The present invention, in some embodiments thereof, relates to detecting satellite navigation spoofing attacks and, more specifically, but not exclusively, to detecting satellite navigation spoofing attacks by combining multiple types of analysis of parameters extracted from satellite navigation signals.
Global Navigation Satellite System (GNSS) spoofing refers to the generation and transmission of GNSS signals in a way that causes GNSS receiver to receive them, validate them and use them to calculate and report the wrong position or time. Until recently, GNSS spoofing attacks required many resources and expensive equipment and was usually reserved for the military, other government agencies and well-funded organizations. However, in recent years low-cost software defined radios (SDR) and open-source GPS simulators have become widely available. This has led to an increasing occurrence of non-military GNSS spoofing attacks.
GNSS receivers are designed to provide navigation data, and typically do not have the ability to detect spoofing attacks. One of the main reasons is the difficulty and complexity of reliable detection. Another reason is a requirement by manufacturers to allow easy testing of their receivers using GNSS simulators. In order to allow ease of testing, many parameters inside the receiver are not optimized (e.g., the automatic gain control range is very broad).
There are some military solutions utilizing controlled radiation-pattern antenna (CRPA) technology that, by design, combat jamming attacks. Another solution is to drop satellite navigation data suspected of being spoofed and not use it to calculate the geographic location.
Fugro's Satguard™ applies a dedicated network of more than 100 reference stations world-wide to monitor the status of and data received from each individual GNSS satellite. Using Navigation Message Authentication a unique signature for each satellite is transmitted to users. By comparing the satellite data seen by the user with the data provided by Satguard™ fake satellites may be identified and discarded. Satguard™ also uses a multi-receiver technique which compares GNSS antenna geometry with known offsets. If one or more antennas depart from the expected location the system will trigger a spoofing alert. Satguard™ uses a large dedicated infrastructure of reference stations, with the attendant costs and technical difficulties of maintaining such a complex infrastructure.
Many systems rely on GNSS signals both for timing and location. As the spoofing threat is now at the hands of non-military hackers, a solution to identify and mitigate GNSS spoofing attacks is needed.
Additional background art includes:
It is an object of the present invention to provide an apparatus and method for detecting a GNSS spoofing attack. When such an attack is detected, control actions may be taken to mitigate the adverse effects.
Embodiments of the invention presented herein include many analysis mechanisms which be used alone or in combination to detect attacks on satellite navigation systems. The analysis may operate on information gathered from multiple sources and may be optimized to provide high detection accuracy for specific cases.
An indicator is issued when an attack is detected.
Benefits of the invention include:
1) The ability to mitigate the effects of a detected attack by providing an indicator of the attack within a time frame which allows the device using satellite navigation to respond in real-time to the attack;
2) Increased reliability of the geographic location decoded by the GNSS receiver;
3) More trustworthy navigation data reduces the need for other sensors or techniques for identifying the location;
4) False positives are minimized by using data from many sources; and
5) Easily implemented, without need for an extensive proprietary monitoring and data collection infrastructure.
According to a first aspect of some embodiments of the present invention there is provided a device for detecting attacks on a satellite navigation system. The device includes processing circuitry configured to:
According to some embodiments of the first aspect of the invention the device further includes a GNSS receiver.
According to some embodiments of the first aspect of the invention the device further includes a communication interface configured to communicate with a GNSS receiver.
According to a second aspect of some embodiments of the present invention there is provided a method for detecting attacks on a satellite navigation system. The method includes:
obtaining parameters extracted from a satellite navigation signal, the parameters including navigation messages;
inputting the obtained parameters into a classifier for detecting attacks on the satellite navigation system, wherein the classifier detects the attacks by analyzing data sequences which repeat at a same location in a plurality of corresponding navigation messages; and
based on a result from the classifier, issuing an indicator when an attack is detected by the classifier.
According to some embodiments of the first and/or second aspect of the invention, the location of the analyzed data sequences is a location having undefined data content in the protocol of the satellite navigation system.
According to some embodiments of the first and/or second aspect of the invention, the classifier detects the attack when the data sequences at the same location are extracted from navigation messages having the same transmission time information and which were received by a plurality of geographically dispersed GNSS receivers.
According to some embodiments of the first and/or second aspect of the invention, the classifier detects the attack when the data sequences at the same location correspond to a specified sequence.
According to some embodiments of the first and/or second aspect of the invention, the indicator is issued to a device enabled for satellite navigation and includes a trigger signal to trigger mitigating actions against the attack at the device enabled for satellite navigation.
According to some embodiments of the first and/or second aspect of the invention, the obtained parameters include at least one of:
navigational information computed by the GNSS receiver;
a navigation message;
characteristics of the received satellite signal; and
data decoded from the satellite signal.
According to some embodiments of the first and/or second aspect of the invention, the classifier includes a neural network trained to detect attacks on the satellite navigation system by a machine learning algorithm using training data which includes a plurality of parameters indicative of attacks on the satellite navigation system.
According to some embodiments of the first and/or second aspect of the invention, the analysis includes applying rule-based analysis to at least some of the obtained parameters.
According to some embodiments of the first and/or second aspect of the invention, the analysis includes assessing the validity of at least one of the obtained parameters in accordance with a model of an expected behavior of the obtained parameters.
According to some embodiments of the first and/or second aspect of the invention, upon the issue of the indicator of an attack a control action is performed in order to mitigate the attack.
According to some embodiments of the first and/or second aspect of the invention, at least one additional input parameter is obtained from at least one external source. The at least one additional parameter is input to the classifier, and the detection by the classifier is based on the parameters extracted from the at least one satellite navigation signal and on the parameters obtained from the at least one external source. According for further embodiments of the invention, at least one external source is:
a mobile communication device;
a mobile communication cell tower;
a navigation device;
a motion sensor;
a rotation sensor;
a magnetic sensor;
an odometer;
an inertial measurement unit;
a barometer;
a compass;
a steering wheel angle sensor;
a camera; and
at least one localization image.
According to some embodiments of the first and/or second aspect of the invention, parameters extracted from respective satellite navigation signals are obtained from multiple client devices. A query is received from one of the client devices querying whether a navigation message provided to the client device is a legitimate navigation message. The navigation message and respective parameters obtained from at least one other of the client devices are input into the classifier. An indicator of an illegitimacy of the navigation message is returned to the querying client device when the classifier detects an attack.
According to some embodiments of the first and/or second aspect of the invention, the classifier determines a legitimacy of the navigation message based on a consensus of multiple corresponding navigation messages obtained from the other client devices.
According to some embodiments of the first and/or second aspect of the invention, at least one of the client devices is polled to obtain the parameters extracted from the respective satellite navigation signals.
