Abstract

Stationary GPS receivers provide time information for critical infrastructures, such as phasor measurement units (PMUs), communication networks, and financial systems. Therefore, they are prone to a specific type of spoofing attack called time synchronization attack (TSA), which affects time information such as clock offset and clock drift. The receiver’s position remains constant during the attack; hence, attack detection and mitigation are challenging. Various countermeasures have been suggested to mitigate TSA effects. However, they are mainly software-based and are exploited to protect software implemented software-defined radios (SDRs). In this research, two hardware protection approaches are contributed for hardware-based SDRs based on multi-layer perceptron neural network (MLP NN) with sigmoid activation function. The most challenging part of MPL NN implementation is the activation function approximation. Therefore, two lightweight architectures are proposed for sigmoid function implementation. Linear approximation and look-up table (LA-LUT) and piece-wise linear approximation (PLA) are exploited for this task. The synthesis results demonstrate that the PLA approach has a slightly higher resource utilization in comparison to LA-LUT, while this method is more accurate. The mean squared error (MSE) of the PLA approach is equal to 0.019, which is 57% better than the LA-LUT approach with an MSE of 0.033. Furthermore, the designs are evaluated by two conventional types of TSA. According to the results, both methods are lightweight, and they only consume less than 0.3% of slice registers, 5% of slice LUTs, and 8% of DSP48E1Ss. Furthermore, they are real-time, and can mitigate the attack consequences; however, the PLA architecture has a better performance compared to LA-LUT.

Highlights

  • Nowadays, many crucial infrastructures, such as power grids [1], communication towers, and financial systems, depend on global positioning system (GPS) for acknowledging the accurate time [2]

  • The suggested method in [41] is a time synchronization attack (TSA) detection and mitigation approach utilizing an multi-layer perceptron neural network (MLP neural networks (NNs)), which is classified in signal processing techniques and prototyping softwares (P-SWs) implementations

  • Since the first goal of this research is the efficient implementation of the proposed MPL NN of [41], the sigmoid function is modified to the binary version for further comparisons and sampling of look-up tables (LUTs) and linear approximation combination (LA-LUT)

Read more

Summary

INTRODUCTION

Many crucial infrastructures, such as power grids [1], communication towers, and financial systems, depend on global positioning system (GPS) for acknowledging the accurate time [2]. Civil GPS signals have no protection and correction mechanisms; an experienced adversary can alter the timing information of the target receivers [3]. The receivers in the mentioned infrastructures are stationary; the adversary can place a receiver-spoofer device near the target receiver, transmitting a manipulated version of the signal with a slightly higher power [4]. The receiver-spoofer device extracts the code phase and Doppler frequency of the genuine signal; the resultant spoofing signal is very similar to the authentic one. This type of attack is known as time synchronization attack (TSA) and is considered an intermediate spoofing attack. Genuine one, almost all commercial GPS receivers can be spoofed [6]

ATTACK SCHEME
FEEDFORWARD CALCULATIONS
PROPOSED ARCHITECTURES FOR SIGMOID HARDWRE REALIZATION
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call