Detecting GPS Spoofing via a Multi-Receiver Hybrid ... monitoring of power grid through a widely...

40
University of Illinois at Urbana-Champaign 0 Detecting GPS Spoofing via a Multi-Receiver Hybrid Communication Network for Power Grids Tara Mina, Sriramya Bhamidipati, and Grace Xingxin Gao

Transcript of Detecting GPS Spoofing via a Multi-Receiver Hybrid ... monitoring of power grid through a widely...

University of Illinois at Urbana-Champaign 0

Detecting GPS Spoofing via a Multi-Receiver

Hybrid Communication Network for Power Grids

Tara Mina, Sriramya Bhamidipati, and Grace Xingxin Gao

University of Illinois at Urbana-Champaign

1

1

Goals for Power Grid Modernization

β€’ Automatic control of power grid

β€’ Reduce failures or large-scale

blackouts (Ex: NE Blackout 2003)

β€’ Improve visualization of power flow

β€’ Continuously monitor state of

U.S. power grid network

β€’ Install robust network of monitoring devices across the grid

University of Illinois at Urbana-Champaign

2

Synchronizing Data in Power Grid Network

Real-time monitoring of power grid through a widely dispersed

network of Phasor Measurement Units (PMUs)

βˆ’ PMUs measure voltage and current phasors

βˆ’ Provides measurement with precise time-stamp, via GPS

βˆ’ Significant timing inaccuracies can induce a generator to trip [1]

2

GPS used for synchronization of

PMU measurements

Power grid

PMUGPS clockGPS

Antenna

[1] Shepard, et al, GPS World, 2012

University of Illinois at Urbana-Champaign

3

Global Positioning System (GPS)

β€’ Number of satellites: 31 operational

β€’ Orbit: β‰ˆ 20,200 π‘˜π‘š in altitude ( β‰ˆ 12 β„Žπ‘Ÿ period orbit )

β€’ Each satellite:

βˆ’ Carries several atomic clocks (Cesium and/or Rubidium)

βˆ’ Continuously sends precisely timed signals to Earth

3

Block IIF

Satellite

(Boeing)

University of Illinois at Urbana-Champaign

4

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

compute distance from the satellite

4

University of Illinois at Urbana-Champaign

5

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

compute distance from the satellite

4

But, user’s clock is not accurate…

University of Illinois at Urbana-Champaign

6

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

compute distance from the satellite

4

But, user’s clock is not accurate…

β†’ 𝑑𝑅𝑋 is inaccurate

University of Illinois at Urbana-Champaign

7

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

roughly approximate distance from the satellite

4

University of Illinois at Urbana-Champaign

8

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

roughly approximate distance from the satellite

4

β€œPseudo” because:

Receiver clock is inaccurate

β†’ 𝑑𝑅𝑋 is inaccurate

β†’ 𝑐 𝑑𝑅𝑋 βˆ’ 𝑑𝑇𝑋 β‰  𝑑 (true range)

computed pseudorange 𝝆

University of Illinois at Urbana-Champaign

9

How GPS Enables Navigation

β€’ Precise satellite position (𝑿𝑺, 𝒀𝑺, 𝒁𝑺) provided to user

β€’ After receiver obtains the satellite signal:

βˆ’ Deciphers exact time of transmission 𝒕𝑻𝑿 of received signal

βˆ’ Notes user’s received time 𝒕𝑹𝑿, and compares to

roughly approximate distance from the satellite

4

receiver clock bias correction

University of Illinois at Urbana-Champaign

10

How GPS Enables Navigation

5

β€’ User has 4 unknowns:

βˆ’ 3D Position 𝑿𝑹, 𝒀𝑹, π’π‘Ήβˆ’ Clock bias πš«π’•

β€’ Require at least 4 equations,

or satellites in view(usually β‰₯ 6 in open environments)

β€’ For each satellite signal, we

have 1 equation:

𝜌 = 𝑐(𝑑𝑅𝑋 βˆ’ 𝑑𝑇𝑋) = 𝑑 βˆ’ 𝑐 Δ𝑑

= 𝑋𝑆 βˆ’ 𝑿𝑹2 + π‘Œπ‘† βˆ’ 𝒀𝑹

2 + 𝑍𝑆 βˆ’ 𝒁𝑹2 βˆ’ 𝑐 πš«π’•

University of Illinois at Urbana-Champaign

11

Civilian GPS and its Vulnerability

6

β€’ Commercial (non-military) users utilize civilian GPS signal

β€’ Civilian GPS signal (C/A) in L1 band:

βˆ’ Center frequency: 1575.42 MHz

βˆ’ Bandwidth: 2.046 MHz

βˆ’ Available to all users

University of Illinois at Urbana-Champaign

12

Military Signals for Authentication

Encrypted Military P(Y) GPS signal

βˆ’ Orthogonal to civilian GPS signals, with same center frequency

βˆ’ Because of encryption, cannot be generated by spoofer

βˆ’ Presence of P(Y) signal in quadrature phase component

indicates authentic GPS signal [2-3]

7

[2] Lo, et al, Inside GPS, 2009

[3] Psiaki, et al, ION GNSS, 2011[3]

University of Illinois at Urbana-Champaign

13

Prior Work and Main Challenges

β€’ Shown handful of receivers (2-8) can be authenticated [4]

β€’ Utilized centralized framework approach [5]

β€’ Must extend to entire widespread network of PMUs

8

[4] Heng, Work & Gao, IEEE ITS, 2015

[5] Bhamidipati, Mina & Gao, ION PLANS, 2018

[6] Hazra, et al, IEEE PES ISGT, 2014[6]

University of Illinois at Urbana-Champaign

14

Key Objectives

β€’ Develop spoofing detection architecture for coordinated

authentication of all PMUs, with existing resources

β€’ Provide defense against coordinated spoofing attacks

β€’ Demonstrate successful operation of algorithm during

government-sponsored, real-world spoofing scenario

9

University of Illinois at Urbana-Champaign

15

Outlineβ€’ GPS: How it Works

β€’ Hybrid Network Architecture Framework

β€’ Spoofing Detection Approach

βˆ’ Pairwise Check and Preliminary Statistic Computation

βˆ’ Regionally Representative Snippet

β€’ Implementational Considerations

βˆ’ Communication Protocol

βˆ’ Spoofing Risk Assessment

βˆ’ Subset Selection Algorithm

β€’ Experimental Setup and Results

β€’ Summary

10

University of Illinois at Urbana-Champaign

16

NASPInet Communication Structure

β€’ North American

Synchrophasor

Initiative network

(NASPInet) [9]

β€’ Regional utility

networks connected

via Data Bus

β€’ Resources

prioritized in regional

sub-networks

11

[9] Hu, Yi, NASPInet Technical Specifications, U.S. DOE, 2009

University of Illinois at Urbana-Champaign

17

Hierarchical Architecture Network

β€’ Utilize communication to compare received GPS signals

β€’ Proposed hybrid architecture network will overlay NASPInet

12

University of Illinois at Urbana-Champaign

18

High-level Process Diagram

13

University of Illinois at Urbana-Champaign

19

Outline

14

β€’ GPS: How it Works

β€’ Hybrid Network Architecture Framework

β€’ Spoofing Detection Approach

βˆ’ Pairwise Check and Preliminary Statistic Computation

βˆ’ Regionally Representative Snippet

β€’ Implementational Considerations

βˆ’ Communication Protocol

βˆ’ Spoofing Risk Assessment

βˆ’ Subset Selection Algorithm

β€’ Experimental Setup and Results

β€’ Summary

University of Illinois at Urbana-Champaign

20

Typical Correlation Observed (Authentic)

15

Typical correlation (authentic): single peak above noise floor

University of Illinois at Urbana-Champaign

21

Typical Correlation Observed (Spoofed)

16

Typical correlation (spoofed): no peak above noise floor

University of Illinois at Urbana-Champaign

22

Pairwise Statistic for Cross-Checking

17

β€’ Correlation result π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ between receivers π‘Ÿπ‘– and π‘Ÿπ‘— for PRN π‘˜:

βˆ’ Authentic: π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ ∼ 𝑝0 = 𝒩 πœ‡, 𝜎2 where πœ‡ > 0

βˆ’ Spoofed: π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ ∼ 𝑝1 = 𝒩 0, 𝜎2

β€’ Pairwise statistic π›Ύπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ :

βˆ’ Indicates amount of signal match for PRN π‘˜ between receivers π‘Ÿπ‘– and π‘Ÿπ‘—βˆ’ Consists of 2 terms:

β—‹ Thresholded correlation result: π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜π‘‡ = π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜πŸ™ π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ β‰₯ πœπ‘π‘Žπ‘–π‘Ÿ

β—‹ Pairwise weight π‘€π‘Ÿπ‘–π‘Ÿπ‘—,π‘˜, accounts for signal quality, receiver reliability, etc.

π›Ύπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ = π‘€π‘Ÿπ‘–π‘Ÿπ‘—,π‘˜ π‘ƒπ‘Ÿπ‘–π‘Ÿπ‘—,π‘˜π‘‡

University of Illinois at Urbana-Champaign

23

18

Authentication within Regional Network

University of Illinois at Urbana-Champaign

24

Incorporate Representative Snippets

19

University of Illinois at Urbana-Champaign

25

Outline

20

β€’ GPS: How it Works

β€’ Hybrid Network Architecture Framework

β€’ Spoofing Detection Approach

βˆ’ Pairwise Check and Preliminary Statistic Computation

βˆ’ Regionally Representative Snippet

β€’ Implementational Considerations

βˆ’ Communication Protocol

βˆ’ Spoofing Risk Assessment

βˆ’ Subset Selection Algorithm

β€’ Experimental Setup and Results

β€’ Summary

University of Illinois at Urbana-Champaign

26

Data Required for Communication Protocol

21

Data items to be sent by each PMU:

βˆ’ Raw GPS signal fragment

βˆ’ Signal tracking parameters for each visible satellite PRN

β—‹ Time of transmission start index

β—‹ Doppler Frequency

β—‹ Carrier phase

University of Illinois at Urbana-Champaign

27

Communication Protocol Structure

22

β€’ Data block: data for

each authentication

time

β€’ Data Packet: ~1 KB

of specific data with

header information

β€’ Data Frame:

organizes data into

segments, includes

check sum

Segmented data structure allows for:➒ Isolation of corrupted/missing data ➒ Optimized rate of data transfer and storage

University of Illinois at Urbana-Champaign

28

Bandwidth Requirements

23

β€’ Reducing communication bandwidth requirements:

βˆ’ Raw GPS signal fragment sent from PMU devices to PDC

βˆ’ Appropriate signal tracking parameters sent for processing

β€’ Main factors affecting overall bandwidth:

βˆ’ Signal fragment length (500 milliseconds)

βˆ’ Sampling rate (2.5 MHz)

βˆ’ Data sample resolution (8-bit samples)

βˆ’ Tracking parameter resolution (32-bit samples)

βˆ’ Number of visible satellite PRNs (about 6)

βˆ’ Desired rate of authentication (assuming 1 per minute)

β€’ Bandwidth computed: ~23 KB per second

β€’ Fiber optic cable: ~10 GB per second ( < 0.001% bandwidth)

University of Illinois at Urbana-Champaign

29

Evaluation of Spoofing Risk

24

Historical

data

Pseudorange

residuals

SNR

values

Clock

residuals

Known

position

Bernoulli

distribution

Local

oscillator

Chi-squared

distribution

Empirical

distribution

Weighted

average

Spoofing risk

𝑝 π‘Ÿπ‘‘ π‘Ÿπ‘‘βˆ’1:π‘‘βˆ’π‘Šπ‘ π‘Ÿπ‘‘ 𝑆𝑁𝑅1:𝑁

𝑝 π‘Ÿπ‘‘ Ξ”πœŒ1:𝑁 𝑝 π‘Ÿπ‘‘ Δ𝑇

𝑝(π‘Ÿπ‘‘)

University of Illinois at Urbana-Champaign

30

Optimization: Subset Selection

β€’ For cross-checking:

βˆ’ Utilizing all PMUs, quite

computationally expensive

βˆ’ Optimal subset of PMUs

β€’ Cost function:

𝑓 Ξ© =

𝑖,𝑗 ∈ Ξ©; iβ‰ j

𝑔 𝑖 𝑔(𝑗)β„Ž(𝑖, 𝑗)

