AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.8 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Intermediate Spoofing Strategies and Countermeasures

Yang GaoHong Li( )Mingquan LuZhenming Feng
Department of Electronic Engineering, Tsinghua University, Beijing 100084, China
Show Author Information

Abstract

Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems (GNSS) receivers, therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications. This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks. The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred. The method can be used by most receivers, is inexpensive, and requires only a small software upgrade.

References

[1]
C. J. Wullems, A spoofing detection method for civilian L1 GPS and the E1-B galileo safety of life service, IEEE Transactions on Aerospace and Electronic Systems, vol. 48, no. 4, pp. 2849-2864, Oct. 2012.
[2]
T. E. Humphreys, B. M. Ledviana, M. L. Psiaki, B. W. o’Hanlon, and P. M. Kintner, Assessing the spoofing threat: Development of a portable GPS civilian spoofer, in Proc. 21st International Technical Meeting of the Satellite Division of the Institute of Navigation, Savannah GA, US, 2008, pp. 2314-2325.
[3]
J. S. Warner and R. G. Johnston, A simple demonstration that the Global Positioning System (GPS) is vulnerable to spoofing, Journal of Security Administration, vol. 25, pp. 19-28, 2002.
[4]
F. Dovis, X. Chen, A. Cavaleri, K. Ali, and M. Pini, Detection of spoofing threats by means of signal parameters estimation, in Proc. 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, OR, US, 2010, pp. 416-422.
[5]
M. Pini, M. Fantion, A. Cavaleri, S. Ugazio, and L. L. Presti, Signal quality monitoring applied to spoofing detection, in Proc. 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, OR, US, 2010, pp. 1888-1897.
[6]
A. Cavaleri, B. Motella, M. Pini, and M. Fantino, Detection of spoofed GPS signal at code and carrier tracking level, in Proc. 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal, Noordwijk, Netherlands, 2010, pp. 1-6.
[7]
K. D. Wesson, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, An evaluation of the vestigial signal defense for civil GPS anti-spoofing, in Proc. 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, OR, US, 2010, pp. 2646-2657.
[8]
P. Papadimitratos and A. Jovanovic, Protection and fundamental vulnerability of GNSS, in Proc. Satellite and Space Communication 2008, Toulouse, France, 2008, pp. 167-171.
[9]
D. P. Shepard and T. E. Humphreys, Characterization of receiver response to spoofing attacks, in Proc. 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, OR, US, 2010, pp. 2608-2619.
[10]
J. M. Kelly, M. S. Braasch, and M. F. DiBennedetto, Characterization of the effects of high multipath phase rates in GPS, GPS Solutions, vol. 7, no. 1, pp. 5-15, 2003.
[11]
P. Axelrad and R. G. Brown, GPS navigation algorithms, in Global Positioning System: Theory and Applications, B. W. Parkinson and J. J. Spilke, Ed. Washington DC: American Institute of Aeronautics and Astronautics, 1996, pp. 409-433.
[12]
E. D. Kaplan and C. J. Hegarty, Understanding GPS: Principles and Applications, Second Edition. Boston, USA: Artech House, 2005.
Tsinghua Science and Technology
Pages 599-605
Cite this article:
Gao Y, Li H, Lu M, et al. Intermediate Spoofing Strategies and Countermeasures. Tsinghua Science and Technology, 2013, 18(6): 599-605. https://doi.org/10.1109/TST.2013.6678905

540

Views

53

Downloads

28

Crossref

N/A

Web of Science

30

Scopus

0

CSCD

Altmetrics

Received: 15 July 2012
Revised: 02 April 2013
Accepted: 03 April 2013
Published: 06 December 2013
© The author(s) 2013
Return