understanding and mitigating the
play

UNDERSTANDING AND MITIGATING THE IMPACTS OF GPS/GNSS VULNERABILITIES - PowerPoint PPT Presentation

ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 UNDERSTANDING AND MITIGATING THE IMPACTS OF GPS/GNSS VULNERABILITIES NOVEMBER 2013 T.W. GEHRELS J.J. MAKELA, X. JIANG, A. DOMINGUEZ-GARCIA,G. GAO, R. BOBBA UNIVERSITY OF ILLINOIS AT URBANA CHAMPAIGN


  1. ANNUAL INDUSTRY WORKSHOP NOVEMBER 6-7, 2013 UNDERSTANDING AND MITIGATING THE IMPACTS OF GPS/GNSS VULNERABILITIES NOVEMBER 2013 T.W. GEHRELS J.J. MAKELA, X. JIANG, A. DOMINGUEZ-GARCIA,G. GAO, R. BOBBA UNIVERSITY OF ILLINOIS AT URBANA CHAMPAIGN TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.ORG 1 UNIVERSITY OF ILLINOIS | DARTMOUTH COLLEGE | UC DAVIS | WASHINGTON STATE UNIVERSITY FUNDING SUPPORT PROVIDED BY DOE-OE AND DHS S&T

  2. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G MOTIVATION • PMUs are increasingly prevalent in power systems – New opportunities in protection and control • GPS receivers used as a timing source for synchronization – GPS timing signals are nanosecond accurate – GPS signal freely available • GPS receiver clock offset will cause error in the PMU’s phase angle measurements • Error will be passed through PMU dependent algorithms – Voltage stability algorithm – Fault impedance computation – Fault location algorithm 2

  3. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G GPS VULNERABILITY • The civilian GPS signal is unencrypted and highly predictable • Simulated GPS signal can be generated that has the same signal structure as the authentic signals • Development of attacks allows for better understanding of vulnerabilities – Design effective detection and mitigation techniques 3

  4. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G TYPES OF GPS RECEIVER ATTACKS • Signal level attack / replay attack – Change timing of signal, causing error in range measurements – Receiver position & clock offset not easily specified • Data level attack to cause crash – Induce divide by zero, increment week number irreversibly – Non-stealth attack • Subtle data level attack – Cause error in timing while still appearing to function normally – All encoded data remain realistic values – Receiver position change bounded to value of normal variation – Motivates the development of a more comprehensive, multi-layer detection scheme 4

  5. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G OVERVIEW OF VULNERABILITY EXPLOITATION 1. Calculate the changes to the data contained in the GPS signals that will: • Induce the maximum possible receiver clock offset • Not cause a significant change to the calculated receiver location 2. Take over tracking loops of the GPS unit using spoofed signals • PMUs are at known locations, making the attack easier than for a dynamic target • Demonstrated by Humphreys et al. 3. Inject rogue data into the GPS unit and have it accepted as legitimate data • Introduce the calculated clock offset 5

  6. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G OVERVIEW OF VULNERABILITY EXPLOITATION 1. Calculate the changes to the data contained in the GPS signals that will: • Induce the maximum possible receiver clock offset • Not cause a significant change to the calculated receiver location 2. Take over tracking loops of the GPS unit using spoofed signals • PMUs are at known locations, making the attack easier than for a dynamic target • Demonstrated by Humphreys et al. 3. Inject rogue data into the GPS unit and have it accepted as legitimate data • Introduce the calculated clock offset 6

  7. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G MAXIMIZING RECEIVER CLOCK OFFSET • A nonlinear optimization problem that maximizes the receiver clock offset (phase measurement error) through perturbation of the satellite ephemerides • Decision variables – satellites’ ephemeris • Objective function – receiver clock offset • Constraints – bounds on the satellites ’ ephemerides – bounds on change to the computed receiver position 7

  8. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G GPS CLOCK BIAS SIMULATION Clock offset Time of attack (objective function) Phase angle (impact) Perceived position (constraint) 8

  9. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G MAXIMIZING RECEIVER CLOCK OFFSET • A nonlinear optimization problem that maximizes the receiver clock offset (phase measurement error) through perturbation of the satellite ephemerides • Decision variables – satellites’ ephemeris • Objective function – receiver clock offset • Constraints – bounds on the satellites ’ ephemerides – bounds on change to the computed receiver position 9

  10. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G MAXIMIZING RECEIVER CLOCK OFFSET • A nonlinear optimization problem that maximizes the receiver clock offset (phase measurement error) through perturbation of the satellite ephemerides • Decision variables – satellites’ ephemeris User defined! • Objective function – receiver clock offset • Constraints – bounds on the satellites’ ephemerides – bounds on change to the computed receiver position 10

  11. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G OVERVIEW OF VULNERABILITY EXPLOITATION 1. Calculate the changes to the data contained in the GPS signals that will: • Induce the maximum possible receiver clock offset • Not cause a significant change to the calculated receiver location 2. Take over tracking loops of the GPS unit using spoofed signals • PMUs are at known locations, making the attack easier than for a dynamic target • Demonstrated by Humphreys et al. 3. Inject rogue data into the GPS unit and have it accepted as legitimate data • Introduce the calculated clock offset 11

  12. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G IMPLEMENTATION TESTBED NI Signal Generator GPS simulator Spoofed signal Signal control Oscilloscope GPS receiver Receiver data Position data Desktop CPU 1 PPS 1k PPS Timing Timing (Spoofed) (True) 12

  13. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G RESULTS – PASSING FALSE EPHEMERIS • True ephemeris received at t = -120 s • Modified ephemeris values at t = 0 s • Modified ephemeris accepted by receiver • New values result in change in perceived receiver position 13

  14. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G RESULTS – INDUCING CLOCK OFFSET 8 Time of attack x position (m) • 3 No jump in position • Meets bounding constraints from derivation -2 -7 0 -100 Clock offset (µs) • Clock offset: 500 µs -200 • Phase offset: 10.8 o -300 -400 14 -500

  15. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G EFFECT OF SPOOFING • Applications dependent on PMUs are vulnerable to spoofing – Fault identification algorithms – Equivalent network calculations – Stability monitoring algorithms • Theoretical demonstration of voltage stability monitoring algorithm 𝑢 2 − 𝑊 𝑢 1 𝑎 𝑢ℎ = 𝑊 True 𝐽 𝑢 1 − 𝐽 𝑢 2 𝑢 2 𝑓 𝑘ε 𝜄 − 𝑊 𝑢 1 𝑎 𝑢ℎ = 𝑊 𝐽 𝑢 1 − 𝐽 𝑢 2 𝑓 𝑘ε 𝜄 Spoofed 15

  16. ANNUAL INDUSTRY WORKSHOP – NOVEMBER 6-7, 2013 TRUSTWORTHY CYBER INFRASTRUCTURE FOR THE POWER GRID | TCIPG.OR G MITIGATION • Software – Check position against known PMU location – Monitor signal power, quality – Intelligent filtering of the PMU data – Check time against reference clock • Network Complexity – Check ephemerides against external archives (e.g., IGS) – Cross-correlation of military P(Y) code amongst GPS receiver. • Hardware – Narrow-band tracking loop, since PMUs are static – Multi-receiver vector tracking loops – Reverse-calculate satellite positions by trilateration from multiple receivers, compare to received ephemerides 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend