SlideShare ist ein Scribd-Unternehmen logo
Best practices for
secure PNT
management in a
multi-vendor
environment
3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran
WSTS, March 13-16, Vancouver, BC
2023 © ADTRAN, INC.
2
What’s the cost of GNSS/PNT service disruption?
$1B/day in economic cost*
*source: RTI & NIST 2019
Finance
Communications
Power grids
Transportation
Data centers
All supported by
PNT threats
GPS & US critical infrastructure under national security threats
2023 © ADTRAN, INC.
3
*US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES
Federal* resilient PNT service requirements
Finance
Power Grid
Communications
Data Centers
Transportation
According to RTI & NIST cost of PNT disruption is $1B /Day
• Focus
• On Timing as it enables P & N
• Protect
• Critical gov/industry infrastructure against PNT services disruption from
GNSS & network timing attacks - GPS/GNSS is a single point of failure
• Deploy
• Resilient, multisource & self survivable PNT assurance systems
• Target
• Critical infrastructure sectors under national security threats
• Use
• Published PNT assurance guidelines & standard in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1)
• IEEE P1952 Resilient PNT UE working group
aPNT - assured Positioning, Navigation & Timing
2023 © ADTRAN, INC.
4
Five secure PNT assurance management principles
1) DHS Resilient PNT guideline specifies the use of
multiple sources vs. a user’s risk profile
2) NIST zero-trust PNT source strategy: “never trust,
always verify”
3) For secure PNT services, GNSS is a single point of
failure & needs 1 or more backup sources
4) Secure, resilient & assured PNT needs six 9’s reliability
5) In a multi-vendor network environment, secure PNT can
only be achieved with a vendor-agnostic GNSS
assurance system
2023 © ADTRAN, INC.
5
GNSS vulnerabilities and threats
GNSS for
timing
Jamming and
spoofing
Environmental
obstructions
Interference with
transmitters at
adjacent bands
ionospheric
disturbance,
solar activity
GNSS disturbances Multiple threat agents
2023 © ADTRAN, INC.
6
How to protect millions of GNSS in use worldwide?
Finance
Power Grid
Communications
Data Centers
Transportation
GNSS timing receiver
PNT threats
2023 © ADTRAN, INC.
7
Zero-trust multi-source PNT management architecture
control + visibility+ assurance + scalability + redundancy
detection + verification + backup + mitigation
multisource
monitoring/
management
PNT threats
AI-based PNT assurance platform
2023 © ADTRAN, INC.
8
VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION
AI-based centralized sync assurance
Key functionality
• Visualization of network-wide sync distribution routes
• Visualization of device-level internal timing topology
• Intelligent sync network health indicators and sync performance
reports
• Probing of device-level clock references
• Remote PTP clients monitoring
• Vendor-agnostic GNSS assurance with AI-based threat detection
and mitigation settings
2023 © ADTRAN, INC.
9
AI-based GNSS observables and assurance
Data metrics from GNSS receiver’s API
• Location
• Latitude
• Longitude
• Altitude
• Satellites data
• SV
• Carrier to Noise
• Health
• Azimuth and Elevation
• AGC
AI-based vendor-agnostic analytics from all GNSS
receivers across the network for GNSS assurance
AI-based GNSS
threat detection
2023 © ADTRAN, INC.
10
AI-based GNSS site analysis and performance monitoring
AI-based detection of local
GNSS reception issues
2023 © ADTRAN, INC.
11
AI-based vendor-agnostic GNSS receiver assurance
AI-based threat detection and mitigation capabilities
• Real-time monitoring of GNSS observables
from all the GNSS receivers in the network
• Real-time analysis of relevant data from all
the GNSS receivers in the network
• AI/ML-based algorithms to detect, alert and
mitigate GNSS attacks and vulnerabilities
• Automatic re-routing of synchronization
references across the network for sync
assurance
Key requirements
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
Vendor-agnostic GNSS
receiver assurance system
AI-based GNSS
threat detection
Thank you!

