Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Effects of a navigation spoofing signal on a receiver loop and a UAV spoofing approach

  • Original Article
  • Published:
GPS Solutions Aims and scope Submit manuscript

A Correction to this article was published on 14 August 2020

This article has been updated

Abstract

A civil navigation signal is vulnerable to interference and tampering owing to its open interface and low signal power. We focus on navigation spoofing. First, using a piecewise function, we quantitatively analyze the effects of the navigation spoofing signal on the receiver tracking loop. For a phase-locked loop, the spoofing signal extends the pull-in range of the discriminator. The autocorrelation gain of the spoofing signal has a different effect on the slope of the discriminator, depending on whether the discriminator is related to the signal amplitude. For the delay-locked loop, taking the non-coherent early minus late power method as an example, the unlocking condition and interval are analyzed quantitatively using the spoofing amplitude gain and the initial phase cosine of the spoofing and authentic carriers. A carrier frequency difference between the spoofing signal and authentic signal causes a phase jump and attenuation of the amplitude gain. Second, in luring an unmanned aerial vehicle (UAV) to a designated location, we assume a UAV model and provide a spoofing strategy. Experimental results show that it is feasible to lure a civilian quadrotor UAV to a designated location about 50 m from where the UAV believes it is located.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

Data will be made available on request. If you have any requirements, please contact the corresponding author, E-mail: mcmtwjyy@gmail.com.

Change history

  • 14 August 2020

    In the original article, some typos regarding Eq. (1) and respective sentence are corrected, and corrections are made to a sentence in section ���Effect of the frequency difference on the PLL and DLL���.

References

  • Bhatti J, Humphreys TE (2017) Hostile control of ships via false GPS signals: demonstration and detection. Navigation 64(1):51–66

    Article  Google Scholar 

  • Gaspar J, Ferreira R, Sebastião P, Souto N (2018) Capture of UAVs through GPS spoofing. The 6th global wireless summit, Chiang Rai, Thailand, Nov 25–28, pp 21–26

  • Humphreys TE, Ledvina BM, Psiaki ML, OHanlon BW, Kintner PM (2008) Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Proceedings of ION GNSS 2008, institute of navigation, Savannah, GA, Sept, pp 2314–2325

  • Jafarnia-Jahromi A, Broumandan A, Nielsen J (2012) Lachepelle G (2012) GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int J Navig Observ 127072:1–16

    Google Scholar 

  • Kaplan ED, Hegarty CJ (1996) Understanding GPS: principles and applications. Artech House Publishers, Norwood, pp 166–170

    Google Scholar 

  • Kerns AJ, Shepard DP, Bhatti JA, Humphreys TE (2014) Unmanned aircraft capture and control via GPS spoofing. J Field Robot 31(4):617–636

    Article  Google Scholar 

  • Li M, Kou Y, Xu Y, Liu Y (2018) Design and field test of a GPS spoofer for UAV trajectory manipulation. In: Proceedings of China satellite navigation conference (CSNC). Springer, pp 161–173

  • Psiaki ML, Humphreys TE (2016) GNSS spoofing and detection. Proc IEEE 104(6):1258–1270

    Article  Google Scholar 

  • Seo SH, Lee BH, Im SH, Jee GI (2015) Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal. J Position Navig Timing 4(2):57–65

    Article  Google Scholar 

  • Shepard DP, Humphreys TE (2011) Characterization of receiver response to spoofing attacks. In: Proceedings of ION GNSS 2011, institute of navigation, Portland, OR, Sept, pp 2608–2618

  • Shepard DP, Bhatti JA, Humphreys TE, Fansler AA (2012a) Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In: Proceedings of ION GNSS 2012, institute of navigation, Nashville, TN, Sept, pp 3591–3605

  • Shepard DP, Humphreys TE, Fansler AA (2012b) Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. Int J Crit Infrastruct Prot 5(3–4):146–153

    Article  Google Scholar 

  • Tippenhauer NO, Popper C, Rasmussen KB, Capkun S (2011) On the requirements for successful GPS spoofing attacks. In: ACM conference on computer and communications security. CCS’11, Chicago, Illinois, USA, pp 17–21

  • Volpe JA (2001) Vulnerability assessment of the transportation infrastructure relying on the global positioning system. National Transportation Systems Center

  • Warner JS, Johnston RG (2003) A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. J Secur Admin 3:2384–2392

    Google Scholar 

Download references

Acknowledgements

We thank Glenn Pennycook, MSc, from Liwen Bianji, Edanz Group China (www.liwenbianji.cn/ac), for editing the English text of a draft of this manuscript.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Yang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, C., Yang, J., Chen, J. et al. Effects of a navigation spoofing signal on a receiver loop and a UAV spoofing approach. GPS Solut 24, 76 (2020). https://doi.org/10.1007/s10291-020-00986-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10291-020-00986-z

Keywords

Navigation