[12] Konovaltsev, A., Caizzone, S., Cuntz, M., & Meurer, M. (2014, September). Autonomous spoofing detection and
mitigation with a miniaturized adaptive antenna array. In Proceedings of the 27th Technical Meeting of Satellite Division
of The Institute of Navigation ION GNSS+ 2014 (pp. 2853-2861). The Institue of Navigation, USA.
[13] Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., & Li, H. (2015). A cross-layer defense mechanism
against GPS spoofing attacks on PMUs in smart grids. IEEE Transactions on Smart Grid, 6(6), 2659-2668.
[14] Schmidt, D., Radke, K., Camtepe, S., Foo, E., & Ren, M. (2016). A survey and analysis of the gnss spoofing threat
and countermeasures. ACM Computing Surveys (CSUR), 48(4), 64.
[15] Fan, X., Du, L., & Duan, D. (2017). Synchrophasor data correction under gps spoofing attack: A state estimation
based approach. IEEE Transactions on Smart Grid.
[16] Yasinzadeh, M., & Akhbari, M. (2018). Detection of PMU spoofing in power grid based on phasor measurement
analysis. IET Generation, Transmission & Distribution, 12(9), 1980-1987.
“
Thank you
Any questions?
43
Sara Siamak
You can find me at s.siyamak@shirazu.ac.ir
44

More Related Content

PDF
GNSS Receivers and the Cyber Threat
PPT
Wind Profile CETC
PDF
Honors Thesis
PPTX
Wildlife Radio Collaring
PDF
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
PPTX
Sentinel Air LLC, Capability Brief
PDF
FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
PPTX
Radio and Radar: Radar
GNSS Receivers and the Cyber Threat
Wind Profile CETC
Honors Thesis
Wildlife Radio Collaring
VHDL Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
Sentinel Air LLC, Capability Brief
FPGA Implementation of Scan-to-Scan Discriminator for the Detection of Marine...
Radio and Radar: Radar

What's hot (20)

PPTX
Military Radar
PPT
Radar Application
PPTX
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
PPTX
An Introduction about Radar
PPT
3_Igarss2011RFI.ppt
PPTX
MISSILE CONTROL AND COMMUNICATION
PDF
Military radar Summit
PPT
Chirps
PPTX
Military radar and satellite switching
PPTX
Location in ubiquitous computing, LOCATION SYSTEMS
PPTX
RADAR BULLET
PDF
Lesson ssr
PPTX
Landmine detection using impulse ground penetrating radar
PPTX
Doppler weather radar
PDF
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
PPT
spread spectrum
PPTX
Radar
PPTX
Airborne radar
PPTX
Frequency hopping spread spectrum
PPT
Spread Spectrum
Military Radar
Radar Application
Ultra-Wide Band: An Electronic Measuring, Communication, and Imaging Capabili...
An Introduction about Radar
3_Igarss2011RFI.ppt
MISSILE CONTROL AND COMMUNICATION
Military radar Summit
Chirps
Military radar and satellite switching
Location in ubiquitous computing, LOCATION SYSTEMS
RADAR BULLET
Lesson ssr
Landmine detection using impulse ground penetrating radar
Doppler weather radar
MATLAB Implementation of Scan-to-Scan Discriminator for the Detection of Mari...
spread spectrum
Radar
Airborne radar
Frequency hopping spread spectrum
Spread Spectrum
Ad

Similar to Spoofing attack on PMU (Phasor measurement unit) (20)

PPTX
ELISEE MALABA PRESENTATION.pptx
PDF
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
PDF
Gnss Interference Threats And Countermeasures Fabio Dovis
PPT
Interference Geolocation Techniques - Copy
PPTX
Gps behaving badly - Guy Busenel
PPTX
Global Positioning System
PDF
Countermeasures to GPS Spoofing
PPT
Seminar on GPS by Haleem
PPT
Global positioningsystem
PDF
GNSS Jamming Detection, Localization and Mitigation
PDF
Application of differential systems in global navigation satellite systems
PPT
GPS[Global Positioning System]
PDF
Towards categorizing the level of protection that gnss receivers provide in a...
PPTX
GPS application soil survey
PDF
GPS Spoofing: No Longer a Fish Story
PPT
Global Positing System
PPTX
Gps and remote sensing
PPTX
Global Positioning System ( GPS )
PDF
GNSS spoofing via SDR (Criptored Talks 2024)
ELISEE MALABA PRESENTATION.pptx
Spoofing GNSS Timing Receivers (Buesnel-Frost, ITSF 2016)
Gnss Interference Threats And Countermeasures Fabio Dovis
Interference Geolocation Techniques - Copy
Gps behaving badly - Guy Busenel
Global Positioning System
Countermeasures to GPS Spoofing
Seminar on GPS by Haleem
Global positioningsystem
GNSS Jamming Detection, Localization and Mitigation
Application of differential systems in global navigation satellite systems
GPS[Global Positioning System]
Towards categorizing the level of protection that gnss receivers provide in a...
GPS application soil survey
GPS Spoofing: No Longer a Fish Story
Global Positing System
Gps and remote sensing
Global Positioning System ( GPS )
GNSS spoofing via SDR (Criptored Talks 2024)
Ad

