Skip to main content

A Novel Study and Analysis on Global Navigation Satellite System Threats and Attacks

  • Conference paper
  • First Online:
High Performance Computing and Networking

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 853))

Abstract

Due to rapid increase of GNSS functions usage for civilian applications, it is fact that it has some security concern and threatened by variety of attacks, the signals which are given by GNSS are very low power, and hence, the interference may takes place, it will effect on usage, also accuracy will decrease, and the important concern is “spoofing attack” in GNSS, and also it divides GNSS output signals, by the aim of putting receivers control of a receiver also make by calculating its time place and position. The wide usage of GNSS for people’s everyday life all aspects of works the integrity and the authenticity is very much concern for satellite navigation signals, the signals are prone to suffer from jamming and spoofing hence it effect on receiver signals and it will impact on cause to position deviation (Humphreys TE, Ledvina BM, Psiaki ML, O'Hanlon BW, Kintner PM (2008) Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: ION GNSS 21st. International technical meeting of the satellite division, pp 2314–2325 [1], Ledvina BM, Bencze WJ, Galusha B, Miller I (2010) An in-line anti-spoofing device for legacy civil GPS receivers. In: Proceedings of the 2010 international technical meeting of the institute of navigation, 25–27 Jan 2010, San Deigo CA, pp 698–712 [2]). Based on the available literature about GNSS spoofing attacks, this article is to analyze various technologies used for anti-spoofing methods and also discuss about strategies which are articulated by various researchers, protection procedures, and implementation schemes of anti-spoofing techniques caused by spoofing attacks which are also analyzed more specifically in different signal level, and therefore, the paper will analyze the performance of various methods for detecting the different types of anti-spoofing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Humphreys TE, Ledvina BM, Psiaki ML, O'Hanlon BW, Kintner PM (2008) Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: ION GNSS 21st. International technical meeting of the satellite division, Savannah GA, pp 2314–2325, 16–19 Sept 2008

    Google Scholar 

  2. Ledvina BM, Bencze WJ, Galusha B, Miller I (2010) An in-line anti-spoofing device for legacy civil GPS receivers. In: Proceedings of the 2010 international technical meeting of the institute of navigation, 25–27 Jan 2010, San Deigo CA, pp 698–712

    Google Scholar 

  3. Margaria D, Motella B, Anghileri M, Floch J-J, Fernández-Hernández I, Paonni M (2017) Signal structure-based authentication for civil GNSSs: Recent solutions and perspectives. IEEE Signal Process Mag 34(5):27–37

    Article  Google Scholar 

  4. Lo S, Lorenzo DD, Enge P, Akos D, Bradley P (2009) Signal authentication, a secure civil GNSS for today. Inside GNSS 4(5):30–39

    Google Scholar 

  5. Akos DM (2012) Who’s afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). J Inst Navig 59(4)

    Google Scholar 

  6. Jovanovic, Botteron C, Fariné P-A (2014) Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. In: Proceedings of IEEE/ION position, location navigation symposium (PLANS), Monterey, CA, USA, pp 1258–1271

    Google Scholar 

  7. Jiang, Chen S, Chen Y, Bo Y, Xia Q, Zhang B (2018) Analysis of the baseline data based GPS spoofing detection algorithm. In: Proceedings of IEEE/ION position, location navigation symposium (PLANS), Monterey, CA, USA, pp 397–403

    Google Scholar 

  8. Caparra G, Ceccato S, Sturaro S, Laurenti N (2017) A key management architecture for GNSS open service navigation message authentication. In: Proceedings of European navigation conference (ENC), Lausanne, Switzerland, pp 287–297

    Google Scholar 

  9. Humphreys TE (2013) UT Austin researchers spoof supery-acht at Sea. The University of Texas at Austin. [Online]. Available: http://www.engr.utexas.edu/features/superyacht-gps-spoofing

  10. Shi, Chen S, Liu Z (2017) Analysis and optimizing of time-delay in GPS repeater deception. J Chongqing Univ Posts Telecommun (Natural Sci. Edition) 29(1):56–61

    Google Scholar 

  11. Psiaki ML, Humphreys TE (2016) GNSS spoofing and detection. Proc IEEE 104(6):1258–1270

    Google Scholar 

  12. Gao Z, Meng F (2011) Principle and simulation research of GPS repeater deception jamming. J Telemetry Tracking Command 32(6):44–47

    Google Scholar 

  13. Scott L (2003) Anti-spoofing & authenticated signal architectures for civil navigation systems. In: Proceedings of the 16th international technical meeting of the satellite division of the institute of navigation (ION GPS/GNSS), Portland, OR, USA, pp 1543–1552