25

β€’ 𝑔 𝑖 = 1 βˆ’ spoofing risk βˆ— comm. link βˆ— security

β€’ β„Ž 𝑖, 𝑗 = 𝑑𝑖𝑠𝑑(𝑖, 𝑗): Larger the separation, lesser

likelihood of both spoofed

University of Illinois at Urbana-Champaign

31

Outline

26

β€’ GPS: How it Works

β€’ Hybrid Network Architecture Framework

β€’ Spoofing Detection Approach

βˆ’ Pairwise Check and Preliminary Statistic Computation

βˆ’ Regionally Representative Snippet

β€’ Implementational Considerations

βˆ’ Communication Protocol

βˆ’ Spoofing Risk Assessment

βˆ’ Subset Selection Algorithm

β€’ Experimental Setup and Results

β€’ Summary

University of Illinois at Urbana-Champaign

32

Experimental Setup

Recorded GPS signal during live-sky spoofing event

27

Sample rate: 2.5 𝑀𝐻𝑧

Snippet length: 500 π‘šπ‘ 

Post-process: PyGNSS [10]

Spoofing Data

Collection Setup

Rooftop

Antenna

Setup

[10] Wycoff & Gao, GPS World, 2015

University of Illinois at Urbana-Champaign

33

Preliminary Threshold Determination

28

Threshold chosen to maximize authentic / spoofed conditional probabilities

Authentic:

𝛼 = 27.2𝑐 = 0.517𝛽 = 1.82𝑙 = 486

Spoofed:

𝛼 = 11.3𝑐 = 0.370𝛽 = 0.346𝑙 = 0

Generalized Gamma pdf:

𝑓 π‘₯, 𝛼, 𝑐, 𝛽, 𝑙 =𝑐 π‘¦π‘π›Όβˆ’1exp(βˆ’π‘¦π‘)

𝛾(𝛼)

𝑦 = 𝛽(π‘₯ βˆ’ 𝑙)

University of Illinois at Urbana-Champaign

34

Preliminary Statistics – Regional Networks

29

Spoofed

Authentic

Threshold

Threshold Authentic

University of Illinois at Urbana-Champaign

35

Secondary Threshold Determination

30

Threshold chosen to maximize authentic / spoofed conditional probabilities

Authentic:

𝛼 = 1.53𝑐 = 1.74𝛽 = 33.7𝑙 = 20.0

Spoofed:

𝛼 = 1.18𝑐 = 2.69𝛽 = 5.80𝑙 = 13.7

Generalized Gamma pdf:

𝑓 π‘₯, 𝛼, 𝑐, 𝛽, 𝑙 =𝑐 π‘¦π‘π›Όβˆ’1exp(βˆ’π‘¦π‘)

𝛾(𝛼)

𝑦 = 𝛽(π‘₯ βˆ’ 𝑙)

University of Illinois at Urbana-Champaign

36

Final Statistic – Representative Snippets

31

β€’ U.S. representative snippet matches that of South America

β€’ Snippet at Western U.S. receiver (spoofed) has poor match

ThresholdSpoofed

Signal from

Authentic

Receivers

University of Illinois at Urbana-Champaign

37

Summary

β€’ Proposed hybrid architecture to detect spoofing at each PMU

βˆ’ Provides a defense against coordinated attacks on regional networks

βˆ’ Uses regionally representative snippets to reduce bandwidth/processing

β€’ Demonstrated algorithm successfully operates on wide-spread

network during government-sponsored, real-world spoofing attack

βˆ’ Detects signal manipulation on victim receiver

βˆ’ Simultaneously authenticates other receivers in hybrid network

32

University of Illinois at Urbana-Champaign

38

Acknowledgements

Special thanks to:

Prof. Jade Morton and Mr. Steve Taylor

for collecting data at the Peru, Chile, Colorado, and Ohio sites.

Additionally, thanks to our lab members:

Craig Babiarz, Arthur Chu, Matthew Peretic, and Cara Yang

for assisting with the experimental setup and data collection at the

Illinois site and the Western U.S. spoofing location.

33

University of Illinois at Urbana-Champaign

39

34

Thank You!

Tara Yasmin Mina

Electrical and Computer Engineering

Email: [email protected]

Sriramya Bhamidipati

Aerospace Engineering

Email: [email protected]