According to a third aspect of some embodiments of the present invention there is provided a device for detecting attacks on a satellite navigation system. The device includes processing circuitry configured to:
obtain, from a Global Navigation Satellite System (GNSS) receiver, parameters extracted from a satellite navigation signal;
input the obtained parameters into a classifier trained to detect attacks on satellite navigation systems, wherein the classifier is trained using a training set that includes parameters indicative of the presence of attacks; and
based on a result from the classifier, issue an indicator when an attack is detected.
According to some embodiments of the first aspect of the invention, the GNSS receiver is internal to the device.
According to some embodiments of the first aspect of the invention the device further includes a communication interface configured to communicate with the GNSS receiver.
According to a fourth aspect of some embodiments of the present invention there is provided a method for detecting attacks on a satellite navigation system. The method includes:
obtaining, from a Global Navigation Satellite System (GNSS) receiver, parameters extracted from a satellite navigation signal;
inputting the obtained parameters into a classifier trained to detect attacks on satellite navigation systems, wherein the classifier is trained using a training set that includes parameters indicative of the presence of attacks; and
based on a result from the classifier, issuing an indicator when an attack is detected.
According to some embodiments of the third and/or fourth aspect of the invention, the obtained parameters include at least one of:
navigational information computed by the GNSS receiver;
a navigation message;
characteristics of the received satellite signal; and
data decoded from the satellite signal.
According to some embodiments of the third and/or fourth aspect of the invention, the classifier includes a neural network trained with the training data by a machine learning algorithm.
According to some embodiments of the third and/or fourth aspect of the invention, the classifier applies rule-based analysis to at least some of the obtained parameters.
According to some embodiments of the third and/or fourth aspect of the invention, the classifier assesses a validity of at least some of the obtained parameters in accordance with a model of an expected behavior of the obtained parameters.
According to some embodiments of the third and/or fourth aspect of the invention, wherein, upon the issue of the indicator of an attack, a control action is performed to mitigate the attack.
According to some embodiments of the third and/or fourth aspect of the invention, at least one additional input parameter is obtained from at least one external source. The at least one additional parameter is input to the classifier. The detecting by the classifier is based on the parameters obtained from the GNSS receiver and on the parameters obtained from the at least one external source.
According to some embodiments of the third and/or fourth aspect of the invention, at least one external source is:
a mobile communication device;
a mobile communication cell tower;
a navigation device;
a motion sensor;
a rotation sensor;
a magnetic sensor;
an odometer;
an inertial measurement unit;
a barometer;
a compass;
a steering wheel angle sensor;
a camera; and
at least one localization image.
According to some embodiments of the third and/or fourth aspect of the invention:
parameters extracted from respective satellite navigation signals are obtained from multiple client devices,
a query is received from one of the client devices whether a navigation message provided to the client device comprises a legitimate navigation message;
the navigation message and respective parameters obtained from at least one other of the client devices are input into the classifier; and
an indicator of an illegitimacy of the navigation message is returned to the querying client device when the classifier detects an attack.
According to some embodiments of the third and/or fourth aspect of the invention the classifier determines the legitimacy of the navigation message based on a consensus of a corresponding navigation messages obtained from other client devices.
According to some embodiments of the third and/or fourth aspect of the invention at least one of the client devices is polled to provide the parameters extracted from the respective satellite navigation signals.
According to a fifth aspect of some embodiments of the present invention there is provided a device for detecting attacks on a satellite navigation system. The device includes processing circuitry configured to:
According to some embodiments of the invention the obtained parameters include navigational information computed by the GNSS receiver.
According to some embodiments of the invention the obtained parameters include characteristics of the received satellite signal.
According to some embodiments of the invention the obtained parameters include data decoded from the satellite signal.
According to some embodiments of the invention the classifier includes a neural network trained with the training data by a machine learning algorithm.
According to some embodiments of the invention the classifier applies rule-based analysis to at least some of the obtained parameters.
According to some embodiments of the invention the classifier assesses a validity of at least some of the obtained parameters in accordance with a model of an expected behavior of the obtained parameters.
According to some embodiments of the invention, upon the issue of the indicator of an attack, the processing circuitry performs a control action to mitigate the attack.
According to some embodiments of the invention the processing circuitry obtains at least one additional input parameter from at least one external source and inputs the at least one additional parameter to the classifier. The detection by the classifier is based on the parameters obtained from the GNSS receiver and on the parameters obtained from the at least one external source.
According to some embodiments of the invention at least one external source is:
a mobile communication device;
a mobile communication cell tower;
a navigation device;
a motion sensor;
a rotation sensor;
a magnetic sensor;
an odometer;
an inertial measurement unit;
a barometer;
a compass;
a steering wheel angle sensor;
a camera; and
at least one localization image.
According to some embodiments of the invention the GNSS receiver is internal to the device.
According to some embodiments of the invention the device further includes a communication interface configured to communicate with the GNSS receiver.
According to a sixth aspect of some embodiments of the present invention there is provided a method for detecting attacks on a satellite navigation system. The method includes:
obtaining, from a Global Navigation Satellite System (GNSS) receiver, parameters extracted from a satellite navigation signal;
inputting the obtained parameters into a classifier trained to detect attacks on satellite navigation systems, wherein the classifier is trained using a training set comprising a plurality of parameters indicative of the presence of attacks; and
based on a result from the classifier, issuing an indicator when an attack is detected.
According to some embodiments of the invention the obtained parameters include navigational information computed by the GNSS receiver.
According to some embodiments of the invention the obtained parameters include characteristics of the received satellite signal.
According to some embodiments of the invention the obtained parameters include data decoded from the satellite signal.
According to some embodiments of the invention the classifier includes a neural network trained with the training data by a machine learning algorithm.
According to some embodiments of the invention the classifier applies rule-based analysis to at least some of the input parameters.
According to some embodiments of the invention the classifier assesses a validity of at least some of the obtained parameters in accordance with a model of an expected behavior of the obtained parameters.
According to some embodiments of the invention the method further includes performing a control action to mitigate the attack upon an issue of the indicator of an attack.
According to some embodiments of the invention the method further includes obtaining at least one additional input parameter from at least one external source and inputting the at least one additional parameter to the classifier, the detecting by the classifier being based on the parameters obtained from the GNSS receiver and on the parameters obtained from the at least one external source.
According to a seventh aspect of some embodiments of the present invention there is provided an attack detector for detecting attacks on a satellite navigation system. The attack detector includes a communication interface configured for communicating over a network and processing circuitry. The processing circuitry:
obtains, over the network, navigation messages extracted from satellite navigation signals by a plurality source devices;
selects a consensus navigation message from a set of the obtained navigation messages by majority selection; and
sending an indicator of a spoofing attack to at least one source device when a navigation message obtained from the source device differs from the consensus navigation message.