More from Mohammad Sabouri (15)

PPTX
Extremely low-cost lower limb prostheses_G12.pptx
PPTX
MECHANICAL DESIGN METHODS IN ROBOTICS.pptx
PPTX
Human Computer Interaction (HCI).pptx
PPTX
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
PDF
Introducing the services of Iran Patent Center- PDF
PDF
Introduction to Lens database -in Persian (powerful site for searching)
PDF
CV_ nov.2019
PPTX
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
PPTX
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
PPTX
Traffic monitoring using drone_ACRRL_Shiraz University
PPTX
Robotic introduction
PPTX
Recurrent Neural Network
PPTX
Labview2_Computer Applications in Control_ACRRL
PPTX
Labview1_ Computer Applications in Control_ACRRL
PPTX
Haptic technology ppt
Extremely low-cost lower limb prostheses_G12.pptx
MECHANICAL DESIGN METHODS IN ROBOTICS.pptx
Human Computer Interaction (HCI).pptx
Intelligent Decision Making Assistant (IDMA) for SAL improvement.pptx
Introducing the services of Iran Patent Center- PDF
Introduction to Lens database -in Persian (powerful site for searching)
CV_ nov.2019
Icbme2020- Use of neural network algorithms to predict arterial blood gas ite...
Prediction of Arterial Blood Gases(ABG) by Using Neural Network In Trauma Pat...
Traffic monitoring using drone_ACRRL_Shiraz University
Robotic introduction
Recurrent Neural Network
Labview2_Computer Applications in Control_ACRRL
Labview1_ Computer Applications in Control_ACRRL
Haptic technology ppt

Recently uploaded (20)

PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Soil Improvement Techniques Note - Rabbi
PPT
Total quality management ppt for engineering students
PPTX
introduction to high performance computing
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Current and future trends in Computer Vision.pptx
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPT
Occupational Health and Safety Management System
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
PDF
Abrasive, erosive and cavitation wear.pdf
PPTX
Information Storage and Retrieval Techniques Unit III
PPTX
communication and presentation skills 01
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Soil Improvement Techniques Note - Rabbi
Total quality management ppt for engineering students
introduction to high performance computing
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
Analyzing Impact of Pakistan Economic Corridor on Import and Export in Pakist...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Current and future trends in Computer Vision.pptx
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Occupational Health and Safety Management System
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
A5_DistSysCh1.ppt_INTRODUCTION TO DISTRIBUTED SYSTEMS
Abrasive, erosive and cavitation wear.pdf
Information Storage and Retrieval Techniques Unit III
communication and presentation skills 01
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Safety Seminar civil to be ensured for safe working.
Fundamentals of safety and accident prevention -final (1).pptx

Spoofing attack on PMU (Phasor measurement unit)

