PROTECTED POSITIONING, NAVIGATION, OR TIMING SIGNALS RESISTANT TO SPOOFING
20180356529 ยท 2018-12-13
Inventors
- Richard M. Lee (Denver, CO, US)
- Eric Derbez (Vancouver, CA)
- Christopher Neil Kurby (Streamwood, IL, US)
Cpc classification
G01S1/24
PHYSICS
International classification
G01S19/21
PHYSICS
Abstract
Positioning, navigation, and timing (PNT) signals, such as those used in GNSS or LORAN systems, may be vulnerable to spoofing attacks. To generate trustworthy time and location data at a receiver, one must at least reduce the likelihood of or be capable of detecting spoofing attacks. Embodiments of the present invention, as presented herein, provide solutions for detecting spoofing of PNT signals. Various aspects incorporated into the described embodiments which assist in detecting spoofing attacks may include but are not limited to: monitoring the SNR of received PNT signals of a first modality and switching over to an alternate PNT modality when an anomaly is detected, comparing data associated with signals of multiple PNT modalities to identify a discrepancy indicative of spoofing on one of the multiple PNT modalities, and implementing a security regime to prevent spoofers from being able to produce perceivably authentic, but corrupt, replica signals of a PNT modality.
Claims
1. A method for monitoring authenticity of an open radio navigation signal based on receipt of a closed radio navigation signal at a receiver, comprising: receiving a closed radio navigation signal at the receiver; receiving an open radio navigation signal at the receiver; interpreting the closed radio navigation signal based on a priori information regarding the closed radio navigation signal to derive first data from the closed radio navigation signal, the first data comprising at least one of position, navigation, or time data; deriving second data from the open radio navigation signal comprising data corresponding to the first data; and comparing the first data to the second data to monitor authenticity of the open radio navigation signal based on the relationship of the first data to the second data.
2. The method of claim 1, wherein the closed radio navigation signal comprises an encrypted portion.
3. The method of claim 2, further comprising: attempting to decrypt the encrypted portion of the closed radio navigation signal using the a priori information which comprises an encryption key, wherein the encryption key is passed to the receiver using a secure channel that is different than a channel through which either the open or closed radio navigation signals are received.
4. The method of claim 3, further comprising: determining that the closed radio navigation signal is inauthentic based on a failure to decrypt the encrypted portion of the closed radio navigation signal.
5. The method of claim 3, further comprising: decrypting the encrypted portion of the closed radio navigation signal; and determining, as a result of the decrypting, that the closed radio navigation signal is authentic.
6. The method of claim 5, wherein the first data comprises a first time and the second data comprises a second time, and wherein the method further comprises: ascertaining a time difference comprising a difference between the first and second times.
7. The method of claim 6, wherein the method further comprises: determining whether the open radio navigation signal is authentic by comparing the time difference to an historical time difference value, wherein an anomaly between the time difference and the historical time difference value indicates that the open radio navigation signal is inauthentic.
8. The method of claim 7, wherein the closed radio navigation signal is propagated using a first modality and the open radio navigation signal is propagated using a second modality.
9. The method of claim 8, wherein the first modality is eLORAN and the second modality is GNSS.
10. The method of claim 7, wherein the closed and open radio navigation signals are propagated using a same modality.
11. The method of claim 10, wherein the modality is eLORAN and the closed and open radio navigation signals are sent from one transmitter within one group repetition interval.
12. A method for verifying authenticity of radio navigation signals, comprising: storing, at a secure receiver, information regarding a pseudo-random offset timing regime comprising a covert offset time, wherein the covert offset time corresponds to a delay between transmission of a first open radio navigation signal and transmission of a first closed radio navigation signal; transmitting the first open radio navigation signal and the first closed radio navigation signal from a LORAN transmitter chain utilizing the covert offset time; receiving, at the secure receiver, a first received open radio navigation signal.
13. The method of claim 12, further comprising: receiving, at the secure receiver, a first received closed radio navigation signal; calculating a received offset time comprising a relationship between a time of receipt of the first received open radio navigation signal and a time of receipt of the first received closed radio navigation signal; and comparing the received offset time with the covert offset time to determine authenticity of the first received open radio navigation signal.
14. The method of claim 12, further comprising: determining that a PNT signal comprising the first received open radio navigation signal is spoofed based on the PNT signal being deficient of a closed radio navigation signal.
15. The method of claim 14, further comprising: entering a holdover mode in which a local clock is maintained in accordance with a time calculated prior to receipt of the first received open radio navigation signal.
16. The method of claim 13, further comprising: determining from the comparing that a PNT signal comprising the first received open radio navigation signal and first received closed radio navigation signal is authentic as a function of the covert offset time corresponding to the received offset time.
17. The method of claim 16, wherein the first received closed radio navigation signal conveys data to the secure receiver useful for calculating at least one of position, navigation, or time.
18. The method of claim 17, further comprising: encrypting, at a transmitter, the pseudo-random offset timing regime; and decrypting, at the secure receiver, the pseudo-random offset timing regime.
19. The method of either claim 17 or claim 18, wherein the pseudo-random offset timing regime further comprises a second offset time which is different than the first offset time and corresponds to a delay between transmission of a second open radio navigation signal and transmission of a second closed radio navigation signal; and the method further comprises: receiving, at the secure receiver, a second received open radio navigation signal and second received closed radio navigation signal; calculating a second received offset time corresponding to reception of the second received open radio navigation signal and reception of the second received closed radio navigation signal; and comparing the second offset time to the second received offset time.
20. (canceled)
21. The method of claim 12, wherein the pseudo-random offset timing regime is received at the secure receiver via a secondary channel which is different than a radio communication channel on which open radio navigation signals or closed radio navigation signals are transmitted, wherein the secondary channel is an internet-accessible wired or wireless network connection.
22.-30. (canceled)
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
DETAILED DESCRIPTION
[0058] While this disclosure is susceptible to various modifications and alternative forms, specific embodiments thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that it is not intended to limit the disclosure to the particular form disclosed, but rather, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope as defined by the claims.
[0059]
[0060] Existing eLORAN systems have experimented with adding data to traditional LORAN pulses 201 through various methods, some of which are illustrated in
[0061] The Eurofix method may be utilized for transmission of application data such as differential GPS information as shown in the method 300 of
[0062] An exemplary covert signal is illustrated in
[0063]
[0064]
[0065]
[0066] While the foregoing has illustrated and described several embodiments in detail in the drawings and foregoing description, such illustration and description is to be considered as exemplary and not restrictive in character. For example, certain embodiments described hereinabove may be combinable with other described embodiments and/or arranged in other ways (e.g., process elements may be performed in other sequences). Accordingly, it should be understood that only a preferred embodiment and variants thereof have been shown and described and that all changes and modifications that come within the spirit of the disclosure are desired to be protected.