According to some embodiments of the invention the set includes a single navigation message for each respective source device and the consensus navigation message is the navigation message having a maximum count in the set.
According to some embodiments of the invention for each of the source devices the set includes a specified multiple of the navigation message obtained from the source device and the consensus navigation message is the navigation message having a maximum count in the set.
According to some embodiments of the invention set includes navigation messages having the same Time Of Week.
According to some embodiments of the invention the processing circuitry is further configured for detecting spoofed navigation messages by analyzing parameters obtained from a GNSS receiver. Optionally, the obtained parameters include at least one of:
navigational information computed by the GNSS receiver;
physical characteristics of the received satellite signal; and
data decoded from the satellite signal.
According to some embodiments of the invention the processing circuitry is further configured for detecting spoofed navigation messages by analyzing sensor data obtained from at least one of the source devices. Optionally, the sensor data is from an inertial measurement unit.
According to some embodiments of the invention the processing circuitry is further configured for preventing inclusion of the spoofed navigation messages in the set.
According to an eighth aspect of some embodiments of the present invention there is provided a satellite navigation device which includes a GNSS receiver, a communication network for communicating over a network, and processing circuitry. The Global Navigation Satellite System (GNSS) receiver receives satellite navigation signals and extracts navigation messages from the satellite navigation signal. The processing circuitry:
sends the extracted navigation messages to a navigation message analyzer over the network;
obtains a consensus navigation message and a timing parameter of the consensus navigation message from the navigation message analyzer;
detects a spoofing attack when an extracted navigation message corresponding to the timing parameter of the consensus navigation message differs from the consensus navigation message. Optionally, the timing parameter is the Time Of Week of the navigation message.
According to some embodiments of the invention the processing circuitry is further configured for periodically pushing extracted navigation messages to the navigation message analyzer.
According to a ninth aspect of some embodiments of the present invention there is provided a method for detecting attacks on a satellite navigation system. The method includes:
obtaining, from multiple source devices, navigation messages extracted from satellite navigation signals;
selecting a consensus navigation message from a set of the obtained navigation message by majority selection;
sending an indicator of a spoofing attack to at least one source device when a navigation message obtained from the source device differs from the consensus navigation message.
According to some embodiments of the invention the set includes a single navigation message for each respective source device and the consensus navigation message is the navigation message having a maximum count in the set.
According to some embodiments of the invention the set includes a specified multiple of the respective navigation message obtained from each of the source devices device and the consensus navigation message is the navigation message having a maximum count in the set.
According to some embodiments of the invention the set includes navigation messages having the same Time Of Week.
According to some embodiments of the invention the method further includes detecting spoofed navigation messages by analyzing parameters obtained from a GNSS receiver. Optionally the obtained parameters include at least one of:
navigational information computed by the GNSS receiver;
physical characteristics of the received satellite signal; and
data decoded from the satellite signal.
According to some embodiments of the invention the method further includes detecting spoofed navigation messages by analyzing sensor data obtained from at least one of the source devices.
According to some embodiments of the invention the method further includes preventing inclusion of the spoofed navigation messages in the set.
Unless otherwise defined, all technical and/or scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which the invention pertains. Although methods and materials similar or equivalent to those described herein can be used in the practice or testing of embodiments of the invention, exemplary methods and/or materials are described below. In case of conflict, the patent specification, including definitions, will control. In addition, the materials, methods, and examples are illustrative only and are not intended to be necessarily limiting.
Implementation of the method and/or system of embodiments of the invention can involve performing or completing selected tasks manually, automatically, or a combination thereof. Moreover, according to actual instrumentation and equipment of embodiments of the method and/or system of the invention, several selected tasks could be implemented by hardware, by software or by firmware or by a combination thereof using an operating system.
For example, hardware for performing selected tasks according to embodiments of the invention could be implemented as a chip or a circuit. As software, selected tasks according to embodiments of the invention could be implemented as a plurality of software instructions being executed by a computer using any suitable operating system. In an exemplary embodiment of the invention, one or more tasks according to exemplary embodiments of method and/or system as described herein are performed by a data processor, such as a computing platform for executing a plurality of instructions. Optionally, the data processor includes a volatile memory for storing instructions and/or data and/or a non-volatile storage, for example, a magnetic hard-disk and/or removable media, for storing instructions and/or data. Optionally, a network connection is provided as well. A display and/or a user input device such as a keyboard or mouse are optionally provided as well.
Other systems, methods, features, and advantages of the present disclosure will be or become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description, be within the scope of the present disclosure, and be protected by the accompanying claims.
Some embodiments of the invention are herein described, by way of example only, with reference to the accompanying drawings. With specific reference now to the drawings in detail, it is stressed that the particulars shown are by way of example and for purposes of illustrative discussion of embodiments of the invention. In this regard, the description taken with the drawings makes apparent to those skilled in the art how embodiments of the invention may be practiced.
In the drawings:
The present invention, in some embodiments thereof, relates to detecting satellite navigation spoofing attacks and, more specifically, but not exclusively, to detecting satellite navigation spoofing attacks by combining multiple types of analysis of parameters extracted from satellite navigation signals.
In some embodiments of the invention, GNSS spoofing attacks are detected by analyzing information obtained from a GNSS receiver, and, optionally, from other sources. The analysis determines whether a spoofing attack is in progress. Once a spoofing attack is detected, control actions may be taken to mitigate the effects of the attack.
Before explaining at least one embodiment of the invention in detail, it is to be understood that the invention is not necessarily limited in its application to the details of construction and the arrangement of the components and/or methods set forth in the following description and/or illustrated in the drawings and/or the Examples. The invention is capable of other embodiments or of being practiced or carried out in various ways.
The present invention may be a device, a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages, including interpreted languages such as the “Python” programming language. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (such as LAN, wired or wireless) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider or a cellular telephone operator). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention. We have ASIC in the description of your invention below.
Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
Reference is now made to
Attack detector 100 detect attacks on the satellite navigation system by analyzing parameters of the satellite navigation signal. Attack detector 100 obtains some or all of the parameters from external GNSS receiver 150 and/or from other devices or systems, denoted herein external sources. When the analysis indicates that an attack is in progress (i.e. the satellite navigation signal is being spoofed), an indicator is issued.
As used herein the term “parameter” means information (e.g., a state, a value, a navigation message, a data set, etc.) that is analyzed to determine whether the satellite navigation signal is being spoofed.