  • 1. Introducing GPS Spoofing Attack on Power Grids and Counteract Methods Applied Control & Robotic Research Laboratory of Shiraz University Shiraz, Iran By: Sara Siamak
  • 2. Contents ▣ Introduction ▣ Global Positioning System (GPS) ▣ PMU Overview ▣ GPS Spoofing Attack ▣ Attack Counteract Methods ▣ Literature Review ▣ Conclusion ▣ References 2
  • 4. “ Many navigation systems and network synchronization equipment rely on GPS signals to determine their location and time.  The structure of GPS signals is well known to the public, so it is possible to build a system that produces fake GPS signals.  Sending fake signals to GPS receivers can make them look for false signals and cause the receivers to find their location and time through the fake signals. This is called GPS Spoofing Attack. 4
  • 5. “  In the power grid, time synchronization is very valuable because it is a complex, interconnected and interdependent network.  One of the most important things to do in a power grid is to estimate the states of the power system.  In the last decade, the use of PMU for real-time network estimation has increased.  PMUs depend on GPS for time synchronization. This dependency makes them vulnerable to GPS spoofing attacks. 5
  • 7. “  The GPS signal contains location and time information  GPS satellites clock have not any offset from the world clock  The GPS receiver cannot find its exact position simply by receiving this signal from the satellite because the receiver has an uncertain offset relative to the world clock. 7 Global Positioning System (GPS)
  • 8. “  GPS receiver position  GPS receiver offset It has 4 unknowns so 4 visible satellites are needed  Trilateration process: The process of determining relative or absolute position using geometry that is applicable to GPS. With this process, the receiver calculates its position and time offset. 8 Unknowns for a GPS Receiver 3 unknowns (x, y, z) 1 unknown (𝑡 𝑢)
  • 9. “ GPS Receiver Offset: 𝑡 𝑢 Speed of light: 𝑐 The Pseudo-Distance between the Receiver and the 1st Satellite: p1 Receiver Coordinates: x, y, z 𝑛th Satellite Coordinates: xn, yn, zn Local Receiver Time: tl Sending Time from 𝑛th Satellite:tl 9 Trilateration process
  • 10. “ GPS satellites contain two important signals: civilian signal, L1 and military signal, L2. These signals must pass through the ionosphere layer in their path to the ground, causing a delay in them. Because the frequencies of L1 and L2 are different, they are delayed with different values. 10 GPS Signals
  • 11. “ These signals are modulated by the pseudo-random noise sequence code that is unique to each satellite. These include civilian C/A and P military codes. The civilian C/A code is only sent at the frequency of L1, while the military code P is sent at the frequency of L1and L2 11 The Structure of Signals L1 and L2
  • 13. “  The PMU is a device that is installed in the post and is able to measure the voltage of the bus voltage and the current of the branches connected to the bus.  The PMU uses a GPS receiver for time synchronization.  GPS signals provide the time labels for the measured phasors. 13 Phasor Measurement Unit (PMU)
  • 14. Structure of a PMU 14
  • 16. “  The attacker simulates the actual GPS signal.  In this attack, the attacker first causes excessive radio interference on the L1frequency band.  This interference is accomplished by sending noise signals in the GPS frequency range.  The attacker then sends spoofing signals to the receiver to lock the receiver onto the fake signal. (With power slightly above the valid signals’ value) 16 GPS Spoofing Attack
  • 17. “ 1- GPS signal simulator A GPS signal simulator is used to mimic valid GPS signals. Attributes: -They are simple -They do not have GPS receivers, so they are not necessarily synchronized with actual GPS signals -They are easily identifiable 17 Techniques for making spoofing signals
  • 18. “2- Receiver-based spoofers Includes GPS receiver with spoofing transmitter. Attributes: They are more complex than GPS simulators Synchronized with GPS signals 3. Complex receiver-based spoofers Attributes: The most sophisticated and effective type of spoofing classifications Uses several transmission antennas and knows the exact information of the target receiver antenna It is very difficult to achieve these spoofers 18
  • 19. “  For a signal with frequency f Hz, the phase measurement error corresponding to the offset of the receiver is obtained by the following equation: φ = 2πft ∈ = [2πf tu ∗ − tu ]  Changes in the measurement phase can cause - The generators to become unstable - Normal showing operation of equipment while they are overloaded - Overload show equipment while they are normal and so on. 19 The Effect of GPS Spoofing on the Power Grid 𝜑∗ = 𝜑+ ∈ φ: Signal phase before attack 𝜑∗ : Signal phase after attack 𝑡 𝑢: Receiver offset before attack 𝑡 𝑢 ∗ : Receiver offset after attack
  • 21. “ 1) Signal processing defenses 2) Cryptographic defenses 3) Correlation with other timing sources 4) Radio spectrum and antenna defenses 21 Counteract GPS Spoofing Attack
  • 22. 1- Defense Based on Signal Processing 22 Correlation Peak Monitoring Doppler Shift Detection Discrimination of Time of Arrival Absolute Power Signal to Interference Plus Noise Ratio Receiver Autonomous Integrity Monitoring (RAIM)
  • 23. Receiver Autonomous Integrity Monitoring (RAIM)  Predict the location of each satellite using astronomical data from the signals  Finding a conflict by comparing prediction results with the position reported in the navigation message in the received signals can be caused by an attack. Defect:  Invalidity of this method when spoofing signals are in the majority 23
  • 24. Signal to Interference Plus Noise Ratio  SINR: Ratio of received signal power to noise power plus other signal interference  A sudden change in the SINR rate could indicate an attack. 𝑺𝑰𝑵𝑹 = 𝑷 𝑰 𝑨𝒖𝒕𝒉 𝟐 + 𝑰 𝑺𝒑𝒐𝒐𝒇 𝟐 + ( 𝝈 𝟐 𝑵 ) 24 𝑰 𝑨𝒖𝒕𝒉 : Interference term caused by correlation with other valid signals 𝑰 𝑺𝒑𝒐𝒐𝒇: Interference term due to correlation with fake signals 𝝈 𝟐 𝑵 : Filtered noise variance P: Power of received signal
  • 25. Absolute Power  The spoofer sends its signals at slightly higher power than valid signals to force the receiver to follow its own signals.  Detection method: Comparison of the absolute power level of the received signal with the valid signal power Defects:  Increased receiver hardware complexity  Power of signal changes due to interference from the atmosphere and the sun's gravity 25
  • 26. Doppler Shift Detection  Relative motion between satellite and receiver creating detectable effects caused by Doppler effect on signal frequency  By simulating the motion of the satellites and comparing them to the real state, he observed the Doppler collision and detected the attack. Doppler Effect: Shortening the wavelength when moving to an object or increasing the wavelength when moving away 26
  • 27. Correlation Peak Monitoring  In the absence of interference between the receiver and the satellite, the power for the valid signals corresponds to a distribution of 𝜒2.  The correlation peak power of valid signals can be used to detect an attack. Defects :  Spoofer attempts to approach its signal correlation peak to the peak of the GPS signal correlation  Invalidity of the distribution assumption 𝜒2 when there is a barrier between the receiver and the satellite. 27
  • 28. Discrimination of Time of Arrival  The P code is sent at both frequencies 𝐿1and 𝐿2. Therefore, the correlation between two versions of the P code can be used to calculate the delay.  The delay between the two signals can be calculated for the receiver. And if there is a conflict between computing and the real state, it could be an attack. Defect:  A professional spoofer can handle this delay. 28
  • 29. 2- Cryptographic Defense  Using authentication techniques to detect spoofing threats  Applicable for Military version of GPS signals and civilian version of GPS signals  Requires changes to the GPS signal structure. Bugs:  Delay in diagnosis  It's a costly way. 29
  • 30. 3- Detection based on Correlation Analysis with Other Time Sources  Received signals can be sent to other GNSS sources for validation. Sources other than the Global Navigation Satellite System can be used for validation. Defects:  Sending many signals to get authorities creates traffic and make them unreliable.  The accuracy of time sources is less than the global satellite navigation system 30
  • 31. 4- Defense Based on Radio Spectrum and Antenna 31 Discrimination of Angle of Arrival Removable Antenna
  • 32. “  The signals received from a spoofing source have a different input angle than the satellite signals.  This method uses two antennas that intersect at a certain distance and calculate the angle of entry of the signals. Defect:  This technique may fail in a multi- antenna-based spoofing attack. 32 Discrimination of Angle of Arrival
  • 33. “  Moving a single antenna along a random path  For a model that is not under attack, different effects of the antenna motion on different satellites are predicted.  The correlation between the received signals in the spoofing attack mode indicates the occurrence of the attack. 33 Removable Antenna
  • 35. 35 … Dana First came up with the idea of RAIM McDowell et al. Introduces the SINR evaluation method Jovanovic et al. Validation of the Doppler effect change observation method Montgomery et al. Applying the angle of arrival technique Wesson et al. Evaluation of correlation peak detection method 1997 2007 2008 2009 2011