Weitere ähnliche Inhalte

Ähnlich wie Best practices for secure PNT management in a multi vendor environment

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
ADVA
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET Journal
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
sarancbe2002
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Safe Software
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
ADVA
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
Adtran
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
ADVA
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
ADVA
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar
 
SEDRP
SEDRPSEDRP
file4.pdf
file4.pdffile4.pdf
file4.pdf
RajShah860705
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET Journal
 

Ähnlich wie Best practices for secure PNT management in a multi vendor environment (20)

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
SEDRP
SEDRPSEDRP
SEDRP
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

Mehr von Adtran

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Adtran
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
Adtran
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
Adtran
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
Adtran
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
Adtran
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
Adtran
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Adtran
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
Adtran
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
Adtran
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
Adtran
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
Adtran
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
Adtran
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
Adtran
 

Mehr von Adtran (18)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
 

Kürzlich hochgeladen

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Kürzlich hochgeladen (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Best practices for secure PNT management in a multi vendor environment

  • 1. Best practices for secure PNT management in a multi-vendor environment 3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran WSTS, March 13-16, Vancouver, BC
  • 2. 2023 © ADTRAN, INC. 2 What’s the cost of GNSS/PNT service disruption? $1B/day in economic cost* *source: RTI & NIST 2019 Finance Communications Power grids Transportation Data centers All supported by PNT threats GPS & US critical infrastructure under national security threats
  • 3. 2023 © ADTRAN, INC. 3 *US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES Federal* resilient PNT service requirements Finance Power Grid Communications Data Centers Transportation According to RTI & NIST cost of PNT disruption is $1B /Day • Focus • On Timing as it enables P & N • Protect • Critical gov/industry infrastructure against PNT services disruption from GNSS & network timing attacks - GPS/GNSS is a single point of failure • Deploy • Resilient, multisource & self survivable PNT assurance systems • Target • Critical infrastructure sectors under national security threats • Use • Published PNT assurance guidelines & standard in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1) • IEEE P1952 Resilient PNT UE working group aPNT - assured Positioning, Navigation & Timing
  • 4. 2023 © ADTRAN, INC. 4 Five secure PNT assurance management principles 1) DHS Resilient PNT guideline specifies the use of multiple sources vs. a user’s risk profile 2) NIST zero-trust PNT source strategy: “never trust, always verify” 3) For secure PNT services, GNSS is a single point of failure & needs 1 or more backup sources 4) Secure, resilient & assured PNT needs six 9’s reliability 5) In a multi-vendor network environment, secure PNT can only be achieved with a vendor-agnostic GNSS assurance system
  • 5. 2023 © ADTRAN, INC. 5 GNSS vulnerabilities and threats GNSS for timing Jamming and spoofing Environmental obstructions Interference with transmitters at adjacent bands ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 6. 2023 © ADTRAN, INC. 6 How to protect millions of GNSS in use worldwide? Finance Power Grid Communications Data Centers Transportation GNSS timing receiver PNT threats
  • 7. 2023 © ADTRAN, INC. 7 Zero-trust multi-source PNT management architecture control + visibility+ assurance + scalability + redundancy detection + verification + backup + mitigation multisource monitoring/ management PNT threats AI-based PNT assurance platform
  • 8. 2023 © ADTRAN, INC. 8 VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION AI-based centralized sync assurance Key functionality • Visualization of network-wide sync distribution routes • Visualization of device-level internal timing topology • Intelligent sync network health indicators and sync performance reports • Probing of device-level clock references • Remote PTP clients monitoring • Vendor-agnostic GNSS assurance with AI-based threat detection and mitigation settings
  • 9. 2023 © ADTRAN, INC. 9 AI-based GNSS observables and assurance Data metrics from GNSS receiver’s API • Location • Latitude • Longitude • Altitude • Satellites data • SV • Carrier to Noise • Health • Azimuth and Elevation • AGC AI-based vendor-agnostic analytics from all GNSS receivers across the network for GNSS assurance AI-based GNSS threat detection
  • 10. 2023 © ADTRAN, INC. 10 AI-based GNSS site analysis and performance monitoring AI-based detection of local GNSS reception issues
  • 11. 2023 © ADTRAN, INC. 11 AI-based vendor-agnostic GNSS receiver assurance AI-based threat detection and mitigation capabilities • Real-time monitoring of GNSS observables from all the GNSS receivers in the network • Real-time analysis of relevant data from all the GNSS receivers in the network • AI/ML-based algorithms to detect, alert and mitigate GNSS attacks and vulnerabilities • Automatic re-routing of synchronization references across the network for sync assurance Key requirements GNSS Receiver GNSS Receiver GNSS Receiver GNSS Receiver Vendor-agnostic GNSS receiver assurance system AI-based GNSS threat detection