The parameters may be obtained from a GNSS receiver and/or additional sources, as described below.
In some embodiments, the analysis includes inputting the obtained parameter values into a classifier (illustrated schematically as classifier 120) which has been trained to detect spoofing attacks, as described in more detail below.
In alternate or additional embodiments, the analysis includes comparing a specific navigation message to a consensus navigation message. Differences between the specific navigation message and the consensus navigation message may indicate that a GNSS spoofing attack is underway. An exemplary embodiment is presented in
Optionally, the indicator is issued to a device having satellite navigation capabilities (denoted herein a satellite navigation-enabled device). Examples of satellite navigation-enabled devices include but are not limited to: automobile, truck, ship, airplane, time server, mobile phone, tablet, camera, laptop computer, etc.
Optionally, the indicator includes a trigger signal which triggers the device receiving the indicator to take control actions to mitigate the attack. Examples of control actions are presented below.
Optionally, attack detector 100 is integrated into a server which receives information from multiple client devices and issues indicators to one or more of the client devices when an attack is detected. In this embodiment, the parameters analyzed by attack detector 100 may be obtained directly from a GNSS receiver and, alternately or additionally, may be obtained by attack detector 100 by communication with a client device (e.g., a computer). An exemplary embodiment is presented below (see
Communication interface 105 performs one or more of:
Optionally, attack detector 100 includes internal memory 130 which stores at least one of:
Optionally, attack detector 100 communicates with at least one external memory. External memory 135 may store one or more of: the code instructions, parameters, classifier information and other data used for attack detection.
Reference is now made to
Optionally, the indicator is issued to another device having satellite navigation capabilities (denoted herein a satellite navigation-enabled device). Examples of satellite navigation-enabled devices include but are not limited to: automobile, truck, ship, airplane, time server, mobile phone, tablet, camera, laptop computer, etc.
Optionally, the indicator includes a trigger signal which triggers satellite navigation device 102 to take control actions to mitigate the attack.
In optional embodiments of the invention, processing circuitry 110 is implemented, in whole or in part, as:
Reference is now made to
GNSS receiver 170 includes three layers:
Optionally, the types of parameters that may be obtained from a GNSS receiver and used for attack detection analysis include but are not limited to one or more of:
Optionally, the parameters are obtained from the GNSS receiver as text messages in NMEA format. Alternately or additionally, at least one of the parameters is provided by the GNSS receiver in a vendor-specific format (e.g., a binary message, raw GNSS measurements, etc.).
Default parameters that are available from the GNSS receiver in the industry-standard NMEA format include:
Some GNSS receivers provide additional parameters including but not limited to:
Optionally, attack detection is based on the parameters obtained from the GNSS receiver in combination with the information obtained from the external source(s). For example, information obtained from the external sources may be provided as additional input to a classifier.
Optionally, the information from the various sources is prioritized, for example by applying weightings according to the certainty of the data. Thus parameters obtained from a GNSS receiver (which is vulnerable to spoofing) may be given lower priority than information from sources that are immune to GNSS spoofing.
Examples of external sources include but are not limited to:
It is noted that some external sources may be integrated into the attack detector, for example the motion and/or rotation and/or magnetic sensors.
The embodiments presented herein describe many techniques for analyzing the satellite navigation signal parameters and/or data obtained from other sources in order to detect attacks on a satellite navigation system.
These techniques may be combined to provide a broad solution to the problem of detecting satellite navigation attacks by investigating the gathered information from many directions and with multiple mechanisms (for example see
Navigation message consensus is based on a comparison of corresponding navigation messages obtained from multiple sources. These sources may be a large user base (e.g., a fleet of cars or mobile phone users) and/or a small number of highly trusted sources. Attacks are detected by comparing a specific navigation message to a consensus navigation message selected from a set which includes navigation messages provided by multiple source devices.
As used herein the term “corresponding navigation message” means a navigation message which provides information which may be used to determine the legitimacy of a different navigation message. A non-limiting example of corresponding navigation messages are navigation messages provided by different satellite navigation devices having the same (or close) transmission timing information (e.g., TOW) as the navigation message being checked for legitimacy.
As used herein the term “consensus navigation message” means a navigation message which is considered to be a legitimate navigation message that was transmitted by a navigation satellite. The consensus navigation message serves as a standard for determining the legitimacy of other navigation messages.
Navigation messages are the actual data bits sent by a GNSS satellite. In current GNSS systems, the navigation message data bits are XORed with a pseudorandom PRN code (aka “a gold code”) and the output is modulated (e.g., BPSK for GPS L1 or BOC for Galileo E1) and transmitted to earth. The navigation message contains information about the entire GNSS constellation (the Almanac) and the satellites' orbit and clock parameters (the Ephemeris). This data is required by a GNSS receiver in order to solve the navigation equations and provide an accurate Positioning, Navigation, and Timing (PNT) solution.
Since not all of the data bits in the navigation message are required by the receiver (e.g., reserved data bit for future use), it is possible to “spoof” a navigation message. In most of the spoofing cases, the spoofed navigation message will not be completely identical to the one sent by a GNSS satellite. Spoofing the navigation message is referred to as “data spoofing”.
Reference is now made to
Attack detector 200 obtains navigation messages extracted by multiple source devices 230 from satellite navigation signals. A consensus navigation message is selected from a set of the obtained navigation messages. The set includes corresponding navigation messages, so that an analysis of the messages in the set may give information about which of the members of the set are legitimate navigation messages.
When the set includes a single navigation message for each source device, all the devices have equal influence on which navigation message is selected as the consensus navigation message. However, in some cases some source devices may be more trusted than others. Navigation messages provided by the trusted sources may be given more weight when selecting the consensus navigation message. One way to give more weight to navigation messages from a trusted source device is to include more than one copy of the navigation message received from the device in the set.
In some embodiments, the set includes one navigation message per source device. The consensus navigation message is the navigation message having the maximum count in the set. In other words, the consensus navigation message is the navigation message that was obtained from the majority of the source devices.
In alternate embodiments, the source devices are assigned respective weightings which indicate the number of times a navigation message sent by that source device should be included in the set. The consensus navigation message is the navigation message having the maximum count in the set.
When a navigation message obtained from a source device differs from the consensus navigation message, attack detector 200 sends an indicator of a spoofing attack to at least one source device. For example, the indicator may be sent to the source device that provided the navigation message and optionally to other devices in the vicinity of the source device that provided the navigation message.
Optionally, navigation messages must satisfy specified constraints in order to be included in the set. For example, all of the navigation messages included in the set must have the same Time Of Week (TOW). Alternately or additionally, the navigation message is checked to ensure it is bit-wise valid (i.e., the parity/checksum bits are correct).
Optionally, attack detector 200 performs other type(s) of analysis on the obtained navigation messages to determine if they are spoofed. Navigation messages that are determined to be spoofed are not included in the set.
For example, attack detector may analyze parameters obtained from a GNSS receiver (e.g., a source device) to detect spoofed navigation messages. Non-limiting examples of the parameters include:
i) Navigational information computed by the GNSS receiver (e.g., location of source device);
ii) Physical characteristics of the received satellite signal (e.g., signal quality); and
iii) Data decoded from the satellite signal (e.g., pseudorange, TOW).
Alternately or additionally, attack detector 200 also analyzes data from at least one source device sensor. Source device sensors include by are not limited to:
1) An inertial measurement unit (IMU);
2) A motion sensor;
3) A rotation sensor;
4) A magnetic sensor;
5) An odometer;
6) A barometer;
7) A compass;
8) A steering wheel angle sensor; and
9) A camera.
Optionally, attack detector 200 receives a query from a source device whether a specific navigation message extracted by that device is spoofed. If the navigation message is different from the corresponding consensus navigation message, attack detector 200 returns an indicator to the querying source device that the navigation message is spoofed (i.e. an attack has been detected). Optionally the query includes the specific navigation message and timing information (e.g., TOW) which enables attack detector 200 to identify the corresponding consensus navigation message.
In an exemplary embodiment, attack detector 200 obtains the navigation messages from a consensus network of users. The consensus network comprises:
1. An ordinary user base;
2. Trusted users; and
3. Centralized and/or distributed consensus servers.
The users send (or publish) the navigation messages from their local/internal receiver to the consensus server where they are received, analyzed, and saved into a database by the consensus software. The response from the server to the user is “spoofed”, “not spoofed” or “unreliable”.
The flow:
Reference is now made to
GNSS receiver 240 receives a satellite navigation signal and extracts navigation messages from the satellite navigation signal.
Satellite navigation device 235 sends the extracted navigation messages to navigation message analyzer 280 over the network 270. Navigation message analyzer 280 returns a consensus navigation message and a timing parameter of the consensus navigation message. Optionally the timing parameter is the TOW of the consensus navigation message.
Satellite navigation device 235 detects a spoofing attack by comparing a navigation message extracted by GNSS receiver 240 with the consensus navigation message having a corresponding timing parameter (e.g., the same TOW).
Optionally, when satellite navigation device 235 detects a spoofing attack it performs actions in order to mitigate the attack. For example, all PRNs with navigation messages which differ from the corresponding consensus navigation message are deleted and PNT calculation is performed using the non-spoofed PRNs.
Optionally, satellite navigation device 235 periodically pushes navigation messages extracted by GNSS receiver 240 to navigation message analyzer 280.
Pseudoranges are the actual measurements derived from the time of flight of the message arriving from the satellite. Spoofing the pseudoranges is referred to as “range spoofing”. Since not all GNSS receiver will provide the navigation message, most will provide the pseudoranges. When a spoofer is activated, all of the receivers within its range will calculate the same PNT solution since they all receive the same spoofed signal transmitted from a nearby source.
In some embodiments of the invention, pseudoranges are sent by multiple source devices to a centralized attack detection server for comparison. If a large enough number of users report the same pseudorange, spoofing is detected.
Attack detection may alternately or additionally be based on an analysis of parameters supplied by the GNSS receiver. Non-limiting examples of the parameters include:
i) Navigational information computed by the GNSS receiver (e.g., location of source device);
ii) Physical characteristics of the received satellite signal (e.g., signal quality); and
iii) Data decoded from the satellite signal (e.g., pseudorange, TOW).
Such GNSS-based analyses include but are not limited to the following examples.
If the AGC level is going down while the SNR value of PRNS increases or does not change dramatically, spoofing is detected.
The SNR may be predicted according to a deterministic model. This model is used by spoofers to generate the spoofed signal. In reality, the received SNR rarely (if ever) matches the theoretical values. If it does, it is a clear indication of spoofing since the spoofed signal originates from a terrestrial source that is in close proximity to the target being spoofed.
A GNSS receiver provides the raw measurements in the form of either a pseudorange (the assumed range to the SV) or SV time (the flight time of the signal) plus the receiver hardware clock. The SV time is used to calculate the PNT for each constellation separately. If the deviation is beyond a predefined threshold, spoofing is detected.
A device having several location providers (GNSS, Wi-Fi, Cellular, etc.) or a GNSS receiver that is not fully effected by the spoofer, will report a certain position. This position is used to calculate the pseudoranges of each PRN in each constellation. The reported pseudoranges are compared to the calculated pseudoranges. If the deviation is beyond a predefined threshold, spoofing is detected.
vi) Spoofing Ranges without Navigation Message
A spoofer may spoof only the ranges without any valid navigation message. If the SNR is good (i.e. the signal strength is high) but navigation messages cannot be decoded, spoofing is detected. Typically when navigation messages cannot be decoded the SNR values are low.
vii) DOP as a State Change Indicator
Dilution of precision of one or more kinds (horizontal, vertical, position, or time) and the geometric continuity/discontinuity level are used to identify the variation between true (satellites) position solution and false (spoofer) position solution. If the variation is above a certain threshold, spoofing is detected.
viii) Compare Elevation to DTM
If the elevation reported by the receiver does not match the elevation obtained from a Digital Terrain Map (DTM), spoofing is detected.
The GNSS receiver calculates the accuracy of the reported PNT solution. Many times, spoofers generate low-quality signals (bad clock, no 1 PPS sync, high local oscillator drift) that are picked up by the receiver, they exhibit very good SNR values and the NAV message is being decoded. But the overall accuracy of the solution exceeds logical limits. In this case, a predefined threshold crossed for a certain duration is detected as spoofing.
Compare the calculated time to trusted server time. If the times differ, spoofing is detected.
xi) Compare Doppler Shifts from Different Sources
A spoofed signal originating from a spoofer will not have the same Doppler shift as a signal transmitted by a satellite. A theoretical model Doppler shift is calculated for each PRN and compared to all tracked Doppler shifts of the same PRN (in the presence of a spoofer, the same PRN may be tracked multiple times). If the difference between the model and the received shifts is not the same, spoofing is detected.
In sensor-aided detection the attack-detection analysis is further based on additional information obtained from sensors in the GNSS device. Source device sensors include by are not limited to:
Using the device's built-in IMU, perform double integration of the accelerometer readings (corrected with orientation data from gyro) to obtain changes in position. Use the speed obtained from GPS as the initial conditions of the integration. Compare the predicted position to that obtained from GPS. If the error exceeds a threshold, spoofing is detected.