    Google Scholar 

  14. Humphreys TE (2013) Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans Aerosp Electron Syst 49(2):1073–1090

    Article  Google Scholar 

  15. Humphreys TE, Ledvina BM, Psiaki ML, O’Hanlon BW, Kintner PM (2009) Assessing the spoofing threat. GPS World 20(1):28–39

    Google Scholar 

  16. Dai, Xiao M, Huang S (2017) GPS spoofing and inducing model of UAV. Commun Technol 50(3):496–501

    Google Scholar 

  17. He L, Li W, Guo C (2016) Study on GPS generated spoofing attacks. Appl Res Comput 33(8):2405–2408

    Google Scholar 

  18. Shi M, Chen S, Wu H, Mao H (2015) A GPS spoofing pattern based on denial environment. J Air Force Eng Univ (Natural Sci. Edition) 16(6):27–31

    Google Scholar 

  19. Huang S, Chen S, Yang B, Wu H (2017) A power control strategy of multiple GNSS spoofing signals. J Air Force Eng Univ (Natural Sci. Edition) 18(1):76–80

    Google Scholar 

  20. Wesson K, Rothlisberger M, Humphreys T (2012) Practical crypto-graphic civil GPS signal authentication. Navigation 59(3):177–193

    Article  Google Scholar 

  21. Curran JT, O’Driscoll C (2016) Message authentication, channel coding & anti-spoofing. In: 29th International technical meeting of the satellite division of the institute of navigation (ION GNSS), Portland, OR, pp 2948–2959

    Google Scholar 

  22. Risbud P, Gatsis N, Taha A (2019) Vulnerability amnalysis of smart grids to GPS spoofing. IEEE Trans Smart Grid 10(4):3535–3548

    Article  Google Scholar 

  23. Kim TH, Sin CS, Lee S, Kim JH (2013) Analysis of effect of anti-spoofing signal for mitigating to spoofing in GPS L1 signal. In: 13th International conference on control, automation and systems (ICCAS ), Gwangju, South Korea,pp 523–526

    Google Scholar 

  24. Berardo M, Manfredini EG, Dovis F, Presti LL (2016) A spoofing mitigation technique for dynamic applications. In Proceedings of 8th ESA workshop satellite navigation technology European workshop GNSS signals signal process. (NAVITEC), Noordwijk, The Netherlands, pp 1–7

    Google Scholar 

  25. Zhao L, Miao Z, Zhang B, Liu B, Li G, Zhou X (2015) A novel spoofing attack detection method in satellite navigation tracking phase. J Astronaut 36(10):1172–1177

    Google Scholar 

  26. Bhamidipati S, Mina TY, Gao GX (2018) GPS time authentication against spoofing via a network of receivers for power systems. In: Proceedings of IEEE/ION position, location navigation symposium (PLANS), Monterey, CA, USA, pp 1485–1491

    Google Scholar 

  27. Wang, Li H, Cui X, Lu, M (2013) A new method in acquisition to detect GNSS spoofing signal. In: Proceedings of international conference on mechatronic sciences, electric engineering and computer (MEC), Shenyang, China, pp 2913–2917

    Google Scholar 

  28. Cai, Sun X, Fan G, Wu C (2017) Deception detection method in multipath environment. Mod Defence Technol 45(5):72–77

    Google Scholar 

  29. Li H, Wang X (2016) Detection of GPS spoofing through signal multipath signature analysis. In: Proceedings of IEEE Canadian conference on electrical and computer engineering (CCECE), Vancouver, BC, Canada, pp 1–5

    Google Scholar 

  30. Khalajmehrabadi, Gatsis N, Akopian D, Taha AF (2018) Real- time rejection and mitigation of time synchronization attacks on the global positioning system. IEEE Trans Ind Electron 65(8):6425–6435

    Google Scholar 

  31. Jahromi AJ, Broumandan A, Daneshmand S, Lachapelle G, Ioannides RT (2016) Galileo signal authenticity verification using signal quality monitoring methods. In: Proceedings of international conference on localization GNSS (ICL- GNSS), Barcelona, Spain, pp 1–8

    Google Scholar 

  32. Broumandan A, Jafarnia-Jahromi A, Dehghanian V, Nielsen J, Lachapelle G (2012) ‘GNSS spoofing detection in handheld receivers based on signal spatial correlation. In: Proceedings of IEEE/ION position, location navigation symposium, Myrtle Beach, SC, USA, pp 479–487

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samalla, K., Kumar, P.N. (2022). A Novel Study and Analysis on Global Navigation Satellite System Threats and Attacks. In: Satyanarayana, C., Samanta, D., Gao, XZ., Kapoor, R.K. (eds) High Performance Computing and Networking. Lecture Notes in Electrical Engineering, vol 853. Springer, Singapore. https://doi.org/10.1007/978-981-16-9885-9_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-9885-9_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-9884-2

  • Online ISBN: 978-981-16-9885-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics