SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Best practices for
secure PNT
management in a
multi-vendor
environment
3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran
WSTS, March 13-16, Vancouver, BC
2023 © ADTRAN, INC.
2
What’s the cost of GNSS/PNT service disruption?
$1B/day in economic cost*
*source: RTI & NIST 2019
Finance
Communications
Power grids
Transportation
Data centers
All supported by
PNT threats
GPS & US critical infrastructure under national security threats
2023 © ADTRAN, INC.
3
*US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES
Federal* resilient PNT service requirements
Finance
Power Grid
Communications
Data Centers
Transportation
According to RTI & NIST cost of PNT disruption is $1B /Day
• Focus
• On Timing as it enables P & N
• Protect
• Critical gov/industry infrastructure against PNT services disruption from
GNSS & network timing attacks - GPS/GNSS is a single point of failure
• Deploy
• Resilient, multisource & self survivable PNT assurance systems
• Target
• Critical infrastructure sectors under national security threats
• Use
• Published PNT assurance guidelines & standard in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1)
• IEEE P1952 Resilient PNT UE working group
aPNT - assured Positioning, Navigation & Timing
2023 © ADTRAN, INC.
4
Five secure PNT assurance management principles
1) DHS Resilient PNT guideline specifies the use of
multiple sources vs. a user’s risk profile
2) NIST zero-trust PNT source strategy: “never trust,
always verify”
3) For secure PNT services, GNSS is a single point of
failure & needs 1 or more backup sources
4) Secure, resilient & assured PNT needs six 9’s reliability
5) In a multi-vendor network environment, secure PNT can
only be achieved with a vendor-agnostic GNSS
assurance system
2023 © ADTRAN, INC.
5
GNSS vulnerabilities and threats
GNSS for
timing
Jamming and
spoofing
Environmental
obstructions
Interference with
transmitters at
adjacent bands
ionospheric
disturbance,
solar activity
GNSS disturbances Multiple threat agents
2023 © ADTRAN, INC.
6
How to protect millions of GNSS in use worldwide?
Finance
Power Grid
Communications
Data Centers
Transportation
GNSS timing receiver
PNT threats
2023 © ADTRAN, INC.
7
Zero-trust multi-source PNT management architecture
control + visibility+ assurance + scalability + redundancy
detection + verification + backup + mitigation
multisource
monitoring/
management
PNT threats
AI-based PNT assurance platform
2023 © ADTRAN, INC.
8
VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION
AI-based centralized sync assurance
Key functionality
• Visualization of network-wide sync distribution routes
• Visualization of device-level internal timing topology
• Intelligent sync network health indicators and sync performance
reports
• Probing of device-level clock references
• Remote PTP clients monitoring
• Vendor-agnostic GNSS assurance with AI-based threat detection
and mitigation settings
2023 © ADTRAN, INC.
9
AI-based GNSS observables and assurance
Data metrics from GNSS receiver’s API
• Location
• Latitude
• Longitude
• Altitude
• Satellites data
• SV
• Carrier to Noise
• Health
• Azimuth and Elevation
• AGC
AI-based vendor-agnostic analytics from all GNSS
receivers across the network for GNSS assurance
AI-based GNSS
threat detection
2023 © ADTRAN, INC.
10
AI-based GNSS site analysis and performance monitoring
AI-based detection of local
GNSS reception issues
2023 © ADTRAN, INC.
11
AI-based vendor-agnostic GNSS receiver assurance
AI-based threat detection and mitigation capabilities
• Real-time monitoring of GNSS observables
from all the GNSS receivers in the network
• Real-time analysis of relevant data from all
the GNSS receivers in the network
• AI/ML-based algorithms to detect, alert and
mitigate GNSS attacks and vulnerabilities
• Automatic re-routing of synchronization
references across the network for sync
assurance
Key requirements
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
Vendor-agnostic GNSS
receiver assurance system
AI-based GNSS
threat detection
Thank you!

