On the Requirements for Successful GPS Spoofing Attacks

被引:0
|
作者
Tippenhauer, Nils Ole [1 ]
Popper, Christina [1 ]
Rasmussen, Kasper B. [2 ]
Capkun, Srdjan [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Zurich, Switzerland
[2] UCI, Dept Comp Sci, Irvine, CA USA
关键词
Security; Experimentation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations. In this paper, we investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. In particular, we are interested in identifying from which locations and with which precision the attacker needs to generate its signals in order to successfully spoof the receivers. We will show, for example, that any number of receivers can easily be spoofed to one arbitrary location; however, the attacker is restricted to only few transmission locations when spoofing a group of receivers while preserving their constellation. In addition, we investigate the practical aspects of a satellitelock takeover, in which a victim receives spoofed signals after first being locked on to legitimate GPS signals. Using a civilian GPS signal generator, we perform a set of experiments and find the minimal precision of the attacker's spoofing signals required for covert satellite-lock takeover.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 50 条
  • [1] On the Limitations of GPS Time-Spoofing Attacks
    Demir, Mehmet Ozgun
    Kurt, Gunes Karabulut
    Pusane, Ali Emre
    2020 43RD INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2020, : 313 - 316
  • [2] Detection of GPS Spoofing Attacks on Unmanned Aerial Systems
    Manesh, Mohsen Riahi
    Kenney, Jonathan
    Hu, Wen Chen
    Devabhaktuni, Vijaya Kumar
    Kaabouch, Naima
    2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [3] Detection of GPS Spoofing Attacks Based on Isolation Forest
    Zuo, Shenzheng
    Liu, Yinan
    Zhang, Dongmei
    Xin, Pengpeng
    Liu, Tianxin
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 357 - 361
  • [4] GPS Spoofing Attacks in FANETs: A Systematic Literature Review
    Altaweel, Ala
    Mukkath, Hena
    Kamel, Ibrahim
    IEEE ACCESS, 2023, 11 : 55233 - 55280
  • [5] An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs
    Sathaye, Harshad
    Strohmeier, Martin
    Lenders, Vincent
    Ranganathan, Aanjhan
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3503 - 3520
  • [6] SwarmFuzz: Discovering GPS Spoofing Attacks in Drone Swarms
    Yao, Yingao Elaine
    Dash, Pritam
    Pattabiraman, Karthik
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 366 - 375
  • [7] Emerging Attacks on VANET Security based on GPS Time Spoofing
    Bittl, Sebastian
    Gonzalez, Arturo A.
    Myrtus, Matthias
    Beckmann, Hanno
    Sailer, Stefan
    Eissfeller, Bernd
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 344 - 352
  • [8] Impact of GPS Time Spoofing Attacks on Cyber Physical Systems
    Wei, Xiao
    Sikdar, Biplab
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1155 - 1160
  • [9] Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs
    Talaei Khoei, Tala
    Ismail, Shereen
    Kaabouch, Naima
    SENSORS, 2022, 22 (02)
  • [10] Resilient PMU Network Design in the Face of GPS Spoofing Attacks
    Sarailoo, Morteza
    Wu, N. Eva
    Bay, John S.
    2019 IEEE POWER & ENERGY SOCIETY INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE (ISGT), 2019,