Title: GPS Time Authentication against Spoofing via a Network of Receivers for Power Systems
Author(s): Sriramya Bhamdipati, Tara Yasmin Mina, Grace Xingxin Gao
Published in: Proceedings of IEEE/ION PLANS 2018
April 23 - 26, 2018
Hyatt Regency Hotel
Monterey, CA
Pages: 1485 - 1491
Cite this article: Bhamdipati, Sriramya, Mina, Tara Yasmin, Gao, Grace Xingxin, "GPS Time Authentication against Spoofing via a Network of Receivers for Power Systems," Proceedings of IEEE/ION PLANS 2018, Monterey, CA, April 2018, pp. 1485-1491.
Full Paper: ION Members/Non-Members: 1 Download Credit
Sign In
Abstract: Due to the unencrypted structure of civil GPS signals, the timing information supplied to the PMUs in the power grid is vulnerable to spoofing attacks. We propose our GPS time authentication algorithm using a network of widely dispersed static receivers and their known positions. Without requiring the knowledge of the exact P(Y) code sequences, we cross-check for the presence of these encrypted codes across the receivers to detect spoofing attacks. First, we perform pair-wise cross-correlation of the conditioned quadrature-phase, carrier wiped-off incoming signal across the receivers. Later, we utilize position-information aiding to estimate the expected time offset between the received P(Y) codes at different receivers. Thereafter, we authenticate each receiver by analyzing the weighted summation of the pairwise cross-correlation peak offset and magnitude across the receivers and their common satellites. To validate our networked spoofing detection algorithm, we utilize four GPS receivers located in Idaho, Illinois, Colorado and Ohio. Under the presence of simulated spoofing attacks, namely signal-level spoofing and a record-and-replay attack, we demonstrate that our networked approach successfully detects these spoofing events with high probability.