During driving conditions, use vector mapping data to add a constraint on the possible location obtained from dead-reckoning. If the error exceeds a threshold, spoofing is detected.
iii) Detect No Movement
Using the device's built-in IMU, check if:
Using the device's built-in IMU, check if:
When a mobile device is held in hand and being used, the taps on the phone register very unique accelerometer readings on the Z-axis as well as a logical range of orientations (e.g., facing up at an angle). In these cases, the handheld state is detected.
Using the device's built-in IMU, check for short bursts of pre-defined gyro and accelerometer changes. If these changes correspond to patterns that indicate a walking or running activity and are very short and far between: If all are true AND the location changes, detect spoofing.
vii) Heading and Course Alignment
Using the IMU, it is possible to determine the heading of a device (a combination of magnetic field and orientation based on gyros). The GPS does not provide heading data but does provide course data (a vector of speed and direction between two consecutive locations).
The atmospheric pressure changes as a continuous function. When the location provided with large altitude changes while none are registered on the barometer, spoofing is detected.
Mobile devices (e.g., mobile telephones running iOS or Android), typically have built-in activity type classifiers provided by the operating system. These classifiers are “black boxes” that provide an activity type (e.g., stationary, walking, running, cycling, automotive) and a confidence level.
The activity type information may be used to identify spoofing attacks. Examples include but are not limited to:
To prevent false-positives, cases of rapid movements (e.g., sharp turns in the car, shaking, vibration) may be filtered.
Signals of opportunity detection utilizes information that is obtained from other types of communication signals, in addition to the satellite navigation signals.
When movement is detected using the IMU but it is not possible to classify the nature of the movement, Wi-Fi signals may be used to anchor the location. If the Service Set Identifier (SSID) of a Wi-Fi network does not change while a large location jump is detected, spoofing is detected. Further analysis may be performed to address edge cases such as coverage of large areas such as shopping malls, airports, and university campuses and personal hotspots.
If a large movement is detected while the device is connected to the same cellID, spoofing is detected.
Optionally, at least some of the parameters obtained by the attack detector from the GNSS receiver and/or other sources are input into a classifier which detects satellite navigation spoofing attacks by analyzing the parameter values. When the classifier results indicate that an attack is in progress (i.e. the satellite navigation signal is being spoofed), the indicator is issued.
Optionally, the classifier incorporates one or more of the detection mechanisms disclosed herein, including but not limited to:
Optionally, the decision of whether an indicator should be issued is based on the results of multiple types of analysis. For example, an indicator may be issued when the neural network indicates a high likelihood of attack and location cross-referencing finds discrepancies between the GNSS location and other sources of location information.
Optionally, the classifier logic is defined and/or the classifier training is performed outside the attack detector and not as part of the attack detector functionality. The predefined classifier may be included as part of the attack detector hardware and/or as code instructions for execution by the processing circuitry.
i. Neural Network Training
A neural network which has been trained with a set of training data (denoted herein the training set) to identify when an attack occurs. The training set includes parameters that are indicative of the presence of attacks. The type of neural network and the training method may be selected to optimize the detection of specific type(s) of spoofing.
Two common architectures of neural networks are feed-forward and recurrent neural networks. Recurrent neural networks are well suited for time series analysis but training them is more complicated relative to training a feed-forward neural network.
Training neural networks is usually done using a back-propagation technique. Artificial intelligence may be used to solve issues for which it is hard to devise an analytical solution. For example, in many cases the relationship between parameters to the classification result is unclear by standard analysis techniques even though a relationship does exist.
Specifically, deep neural networks are superior to other machine learning approaches due to the fact that they require less expertise in statistics inference and probability theory compared to other machine learning approaches. Deep neural networks may find non-linear relationships between parameters and classification results.
In an exemplary embodiment, the classifier is trained to identify numerous scenarios based on selected GNSS parameters (e.g., SNR, clock drift, SNR noise). Types of trained scenarios include but are not limited to:
Optionally, the classifier is trained to differentiate between several modes of motion. The following are some examples of common use cases using the IMU:
Specified rules are applied to some or all of the parameters input to the classifier. Types of rules which may be applied to one or more parameters include but are not limited to:
a) Checking if a parameter is within a specified range. If the parameter falls outside its range, this may indicate that a spoofing attack is occurring.
b) Checking if redundant data is absent from a navigation message—Navigation messages sent by GNSS satellites typically contain redundant data that is not required by the GNSS receiver but is nonetheless present in the navigation message. Spoofers typically do not transmit this data, so its absence may be indicative of a spoofing attack. If the redundant data is present in the navigation message, its validity may be verified in order to determine whether it is correct (e.g., verifying the almanac and data validity of the navigation messages).
c) Checking if data sequences repeat in multiple navigation messages—GNSS satellites transmit navigation messages. Typically, some of the data bits in the navigation messages are reserved for future use, are not required by the GNSS receivers and are not predictable. High-end simulators use these bits to let a receiver know that the origin of the transmission is from a simulator and not a real satellite. For example for the GPS L1 C/A Code LNAV message, they will usually use 0xAAAAA (hex notation) in words 4, 5 and 6 in subframe 1. Spoofers often do not bother to predict these reserved bits and simply fill those bits as a constant template of 1's and 0's. The classifier compares multiple navigation messages and determines whether fixed bit sequences recur in a specified location or locations of multiple navigation messages (e.g., in the locations of the reserved bits). If so, messages containing the fixed bit sequence(s) are identified as spoofed. Alternately or additionally, the bit sequence is compared to a specified template or templates, and if a correspondence is found the messages are identified as spoofed. The expected time to detect an attack is up to 30 seconds when compared to templates locally and up to 6 seconds in a client-server architecture.
As used herein the term “location of the reserved bits” means a location in the navigation message having undefined data content in the protocol of the satellite navigation system.
Some parameters obtained from the GNSS receiver are physical measurements of the real world. These parameters may be compared to a physical model describing their behavior. For example, parameters such as Doppler shift, pseudo ranges and signal quality may be modeled. Failure of the measured parameters to adhere to the model may indicate an attack.
In data fusion, parameter data for the classifier is obtained from multiple sources. Different priorities and/or weights may be assigned to different types of information. For example, both a GNSS receiver and an odometer are capable of reporting movement. In a non-spoofed environment both the GNSS receiver and the odometer should report the same movement (within some threshold error). If there is a significant difference between the movement reported by the GNSS receiver and the odometer, this may be a sign of spoofing. Therefore, movement information provided by the odometer may be given higher priority than movement information provided by the GNSS receiver. The same applies to the compass readings for direction changes and the barometer reading for altitude changes.
Cellular networks have cell towers in well-known geographical locations. If a system with cellular connectivity is connected to a certain cell tower with a known geographical location but the GNSS reports a location that is not within the range of the cell tower, spoofing is indicated. Similar location cross-referencing may be performed with Wi-Fi hotspots and Bluetooth beacons having known geographical locations. Another source of geographical location in some autonomous systems originates from image-based systems like cameras, radars and LIDARs.
Using domain specific deep neural network(s) and/or Gaussian mixture model(s) and/or hidden Markov model(s), anomalies are searched for across one or more of the parameters available from the GNSS receiver (e.g., Doppler shift, SNR levels of each satellite, difference between SNRs and the first, second and third derivatives of the SNR).
In some configurations, attack detectors communicate with a server. The server analyzes information obtained from multiple attack detectors to detect anomalies. For example, a server may provide proof of location for a given attack detector based on the location of other attack detectors located in proximity. Alternately or additionally, the server may identify that spoofing is occurring when multiple attack detectors report the same location while moving.
The server-based analysis is provided to the classifier and may be fused with input obtained from other sources to make a final decision of whether to issue an indicator.
When an attack is detected, one or more control actions may be taken to mitigate its effects so that GNSS usage may be resumed at a later time (when the attack is over). For example, a vehicle may stop using GNSS navigation when an attack is detected, drive away from the affected area and then resume using GNSS navigation.
Optionally, when an indicator is issued, the processing circuitry performs at least one control action. Such control actions include but are not limited to:
Reference is now made to
In 410, parameters extracted from a satellite navigation signal are obtained from a GNSS receiver.
In 420, the parameters are analyzed to detect an attack. Exemplary embodiments of performing the analysis using a classifier and by navigation message consensus are presented in
If an attack is detected in 430, in 440 an indicator is issued.
Optionally, in 450 a control action is taken when an indicator is issued.
Optionally, the parameters obtained from the GNSS receiver include one or more of:
Optionally the classifier is based on one or more of:
Optionally, the method further includes obtaining data from at least one external source and providing it as additional input to the classifier. Attack detection is based on the parameters obtained from the GNSS receiver in combination with the parameter information obtained from the external source(s).
Optionally, an external source is:
Reference is now made to
In 510, parameters extracted from a satellite navigation signal are obtained from a GNSS receiver.
In 520, the parameters are input into a classifier. The classifier is trained using a training set of parameters indicative of the presence of attacks.
If an attack is detected based on a result from the classifier in 530, in 540 an indicator is issued.
Optionally, in 550 a control action is taken when an indicator is issued.
Optionally, the parameters obtained from the GNSS receiver include one or more of:
Optionally the classifier is based on one or more of:
Optionally, the method further includes obtaining data from at least one external source and providing it as additional input to the classifier. Attack detection is based on the parameters obtained from the GNSS receiver in combination with the parameter information obtained from the external source(s).
Optionally, an external source is:
Reference is now made to
Optionally, in 660 a control action is taken to mitigate the attack. For example, navigation messages obtained from source devices close to a device known to be under a spoofing attack may not be included in sets of navigation messages used to determine subsequent consensus navigation messages and/or the trust level of those devices might be lowered.
In some embodiments, the set includes one navigation message per source device. The consensus navigation message is the navigation message having the maximum count in the set.
In alternate embodiments, the source devices are assigned respective weightings which indicate the number of times a navigation message sent by that source device should be included in the set. The consensus navigation message is the navigation message having the maximum count in the set.
Optionally, the consensus navigation message is selected from navigation messages having a same TOW.
The method further includes performing additional analysis on the obtained navigation messages to determine if they are spoofed. Navigation messages that are determined to be spoofed are not included in the set. For example, spoofed navigation messages may be detected by analyzing at least one navigation signal parameter and/or sensor data obtained from the respective source device. Non-limiting examples of the parameters include:
i) Navigational information computed by the GNSS receiver;
ii) Physical characteristics of the received satellite signal; and
iii) Data decoded from the satellite signal.
Reference is now made to
In 710, SNR data for the received satellite navigation signal is checked to determine whether it indicates a spoofing attack (e.g., SNR changes too rapidly).
If the SNR pattern does not indicate a spoofing attack and navigation message data is available (720), navigation message consensus analysis is performed by a consensus detector in 730.
If the consensus detector does not detect a spoofing attack and pseudorange data is available (740), the pseudorange information is analyzed by pseudorange detector in 750.
A spoofing attack is detected if any one of SNR Pattern Detector, Consensus Detector and Pseudorange detector detect an attack.
In some embodiments of the invention, determining the legitimacy of navigation messages (i.e. attack detection) is performed by an attack detection server which communicates with multiple client devices.
Reference is now made to
The client devices send navigation messages, and optionally additional information (such as time stamps), to attack detection server 810. The navigation messages and/or additional information enable attack detection server 810 to determine which navigation messages appear to have been transmitted at the same time. Because a navigation message transmitted from a satellite above a given geographical location is received identically by a GNSS receiver up to 5,000 km away (under satisfactory channel conditions), inconsistencies between a particular navigation message and corresponding messages from other client devices may indicate that the particular navigation message is spoofed.
A client device may query attack detection server 810 whether a particular navigation message it received is or is not spoofed (i.e. the spoofing state). The navigation message may have been previously provided by the client to attack detection server 810 or may be provided with the query (possibly along with additional information).
Alternately or additionally, the client device queries attack detection server 810 even if when it has not published information (e.g., a navigation message) to the server, and attack detection server 810 replies with a best-effort estimate of the spoofing state based on past data.
If the client device base is spread over a large geographic area, effective identification may be achieved with information provided by as few as a dozen client devices. The probability of detecting a spoofing attack improves as the number of client devices sharing their navigation messages increases. Expected detection time is under 6 seconds.
Optionally, some or all of the client devices push (i.e. publish) their respective data to attack detection server 810 (e.g., on a regular basis). Alternately or additionally, attack detection server 810 polls some or all of the client devices for their information.
Reference is now made to
In 910 a query is received from one of the client devices to check whether a navigation message is spoofed. The query includes information extracted from a navigation signal. Optionally the included information is the navigation message being checked and further optionally other information, such as time stamps, which enable the attack detection server to identify corresponding navigation messages which were received from other client devices.
In 920 the information provided with the query is analyzed by a classifier to determine whether the navigation message being checked is legitimate or spoofed.
Optionally, the classifier detects attacks by analyzing data sequences which repeat at a same location in corresponding navigation messages. Further optionally, the location is a location having undefined data content in the protocol of the satellite navigation system (e.g., reserved bits in the navigation message).
