GPS Time Authentication against Spoofing via a Network of Receivers for Power Systems

Sriramya Bhamdipati, Tara Yasmin Mina, Grace Xingxin Gao

Peer Reviewed

Abstract: Due to the unencrypted structure of civil GPS signals, the timing information supplied to the PMUs in the power grid is vulnerable to spoofing attacks. We propose our GPS time authentication algorithm using a network of widely dispersed static receivers and their known positions. Without requiring the knowledge of the exact P(Y) code sequences, we cross-check for the presence of these encrypted codes across the receivers to detect spoofing attacks. First, we perform pair-wise cross-correlation of the conditioned quadrature-phase, carrier wiped-off incoming signal across the receivers. Later, we utilize position-information aiding to estimate the expected time offset between the received P(Y) codes at different receivers. Thereafter, we authenticate each receiver by analyzing the weighted summation of the pairwise cross-correlation peak offset and magnitude across the receivers and their common satellites. To validate our networked spoofing detection algorithm, we utilize four GPS receivers located in Idaho, Illinois, Colorado and Ohio. Under the presence of simulated spoofing attacks, namely signal-level spoofing and a record-and-replay attack, we demonstrate that our networked approach successfully detects these spoofing events with high probability.
Published in: 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS)
April 23 - 26, 2018
Hyatt Regency Hotel
Monterey, CA
Pages: 1485 - 1491
Cite this article: Bhamdipati, Sriramya, Mina, Tara Yasmin, Gao, Grace Xingxin, "GPS Time Authentication against Spoofing via a Network of Receivers for Power Systems," 2018 IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, CA, April 2018, pp. 1485-1491.
Full Paper: ION Members/Non-Members: 1 Download Credit
Sign In