Javascript must be enabled to continue!
GPS spoofing‐based time synchronisation attack in advanced metering infrastructure and its protection
View through CrossRef
Advanced metering infrastructure (AMI) plays a key role in power systems. Since smart meters and meter collectors are synchronised to the time synchronisation devices (TSDs) in the head end system (HES) of AMI, they are vulnerable to global positioning system (GPS) spoofing‐based time synchronisation attack (TSA). Impacts of GPS spoofing‐based TSA on AMI are investigated in this study. It is uncovered that, since AMI is a distributed networked system and metering data and control commands transmitted in AMI could be of large latency, data and commands with large latency over the specific threshold are considered to be invalid according to validity verification mechanism of average distributed system. Therefore, the disorder in time synchronisation induced by GPS spoofing‐based TSA could disable functions of HES of AMI, such as meter reading and remote control. A time jitter detection‐based approach is developed to identify and prevent from GPS spoofing‐based TSA. A high‐precision oven‐controlled crystal oscillator with cumulative error compensation is utilised to identify time jitter of the satellite clock and help ride through sustained GPS spoofing‐based TSA. Simulation on FPGA demonstrates the effectiveness of the proposed approach.
Institution of Engineering and Technology (IET)
Title: GPS spoofing‐based time synchronisation attack in advanced metering infrastructure and its protection
Description:
Advanced metering infrastructure (AMI) plays a key role in power systems.
Since smart meters and meter collectors are synchronised to the time synchronisation devices (TSDs) in the head end system (HES) of AMI, they are vulnerable to global positioning system (GPS) spoofing‐based time synchronisation attack (TSA).
Impacts of GPS spoofing‐based TSA on AMI are investigated in this study.
It is uncovered that, since AMI is a distributed networked system and metering data and control commands transmitted in AMI could be of large latency, data and commands with large latency over the specific threshold are considered to be invalid according to validity verification mechanism of average distributed system.
Therefore, the disorder in time synchronisation induced by GPS spoofing‐based TSA could disable functions of HES of AMI, such as meter reading and remote control.
A time jitter detection‐based approach is developed to identify and prevent from GPS spoofing‐based TSA.
A high‐precision oven‐controlled crystal oscillator with cumulative error compensation is utilised to identify time jitter of the satellite clock and help ride through sustained GPS spoofing‐based TSA.
Simulation on FPGA demonstrates the effectiveness of the proposed approach.
Related Results
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theor...
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing a...
Design and simulation for seeding performance of high-speed inclined corn metering device based on discrete element method (DEM)
Design and simulation for seeding performance of high-speed inclined corn metering device based on discrete element method (DEM)
AbstractMechanical precision corn seed-metering planter has a compact structure, missed and repeated seeding advantages during high-speed operation. In this regard, the current res...
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
Uncrewed Aerial Vehicles (UAVs) are frequently utilized in several domains such as transportation, distribution, monitoring, and aviation. A significant security vulnerability is t...
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UA...
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Abstract. Shopee is a company engaged in online-based buying and selling services. One of the latest features of Shopee is the ShopeeFood service and has standard rules that must b...
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
The purpose of the work is an underwater positioning safety study that used the GNSS-like underwater navigation systems. In the process of research, we used the methods of software...
Multisensory GPS impact on spatial representation in an immersive virtual reality driving game
Multisensory GPS impact on spatial representation in an immersive virtual reality driving game
Abstract
Individuals are increasingly relying on GPS devices to orient and find their way in their environment and research has pointed to a negative impact of navigational...

