Protecting GNSS-based Services using Time Offset Validation
read more
Citations
The Quick Start Guide
Authenticated Time for Detecting GNSS Attacks
Detecting GNSS misbehaviour with high-precision clocks
Improving Positioning Accuracy Using Optimization Approaches: A Survey, Research Challenges and Future Perspectives
High-precision Hardware Oscillators Ensemble for GNSS Attack Detection
References
Standard for a Precision Clock Synchronization Protocol for Networked Measurement and Control Systems
Network Time Protocol Version 4: Protocol and Algorithms Specification
Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer
Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC)
Computer Network Time Synchronization: The Network Time Protocol
Related Papers (5)
GNSS-based positioning: Attacks and Countermeasures
Frequently Asked Questions (14)
Q2. What is the way to use local clocks?
Local clock references in state-of-the-art CPUs [57] can be used to provide a very stable time, based on the timestamp instruction cycle register of the CPU.
Q3. How accurate is NTP over the Internet?
The accuracy of NTP is usually within tens of milliseconds over the Internet, and it can be less than 1 millisecond in LANs with ideal network conditions.
Q4. What is the future version of the proposed system?
The future version of the implemented system will consider the possibility of adopting more types of external time sources, along with varying levels of trustworthiness.
Q5. What is the purpose of the ublox EVK-6T?
The ublox EVK-6T evaluation kit [62] offers two interfaces for data transmission: a USB2 port provides a real-time PVT solution that the manipulated GPS time is synthesized based on; a RS232 serial port provides a GPS time pulse for the host synchronization.
Q6. Why is the data collection of WiFi beacons asynchronous?
More specifically, data collection of WiFi beacons is asynchronous due to their spontaneous transmission characteristics; NTP data collectionis synchronous because the NTP request is on-demand when the system attempts a request.
Q7. What is the worst case synchronization inaccuracy with a gNB?
The worst case synchronization inaccuracy with a Next Generation Node B (gNB) is expected to be ±250 ns for small Industrial Internet of Things (IIoT) cells (e.g., up to 10 m radius) [52].
Q8. What is the idea of relative-time checking?
The idea of relative-time checking is that, given one interval measured by GNSS-provided time, the elapsed time measured by the external technology should be within a certain threshold.
Q9. What is the purpose of the proposed concept?
The proposed concept aims to protect a GNSS receiver using time information obtained from external sources and alternative independent technologies.
Q10. How does the receiver acquire time from the GNSS?
The receiver starts acquiring time information from the GNSS, in cold or warm start, and simultaneously acquires time from the external technology; it updates its GNSS-provided time every τ seconds, with the value, τ , depending on the design of the receiver, e.g., 500 ms or 1 s.
Q11. What is the funding for the project?
Work supported by the Swedish Foundation for Strategic Research (SSF) SURPRISE project and the KAW Academy Fellowship Trustworthy IoT project.
Q12. What is the way to synchronize time between UE and RBS?
In 5G, two proposals for UE time synchronization methods in RAN#81 leverage a SIB-based message, i.e., SIB16, to deliver reference time information to UEs for Time Sensitive Networking (TSN) ( [51], [52]).
Q13. What would be the limitations of the proposed scheme?
Without authentication of the WiFi beacons or authenticated network access or authenticated time servers, a substantial limitation would arise.
Q14. What are the potential external time sources?
These technologies are potential external time sources to enhance the verification capability of the system once the infrastructure is deployed and the technologies gets popular in mobile systems.