SlideShare uma empresa Scribd logo
Best practices for
secure PNT
management in a
multi-vendor
environment
3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran
WSTS, March 13-16, Vancouver, BC
2023 © ADTRAN, INC.
2
What’s the cost of GNSS/PNT service disruption?
$1B/day in economic cost*
*source: RTI & NIST 2019
Finance
Communications
Power grids
Transportation
Data centers
All supported by
PNT threats
GPS & US critical infrastructure under national security threats
2023 © ADTRAN, INC.
3
*US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES
Federal* resilient PNT service requirements
Finance
Power Grid
Communications
Data Centers
Transportation
According to RTI & NIST cost of PNT disruption is $1B /Day
• Focus
• On Timing as it enables P & N
• Protect
• Critical gov/industry infrastructure against PNT services disruption from
GNSS & network timing attacks - GPS/GNSS is a single point of failure
• Deploy
• Resilient, multisource & self survivable PNT assurance systems
• Target
• Critical infrastructure sectors under national security threats
• Use
• Published PNT assurance guidelines & standard in progress
• DHS Resilient PNT Conformance Framework
• NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1)
• IEEE P1952 Resilient PNT UE working group
aPNT - assured Positioning, Navigation & Timing
2023 © ADTRAN, INC.
4
Five secure PNT assurance management principles
1) DHS Resilient PNT guideline specifies the use of
multiple sources vs. a user’s risk profile
2) NIST zero-trust PNT source strategy: “never trust,
always verify”
3) For secure PNT services, GNSS is a single point of
failure & needs 1 or more backup sources
4) Secure, resilient & assured PNT needs six 9’s reliability
5) In a multi-vendor network environment, secure PNT can
only be achieved with a vendor-agnostic GNSS
assurance system
2023 © ADTRAN, INC.
5
GNSS vulnerabilities and threats
GNSS for
timing
Jamming and
spoofing
Environmental
obstructions
Interference with
transmitters at
adjacent bands
ionospheric
disturbance,
solar activity
GNSS disturbances Multiple threat agents
2023 © ADTRAN, INC.
6
How to protect millions of GNSS in use worldwide?
Finance
Power Grid
Communications
Data Centers
Transportation
GNSS timing receiver
PNT threats
2023 © ADTRAN, INC.
7
Zero-trust multi-source PNT management architecture
control + visibility+ assurance + scalability + redundancy
detection + verification + backup + mitigation
multisource
monitoring/
management
PNT threats
AI-based PNT assurance platform
2023 © ADTRAN, INC.
8
VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION
AI-based centralized sync assurance
Key functionality
• Visualization of network-wide sync distribution routes
• Visualization of device-level internal timing topology
• Intelligent sync network health indicators and sync performance
reports
• Probing of device-level clock references
• Remote PTP clients monitoring
• Vendor-agnostic GNSS assurance with AI-based threat detection
and mitigation settings
2023 © ADTRAN, INC.
9
AI-based GNSS observables and assurance
Data metrics from GNSS receiver’s API
• Location
• Latitude
• Longitude
• Altitude
• Satellites data
• SV
• Carrier to Noise
• Health
• Azimuth and Elevation
• AGC
AI-based vendor-agnostic analytics from all GNSS
receivers across the network for GNSS assurance
AI-based GNSS
threat detection
2023 © ADTRAN, INC.
10
AI-based GNSS site analysis and performance monitoring
AI-based detection of local
GNSS reception issues
2023 © ADTRAN, INC.
11
AI-based vendor-agnostic GNSS receiver assurance
AI-based threat detection and mitigation capabilities
• Real-time monitoring of GNSS observables
from all the GNSS receivers in the network
• Real-time analysis of relevant data from all
the GNSS receivers in the network
• AI/ML-based algorithms to detect, alert and
mitigate GNSS attacks and vulnerabilities
• Automatic re-routing of synchronization
references across the network for sync
assurance
Key requirements
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
GNSS
Receiver
Vendor-agnostic GNSS
receiver assurance system
AI-based GNSS
threat detection
Thank you!