Optionally, the classifier detects and attack when the data sequences at the same location are extracted from navigation messages having the same (or substantially the same) transmission time information and were received by multiple geographically dispersed GNSS receivers. Alternately or additionally, the classifier detects an attack when the data sequences at the same location correspond to a specified sequence (e.g., template or templates).
Optionally, the analysis is performed by a trained classifier, which was trained using a training set which includes parameters indicative of the presence of attacks.
In 930-950, an indicator of whether the navigation message is legitimate or spoofed is returned to the client device based on the results of the analysis.
The determination that a single client is being spoofed does not necessarily mean other clients close by are also spoofed. In some embodiments the attack detection server does not push a spoofing state indicator to other client devices. Furthermore, client device(s) may only provide meta-data that does not allow the attack detection server to know where the client is located and therefore it is unable to send indicators to nearby client devices. In other cases it may be desirable to indicate to other client devices that they are or may be under a spoofing attack.
Optionally, in 960 when the navigation message is spoofed an indicator is sent to other client devices (e.g., other client devices which may be under the same spoofing attack), based for example on further analysis of parameters provided by a particular client device.
The legitimacy of the navigation message being checked may be determined by any of the mechanisms or combination of mechanisms described herein (e.g., a combination of rule-based analysis with anomaly detection). For example, a client device may be unable to detect a navigation message due to an attack that deliberately corrupts the navigation message but still lets the receiver track the signal and calculate a spoofed position. A spoofing attack is detected when the signal quality at the client device is good and the geographical location is accurate but no navigation message may be extracted from the signal.
Optionally, the legitimacy of the navigation message being checked is determined based on a consensus of corresponding navigation messages obtained by the attack detection server. In an exemplary embodiment, the attack detection server operates as a service to subscribed users and uses navigation message consensus to determine whether a particular navigation message is legitimate or spoofed. The attack detection server collects navigation messages from subscribed users of the service. A user queries the attack detection server (e.g., using an API) whether a particular navigation message, passed as an argument to the query, is or is not spoofed. The attack detection server decides whether the navigation message provided with the query is spoofed based on a majority vote, by comparing the navigation message in the query with a concurrent database of navigation messages from other users for the specific time. If there is no consensus, the API call to the user returns “spoofed”.
In summary, there are many types of spoofing techniques and spoofing scenarios in constant evolution. The above described embodiments provide an extremely robust detection method, which can combine analysis mechanisms to direct the attack detection to specific attack scenarios. Additionally, utilizing data obtained from multiple sources minimizes false positives (in which an indicator is issued when an attack is not taking place), providing an important benefit since the typical operating environment of a GNSS receiver is a non-spoofed one.
The methods as described above are used in the fabrication of integrated circuit chips.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The descriptions of the various embodiments of the present invention have been presented for purposes of illustration but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
It is expected that during the life of a patent maturing from this application many relevant satellite navigation systems, navigation messages, parameters obtainable from GNSS receivers, techniques for acquiring and tracking navigation messages, digital signal processors, processing circuitry, GNSS receivers (hardware and software) and IP core technology will be developed and the scope of the terms satellite navigation system, navigation message, parameter, acquisition, tracking, digital signal processor, processing circuitry and GNSS receiver are intended to include all such new technologies a priori.
As used herein the term “about” refers to ±10%.
The terms “comprises”, “comprising”, “includes”, “including”, “having” and their conjugates mean “including but not limited to”. This term encompasses the terms “consisting of” and “consisting essentially of”.
The phrase “consisting essentially of” means that the composition or method may include additional ingredients and/or steps, but only if the additional ingredients and/or steps do not materially alter the basic and novel characteristics of the claimed composition or method.
As used herein, the singular form “a”, “an” and “the” include plural references unless the context clearly dictates otherwise. For example, the term “a compound” or “at least one compound” may include a plurality of compounds, including mixtures thereof.
The word “exemplary” is used herein to mean “serving as an example, instance or illustration”. Any embodiment described as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments and/or to exclude the incorporation of features from other embodiments.
The word “optionally” is used herein to mean “is provided in some embodiments and not provided in other embodiments”. Any particular embodiment of the invention may include a plurality of “optional” features unless such features conflict.
Throughout this application, various embodiments of this invention may be presented in a range format. It should be understood that the description in range format is merely for convenience and brevity and should not be construed as an inflexible limitation on the scope of the invention. Accordingly, the description of a range should be considered to have specifically disclosed all the possible subranges as well as individual numerical values within that range. For example, description of a range such as from 1 to 6 should be considered to have specifically disclosed subranges such as from 1 to 3, from 1 to 4, from 1 to 5, from 2 to 4, from 2 to 6, from 3 to 6 etc., as well as individual numbers within that range, for example, 1, 2, 3, 4, 5, and 6. This applies regardless of the breadth of the range.
Whenever a numerical range is indicated herein, it is meant to include any cited numeral (fractional or integral) within the indicated range. The phrases “ranging/ranges between” a first indicate number and a second indicate number and “ranging/ranges from” a first indicate number “to” a second indicate number are used herein interchangeably and are meant to include the first and second indicated numbers and all the fractional and integral numerals therebetween.
It is appreciated that certain features of the invention, which are, for clarity, described in the context of separate embodiments, may also be provided in combination in a single embodiment. Conversely, various features of the invention, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable sub-combination or as suitable in any other described embodiment of the invention. Certain features described in the context of various embodiments are not to be considered essential features of those embodiments, unless the embodiment is inoperative without those elements.
Although the invention has been described in conjunction with specific embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, it is intended to embrace all such alternatives, modifications and variations that fall within the spirit and broad scope of the appended claims.
All publications, patents and patent applications mentioned in this specification are herein incorporated in their entirety by reference into the specification, to the same extent as if each individual publication, patent or patent application was specifically and individually indicated to be incorporated herein by reference. In addition, citation or identification of any reference in this application shall not be construed as an admission that such reference is available as prior art to the present invention. To the extent that section headings are used, they should not be construed as necessarily limiting. In addition, any priority document(s) of this application is/are hereby incorporated herein by reference in its/their entirety.
This application claims the benefit of priority of U.S. Provisional Patent Application No. 62/850,578 filed on 21 May 2019, the contents of which are incorporated herein by reference in their entirety. This application claims the benefit of priority of U.S. Provisional Patent Application No. 62/966,072 filed on 27 Jan. 2020, the contents of which are incorporated herein by reference in their entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IL2020/050562 | 5/21/2020 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62966072 | Jan 2020 | US | |
62850578 | May 2019 | US |