  • 36. 36 … Zhang et al. Using two different types of antennas to detect attack Jiang et al. Formulate a GPS spoofing attack on the PMU with solving a maximization problem Psiaki et al. Introducing the idea of a removable antenna Yu et al. Using a set of GPS receivers to detect spoofing attack on power grids Fan et al. Applying the mechanism of cross-layer detection of physical layer and upper layer of network against GPS spoofing attack on PMUs 2012 2013 2014 2015 Konovaltsev et al. Use array antenna and angle of arrival entry technique
  • 37. 37 … Fan et al. Spoofing-matched algorithm using signal processing techniques and estimation of power system modes based on synchronous phasers (this method detects an attack on a PMU and corrects its data)... Yasinzadeh and Akhbari - Providing a method based on power Grid Infrastructure using measured phase analysis and state estimation This method is compatible with other available anti-spoofing methods In addition to detecting an attack, it also corrects false data 2017 2018
  • 39. “ Research suggests that GPS-based networks are vulnerable to GPS spoofing attack.  Power grids are also vulnerable to cyberattacks, and GPS spoofing is part of the danger.  A spoofer can cause network operators to perform improper or unnecessary control actions.  Therefore, protection of these damages is essential in modern power networks. 39
  • 41. 41 [1] Kaplan, E. D., Leva, J. L., & Pavloff, M. S. (1996). Fundamentals of satellite navigation. Understanding GPS- Principles and applications(A 96-41027 11-17), Norwood, MA, Artech House, 1996,, 15-57. [2] Infrastructure, T. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning system. Technical Report, Center, John A. Volpe National Transportation Systems [3] McDowell, C. E. (2007). U.S. Patent No. 7,250,903. Washington, DC: U.S. Patent and Trademark Office. Papadimitratos, P., & Jovanovic, A. (2008, November). GNSS-based positioning: Attacks and countermeasures. In Military Communications Conference, 2008. MILCOM 2008. IEEE (pp. 1-7). IEEE. [4] Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. (2009). A multi-antenna defense: Receiver-autonomous GPS spoofing detection. Inside GNSS, 4(2), 40-46. [5] Humphreys, T., Bhatti, J., & Ledvina, B. (2010). The GPS Assimilator: a method for upgrading existing GPS user equipment to improve accuracy, robustness, and resistance to spoofing. [6] Wesson, K. D., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2011, September). An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In Proceedings of the ION GNSS Meeting. [7] Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation, 2012. [8] Shepard, D. P., Humphreys, T. E., & Fansler, A. A. (2012). Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5(3-4), 146-153.
  • 42. 42 [9] Jafarnia-Jahromi, A., Daneshmand, S., & Lachapelle, G. (2013). Spoofing countermeasure for GNSS receivers–a review of current and future research trends. Proc. on the 4th Intern Colloquim on Scientific and Fundamental Aspects of the Galileo Programme, 1-8. [10] Psiaki, M. L., Powell, S. P., & O’hanlon, B. W. (2013, September). GNSS spoofing detection using high-frequency antenna motion and carrier-phase data. In Proceedings of the ION GNSS+ Meeting (pp. 2949-2991). [11] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., & Basin, D. (2014, July). Short paper: detection of GPS spoofing attacks in power grids. In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (pp. 99-104). ACM. [12] Konovaltsev, A., Caizzone, S., Cuntz, M., & Meurer, M. (2014, September). Autonomous spoofing detection and mitigation with a miniaturized adaptive antenna array. In Proceedings of the 27th Technical Meeting of Satellite Division of The Institute of Navigation ION GNSS+ 2014 (pp. 2853-2861). The Institue of Navigation, USA. [13] Fan, Y., Zhang, Z., Trinkle, M., Dimitrovski, A. D., Song, J. B., & Li, H. (2015). A cross-layer defense mechanism against GPS spoofing attacks on PMUs in smart grids. IEEE Transactions on Smart Grid, 6(6), 2659-2668. [14] Schmidt, D., Radke, K., Camtepe, S., Foo, E., & Ren, M. (2016). A survey and analysis of the gnss spoofing threat and countermeasures. ACM Computing Surveys (CSUR), 48(4), 64. [15] Fan, X., Du, L., & Duan, D. (2017). Synchrophasor data correction under gps spoofing attack: A state estimation based approach. IEEE Transactions on Smart Grid. [16] Yasinzadeh, M., & Akhbari, M. (2018). Detection of PMU spoofing in power grid based on phasor measurement analysis. IET Generation, Transmission & Distribution, 12(9), 1980-1987.
  • 44. Sara Siamak You can find me at s.siyamak@shirazu.ac.ir 44