[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2046707.2046719acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the requirements for successful GPS spoofing attacks

Published: 17 October 2011 Publication History

Abstract

An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations. In this paper, we investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. In particular, we are interested in identifying from which locations and with which precision the attacker needs to generate its signals in order to successfully spoof the receivers. We will show, for example, that any number of receivers can easily be spoofed to one arbitrary location; however, the attacker is restricted to only few transmission locations when spoofing a group of receivers while preserving their constellation. In addition, we investigate the practical aspects of a satellite-lock takeover, in which a victim receives spoofed signals after first being locked on to legitimate GPS signals. Using a civilian GPS signal generator, we perform a set of experiments and find the minimal precision of the attacker's spoofing signals required for covert satellite-lock takeover.

References

[1]
Bensky, A. Wireless Positioning Technologies and Applications. GNSS Technology and Applications Series. Artech House, 2008.
[2]
Brands, S., and Chaum, D. Distance-bounding protocols. In Workshop on the theory and application of cryptographic techniques on Advances in cryptology (EUROCRYPT) (1994), Springer.
[3]
Cavaleri, A., Motella, B., Pini, M., and Fantino, M. Detection of spoofed GPS signals at code and carrier tracking level. In Proceedings of ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (Navitec) (2010).
[4]
Dolev, D., and Yao, A. C. On the security of public key protocols. IEEE Trans. on Information Theory 29 (1983).
[5]
Ettus. Universal software radio peripheral (USRP). http://www.ettus.com.
[6]
Hancke, G. P., and Kuhn, M. G. An RFID Distance Bounding Protocol. IEEE Computer Society.
[7]
Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O'Hanlon, B. W., and Kintner, P. M. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the ION GNSS International Technical Meeting of the Satellite Division (2008).
[8]
John A. Volpe National Transportation Systems Center. Vulnerability assessment of the transportation infrastructure relying on the global positioning system. Final Report, 2001.
[9]
Johnston, R. G., and Warner, J. S. Think GPS cargo tracking = high security? Think again. In Proceedings of Transport Security World (2003).
[10]
Kuhn, M., Luecken, H., and Tippenhauer, N. O. UWB impulse radio based distance bounding. In Proceedings of the Workshop on Positioning, Navigation and Communication (WPNC) (2010).
[11]
Kuhn, M. G. An asymmetric security mechanism for navigation signals. In Proceedings of the Information Hiding Workshop (2004).
[12]
Ledvina, B. M., Bencze, W. J., Galusha, B., and Miller, I. An in-line anti-spoofing device for legacy civil GPS receivers. In Proceedings of the ION International Technical Meeting (2010).
[13]
Montgomery, P. Y., Humphreys, T. E., and Ledvina, B. M. Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Proceedings of the ION International Technical Meeting (2009).
[14]
Motella, B., Pini, M., Fantino, M., Mulassano, P., Nicola, M., Fortuny-Guasch, J., Wildemeersch, M., and Symeonidis, D. Performance assessment of low cost GPS receivers under civilian spoofing attacks. In Proceedings of ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (Navitec) (2010).
[15]
Navigation Center, U.S. Department of Home Security. Global Positioning System, Standard Positioning Service: Signal Specification. http://www.navcen.uscg.gov, June 1995. 2nd edition.
[16]
Papadimitratos, P., and Jovanovic, A. GNSS-based Positioning: Attacks and countermeasures. In Proceedings of the IEEE Military Communications Conference (MILCOM) (2008).
[17]
Papadimitratos, P., and Jovanovic, A. Protection and fundamental vulnerability of GNSS. In Proceedings of the International Workshop on Satellite and Space Communications (2008).
[18]
Rasmussen, K. B., and Capkun, S. Realization of RF distance bounding. In Proceedings of the USENIX Security Symposium (2010).
[19]
Scott, L. Anti-spoofing & authenticated signal architectures for civil navigation systems. In Proceedings of the ION GNSS International Technical Meeting of the Satellite Division (2003).
[20]
Spirent Communications plc. SimGEN simulation software. http://www.spirent.com.
[21]
Tippenhauer, N. O., Rasmussen, K. B., and Capkun, S. Secure ranging with message temporal integrity. In Cryptology ePrint Archive: Report 2009/602 (2009).
[22]
U. S. Departement of Defense. Global positioning system. standard positioning service. performance standard, Sep 2008.
[23]
U. S. Government. Global positioning system. http://www.gps.gov, 2010.
[24]
Warner, J. S., and Johnston, R. G. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration (2002).
[25]
Warner, J. S., and Johnston, R. G. GPS spoofing countermeasures. Homeland Security Journal (2003).

Cited By

View all
  • (2025)Sensor attack online classification for UAVs using machine learningComputers & Security10.1016/j.cose.2024.104228150(104228)Online publication date: Mar-2025
  • (2024)Implementation and Validation of a Real-time Spoofing System2024 21st European Radar Conference (EuRAD)10.23919/EuRAD61604.2024.10734883(252-255)Online publication date: 25-Sep-2024
  • (2024)SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical AttacksProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690210(1849-1863)Online publication date: 2-Dec-2024
  • Show More Cited By

Index Terms

  1. On the requirements for successful GPS spoofing attacks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
      October 2011
      742 pages
      ISBN:9781450309486
      DOI:10.1145/2046707
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 October 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. GPS
      2. spoofing
      3. spoofing countermeasures

      Qualifiers

      • Research-article

      Conference

      CCS'11
      Sponsor:

      Acceptance Rates

      CCS '11 Paper Acceptance Rate 60 of 429 submissions, 14%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)315
      • Downloads (Last 6 weeks)44
      Reflects downloads up to 12 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Sensor attack online classification for UAVs using machine learningComputers & Security10.1016/j.cose.2024.104228150(104228)Online publication date: Mar-2025
      • (2024)Implementation and Validation of a Real-time Spoofing System2024 21st European Radar Conference (EuRAD)10.23919/EuRAD61604.2024.10734883(252-255)Online publication date: 25-Sep-2024
      • (2024)SpecGuard: Specification Aware Recovery for Robotic Autonomous Vehicles from Physical AttacksProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690210(1849-1863)Online publication date: 2-Dec-2024
      • (2024)Diagnosis-guided Attack Recovery for Securing Robotic Vehicles from Sensor Deception AttacksProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3644997(915-929)Online publication date: 1-Jul-2024
      • (2024)Spoofing Attack Detection in the Physical Layer with Robustness to User Movement2024 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC57260.2024.10570909(1-6)Online publication date: 21-Apr-2024
      • (2024)Deep Learning for Secure UAV Swarm Communication Under Malicious AttacksIEEE Transactions on Wireless Communications10.1109/TWC.2024.341992323:10(14879-14894)Online publication date: Oct-2024
      • (2024)Trustworthy Target Localization via ADMM in the Presence of Malicious NodesIEEE Transactions on Vehicular Technology10.1109/TVT.2023.334647673:5(7250-7261)Online publication date: May-2024
      • (2024)Exploring Practical Acoustic Transduction Attacks on Inertial Sensors in MDOF SystemsIEEE Transactions on Mobile Computing10.1109/TMC.2023.3277287(1-18)Online publication date: 2024
      • (2024)A Comprehensive Survey and Tutorial on Smart Vehicles: Emerging Technologies, Security Issues, and Solutions Using Machine LearningIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2024.341998825:11(15314-15341)Online publication date: Nov-2024
      • (2024)Function Interaction Risks in Robot Apps: Analysis and Policy-Based SolutionIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.334877221:4(4236-4253)Online publication date: Jul-2024
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media