2020 IEEE/ION Position, Location and Navigation Symposium (PLANS) 2020
DOI: 10.1109/plans46316.2020.9110224
|View full text |Cite
|
Sign up to set email alerts
|

Protecting GNSS-based Services using Time Offset Validation

Abstract: Global navigation satellite systems (GNSS) provide pervasive accurate positioning and timing services for a large gamut of applications, from Time based One-Time Passwords (TOPT), to power grid and cellular systems. However, there can be security concerns for the applications due to the vulnerability of GNSS. It is important to observe that GNSS receivers are components of platforms, in principle having rich connectivity to different network infrastructures. Of particular interest is the access to a variety of… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
8
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 35 publications
1
8
0
Order By: Relevance
“…Beyond the aforementioned early works on time-based detection for GNSS attacks, we discuss next the most closely related recent works, including notably approaches that rely on local time references or an ensemble of clocks. Nonetheless, we do not discuss timebased detection approaches that rely on network-obtained time information [11,12], which are a powerful tool, but are dependant on the quality of the connection, and the level of sophistication of the attacker able to tamper with (access to) the remote time server.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Beyond the aforementioned early works on time-based detection for GNSS attacks, we discuss next the most closely related recent works, including notably approaches that rely on local time references or an ensemble of clocks. Nonetheless, we do not discuss timebased detection approaches that rely on network-obtained time information [11,12], which are a powerful tool, but are dependant on the quality of the connection, and the level of sophistication of the attacker able to tamper with (access to) the remote time server.…”
Section: Related Workmentioning
confidence: 99%
“…Specifically for time-based detection of GNSS attacks, the socalled Time Test can be leveraged [10]. In this case, various secure network time providers (NTS, PTP) can be leveraged [11,12] to compare the time solution provided by the GNSS receiver with a trusted time reference. However, a diversified attacker can manipulate GNSS signals to induce a false PVT solution while preventing the receiver from connecting to the network altogether or, selectively, to network time providers.…”
Section: Introductionmentioning
confidence: 99%
“…Such a capability can be valuable as it could be readily deployed to safeguard GNSS-based position (and timing). The recent results in [23] exploit the co-existence of multiple time sources to cross-validate time information obtained from the GNSS receiver, demonstrating how a combination of different time sources can be used to detect deviations in GNSS time and detect GNSS attacks that caused such time deviations. In the context of protecting mobile phones from spoofing, side-information based approaches, such as time sources, inertial sensors and A-GPS (Assisted GPS) information [24] are also investigated.…”
Section: Introductionmentioning
confidence: 99%
“…Even though existing approaches, such as [23], raise the bar, it is paramount to have trustworthy information from the leveraged alternate sources. If not, in the presence of an adversary that can attack both the GNSS side (e.g., spoofing) and the Internet side (e.g., impersonating or manipulating the alternate source of time information), the detection would fail.…”
Section: Introductionmentioning
confidence: 99%
“…Several countermeasures were proposed, leveraging signal characteristics, e.g. [3], the receiver's attitude [4] or validation of the PVT solution through alternative position and time sources [11,14,16,21].…”
Section: Introductionmentioning
confidence: 99%