Contenu connexe

Similaire à Best practices for secure PNT management in a multi vendor environment

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timingADVA
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET Journal
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearssarancbe2002
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters usingeSAT Publishing House
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereSafe Software
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timingADVA
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networksAdtran
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceADVA
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)Saurabh Giratkar
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET Journal
 

Similaire à Best practices for secure PNT management in a multi vendor environment (20)

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
SEDRP
SEDRPSEDRP
SEDRP
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

Plus de Adtran

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networksAdtran
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequencyAdtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMAdtran
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAdtran
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedAdtran
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTAdtran
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedAdtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMAdtran
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexAdtran
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Adtran
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSAdtran
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeAdtran
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSAdtran
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructuresAdtran
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Adtran
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Adtran
 

Plus de Adtran (17)

Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
 

Dernier

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Dernier (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Best practices for secure PNT management in a multi vendor environment

  • 1. Best practices for secure PNT management in a multi-vendor environment 3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran WSTS, March 13-16, Vancouver, BC
  • 2. 2023 © ADTRAN, INC. 2 What’s the cost of GNSS/PNT service disruption? $1B/day in economic cost* *source: RTI & NIST 2019 Finance Communications Power grids Transportation Data centers All supported by PNT threats GPS & US critical infrastructure under national security threats
  • 3. 2023 © ADTRAN, INC. 3 *US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES Federal* resilient PNT service requirements Finance Power Grid Communications Data Centers Transportation According to RTI & NIST cost of PNT disruption is $1B /Day • Focus • On Timing as it enables P & N • Protect • Critical gov/industry infrastructure against PNT services disruption from GNSS & network timing attacks - GPS/GNSS is a single point of failure • Deploy • Resilient, multisource & self survivable PNT assurance systems • Target • Critical infrastructure sectors under national security threats • Use • Published PNT assurance guidelines & standard in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1) • IEEE P1952 Resilient PNT UE working group aPNT - assured Positioning, Navigation & Timing
  • 4. 2023 © ADTRAN, INC. 4 Five secure PNT assurance management principles 1) DHS Resilient PNT guideline specifies the use of multiple sources vs. a user’s risk profile 2) NIST zero-trust PNT source strategy: “never trust, always verify” 3) For secure PNT services, GNSS is a single point of failure & needs 1 or more backup sources 4) Secure, resilient & assured PNT needs six 9’s reliability 5) In a multi-vendor network environment, secure PNT can only be achieved with a vendor-agnostic GNSS assurance system
  • 5. 2023 © ADTRAN, INC. 5 GNSS vulnerabilities and threats GNSS for timing Jamming and spoofing Environmental obstructions Interference with transmitters at adjacent bands ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 6. 2023 © ADTRAN, INC. 6 How to protect millions of GNSS in use worldwide? Finance Power Grid Communications Data Centers Transportation GNSS timing receiver PNT threats
  • 7. 2023 © ADTRAN, INC. 7 Zero-trust multi-source PNT management architecture control + visibility+ assurance + scalability + redundancy detection + verification + backup + mitigation multisource monitoring/ management PNT threats AI-based PNT assurance platform
  • 8. 2023 © ADTRAN, INC. 8 VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION AI-based centralized sync assurance Key functionality • Visualization of network-wide sync distribution routes • Visualization of device-level internal timing topology • Intelligent sync network health indicators and sync performance reports • Probing of device-level clock references • Remote PTP clients monitoring • Vendor-agnostic GNSS assurance with AI-based threat detection and mitigation settings
  • 9. 2023 © ADTRAN, INC. 9 AI-based GNSS observables and assurance Data metrics from GNSS receiver’s API • Location • Latitude • Longitude • Altitude • Satellites data • SV • Carrier to Noise • Health • Azimuth and Elevation • AGC AI-based vendor-agnostic analytics from all GNSS receivers across the network for GNSS assurance AI-based GNSS threat detection
  • 10. 2023 © ADTRAN, INC. 10 AI-based GNSS site analysis and performance monitoring AI-based detection of local GNSS reception issues
  • 11. 2023 © ADTRAN, INC. 11 AI-based vendor-agnostic GNSS receiver assurance AI-based threat detection and mitigation capabilities • Real-time monitoring of GNSS observables from all the GNSS receivers in the network • Real-time analysis of relevant data from all the GNSS receivers in the network • AI/ML-based algorithms to detect, alert and mitigate GNSS attacks and vulnerabilities • Automatic re-routing of synchronization references across the network for sync assurance Key requirements GNSS Receiver GNSS Receiver GNSS Receiver GNSS Receiver Vendor-agnostic GNSS receiver assurance system AI-based GNSS threat detection