Mais conteúdo relacionado

Semelhante a Best practices for secure PNT management in a multi vendor environment

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
ADVA
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET Journal
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
sarancbe2002
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
eSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
ijasuc
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
Cassie Romero
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Safe Software
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET Journal
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
ADVA
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
Adtran
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
ADVA
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
ADVA
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
Saurabh Giratkar
 
SEDRP
SEDRPSEDRP
file4.pdf
file4.pdffile4.pdf
file4.pdf
RajShah860705
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET Journal
 

Semelhante a Best practices for secure PNT management in a multi vendor environment (20)

ADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructureADVA launches new aPNT+™ platform to protect critical network infrastructure
ADVA launches new aPNT+™ platform to protect critical network infrastructure
 
SatAware assures satellite-based timing
 SatAware assures satellite-based timing SatAware assures satellite-based timing
SatAware assures satellite-based timing
 
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
IRJET- Development of Fishermen Border Alert and Speed Reduction System using...
 
First Review Final PPT.pdf for final years
First Review Final PPT.pdf for final yearsFirst Review Final PPT.pdf for final years
First Review Final PPT.pdf for final years
 
Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
Recent growth in timing
Recent growth in timingRecent growth in timing
Recent growth in timing
 
Assured timing for power networks
Assured timing for power networksAssured timing for power networks
Assured timing for power networks
 
In-service synchronization monitoring and assurance
In-service synchronization monitoring and assuranceIn-service synchronization monitoring and assurance
In-service synchronization monitoring and assurance
 
ADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancementsADVA aPNT+™ security enhancements
ADVA aPNT+™ security enhancements
 
A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)A Border security Using Wireless Integrated Network Sensors (WINS)
A Border security Using Wireless Integrated Network Sensors (WINS)
 
SEDRP
SEDRPSEDRP
SEDRP
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...IRJET-  	  Secure and Efficient Transmission Mechanism for Emergency Data in ...
IRJET- Secure and Efficient Transmission Mechanism for Emergency Data in ...
 

Mais de Adtran

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
Adtran
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
Adtran
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
Adtran
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
Adtran
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
Adtran
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
Adtran
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
Adtran
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
Adtran
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Adtran
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
Adtran
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
Adtran
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
Adtran
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
Adtran
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
Adtran
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
Adtran
 

Mais de Adtran (18)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Timing and sync requirements in railway networks
Timing and sync requirements in railway networksTiming and sync requirements in railway networks
Timing and sync requirements in railway networks
 
National plan for distribution of time and frequency
National plan for distribution of time and frequencyNational plan for distribution of time and frequency
National plan for distribution of time and frequency
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Addressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technologyAddressing GPS vulnerabilities with Satellite Time and Location technology
Addressing GPS vulnerabilities with Satellite Time and Location technology
 
A new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrivedA new era of in-home Wi-Fi has arrived
A new era of in-home Wi-Fi has arrived
 
Introducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLTIntroducing the industry's smallest Combo PON OLT
Introducing the industry's smallest Combo PON OLT
 
A new era of Wi-Fi has arrived
A new era of Wi-Fi has arrivedA new era of Wi-Fi has arrived
A new era of Wi-Fi has arrived
 
Deep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALMDeep PON assurance with Adtran ALM
Deep PON assurance with Adtran ALM
 
Transforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-FlexTransforming DCI connectivity with the FSP 3000 S-Flex
Transforming DCI connectivity with the FSP 3000 S-Flex
 
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
Making substation clocks and private LTE/5G networks robust against GPS/GNSS ...
 
Meet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLSMeet the new FSP 3000 Edge OLS
Meet the new FSP 3000 Edge OLS
 
Introducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edgeIntroducing high-performance ONTs for the multigigabit edge
Introducing high-performance ONTs for the multigigabit edge
 
OFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLSOFCNet demo: Optical spectrum services over FSP 3000 OLS
OFCNet demo: Optical spectrum services over FSP 3000 OLS
 
Analytics for automating critical infrastructures
Analytics for automating critical infrastructuresAnalytics for automating critical infrastructures
Analytics for automating critical infrastructures
 
Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...Real-life demands and examples of management and control in disaggregated opt...
Real-life demands and examples of management and control in disaggregated opt...
 
Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud Building on TAP sync resiliency for the cloud
Building on TAP sync resiliency for the cloud
 

Último

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Último (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Best practices for secure PNT management in a multi vendor environment

  • 1. Best practices for secure PNT management in a multi-vendor environment 3/14/23 | 11:25-11:40a (15 min) | Chuck Perry, sync business manager, NA carrier/defense, Oscilloquartz, Adtran WSTS, March 13-16, Vancouver, BC
  • 2. 2023 © ADTRAN, INC. 2 What’s the cost of GNSS/PNT service disruption? $1B/day in economic cost* *source: RTI & NIST 2019 Finance Communications Power grids Transportation Data centers All supported by PNT threats GPS & US critical infrastructure under national security threats
  • 3. 2023 © ADTRAN, INC. 3 *US EXECUTIVE ORDER 13905: STRENGTHENING NATIONAL RESILIENCE THRU RESPONSIBLE USE OF POSITIONING, NAVIGATION & TIMING SERVICES Federal* resilient PNT service requirements Finance Power Grid Communications Data Centers Transportation According to RTI & NIST cost of PNT disruption is $1B /Day • Focus • On Timing as it enables P & N • Protect • Critical gov/industry infrastructure against PNT services disruption from GNSS & network timing attacks - GPS/GNSS is a single point of failure • Deploy • Resilient, multisource & self survivable PNT assurance systems • Target • Critical infrastructure sectors under national security threats • Use • Published PNT assurance guidelines & standard in progress • DHS Resilient PNT Conformance Framework • NIST Cybersecurity Framework for PNT Profile (NISTIR 8323 Rev 1) • IEEE P1952 Resilient PNT UE working group aPNT - assured Positioning, Navigation & Timing
  • 4. 2023 © ADTRAN, INC. 4 Five secure PNT assurance management principles 1) DHS Resilient PNT guideline specifies the use of multiple sources vs. a user’s risk profile 2) NIST zero-trust PNT source strategy: “never trust, always verify” 3) For secure PNT services, GNSS is a single point of failure & needs 1 or more backup sources 4) Secure, resilient & assured PNT needs six 9’s reliability 5) In a multi-vendor network environment, secure PNT can only be achieved with a vendor-agnostic GNSS assurance system
  • 5. 2023 © ADTRAN, INC. 5 GNSS vulnerabilities and threats GNSS for timing Jamming and spoofing Environmental obstructions Interference with transmitters at adjacent bands ionospheric disturbance, solar activity GNSS disturbances Multiple threat agents
  • 6. 2023 © ADTRAN, INC. 6 How to protect millions of GNSS in use worldwide? Finance Power Grid Communications Data Centers Transportation GNSS timing receiver PNT threats
  • 7. 2023 © ADTRAN, INC. 7 Zero-trust multi-source PNT management architecture control + visibility+ assurance + scalability + redundancy detection + verification + backup + mitigation multisource monitoring/ management PNT threats AI-based PNT assurance platform
  • 8. 2023 © ADTRAN, INC. 8 VISUALIZATION AND ASSURANCE OF ACCURATE CLOCK SYNCHRONIZATION AI-based centralized sync assurance Key functionality • Visualization of network-wide sync distribution routes • Visualization of device-level internal timing topology • Intelligent sync network health indicators and sync performance reports • Probing of device-level clock references • Remote PTP clients monitoring • Vendor-agnostic GNSS assurance with AI-based threat detection and mitigation settings
  • 9. 2023 © ADTRAN, INC. 9 AI-based GNSS observables and assurance Data metrics from GNSS receiver’s API • Location • Latitude • Longitude • Altitude • Satellites data • SV • Carrier to Noise • Health • Azimuth and Elevation • AGC AI-based vendor-agnostic analytics from all GNSS receivers across the network for GNSS assurance AI-based GNSS threat detection
  • 10. 2023 © ADTRAN, INC. 10 AI-based GNSS site analysis and performance monitoring AI-based detection of local GNSS reception issues
  • 11. 2023 © ADTRAN, INC. 11 AI-based vendor-agnostic GNSS receiver assurance AI-based threat detection and mitigation capabilities • Real-time monitoring of GNSS observables from all the GNSS receivers in the network • Real-time analysis of relevant data from all the GNSS receivers in the network • AI/ML-based algorithms to detect, alert and mitigate GNSS attacks and vulnerabilities • Automatic re-routing of synchronization references across the network for sync assurance Key requirements GNSS Receiver GNSS Receiver GNSS Receiver GNSS Receiver Vendor-agnostic GNSS receiver assurance system AI-based GNSS threat detection