Nothing Special   »   [go: up one dir, main page]

skip to main content
survey

A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures

Published: 02 May 2016 Publication History

Abstract

Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.

References

[1]
ABC. 2013. GPS System Monitors Parolees 24/7. Retrieved February 29, 2016, from http://abcnews.go.com/Primetime/story?id=132116.
[2]
ACMA. 2013. Mobile Phone & GPS Jamming Devices FAQ. Retrieved February 29, 2016, from http://www.acma.gov.au/theACMA/faqs-mobile-phone-and-gps-jamming-devices-acma.
[3]
ACMA. 2014. Taxi Driver Convicted. Retrieved February 29, 2016, from http://www.acma.gov.au/Citizen/Consumer-info/All-about-spectrum/High-risk-devices/taxi-driver-convicted.
[4]
Airservices. 2014. GBAS Implementation Program. Retrieved February 29, 2016, from http://www.airservicesaustralia.com/projects/ground-based-augmentation-system-gbas/gbas-implementation-program/.
[5]
Ilge Akkaya, Edward A. Lee, and Patricia Derler. 2013. Model-based evaluation of GPS spoofing attacks on power grid sensors. In Proceedings of the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems (MSCPES’13). IEEE, Los Alamitos, CA, 1--6.
[6]
Dennis M. Akos. 2012. Who’s afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). Journal of Navigation 59, 4, 281--290.
[7]
AMSA. 2013. Differential Global Positioning System. Retrieved February 29, 2016, from http://www.amsa.gov.au/navigation/services/dgps/.
[8]
Galina S. Antonova, Alex Apostolov, Doug Arnold, Stephan Bedrosian, and Christoph Brunner. 2013. Standard profile for use of IEEE STD 1588-2008 precision time protocol (PTP) in power system applications. In Proceedings of the 66th Annual Conference for Protective Relay Engineers. IEEE, Los Alamitos, CA, 1--6.
[9]
ASKA. 2012. Parallel Generators and Synchronization, Generator Power System Design. Retrieved February 29, 2016, from http://www.aksapowergen.com/pdf/other/Parallel+Generators+Synchronization.pdf.
[10]
George T. Becker, Sherman Lo, David Di Lorenzo, Di Qiuand Christof Paar, and Per Enge. 2009. Efficient authentication mechanism for navigation systems—a radio-navigation case study. In Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’09). 901--912.
[11]
BeiDou. 2013. BeiDou Navigation Satellite System Signal in Space Interface Control Document Open Service Signal (Version 2.0). Technical Report. China Satellite Navigation Office.
[12]
John Betz. 2002. Binary offset carrier modulations for radionavigation. Journal of the Institute of Navigation 48, 4, 227--246s.
[13]
Blutag. 2012. How to Bypass House Arrest Ankle Monitor. Retrieved February 29, 2016, from http://www.digitaltechnologies-2000.com/how-to-bypass-house-arrest-ankle-bracelet/.
[14]
Holly Borowski, Oskar Isoz, Fredrik Marsten Eklöf, Sherman Lo, and Dennis Akos. 2012. Detecting False Signals with Automatic Gain Control. GPS World. Retrieved February 29, 2016, from http://gpsworld.com/detecting-false-signals-automatic-gain-control-12804/.
[15]
Broadcom. 2008. Ethernet Time Synchronization. White Paper. Retrieved February 29, 2016, from http://www.broadcom.com/collateral/wp/StrataXGSIV-WP100-R.pdf.
[16]
Alison Brown, Jarrett Redd, and Michael Dix. 2013. Open Source Software Defined Radio Platform for GNSS Recording and Simulation. Technical Report. NAVSYS Corporation. http://www.navsys.com/Papers/13-09-001_Open_Source_SDR_Platform_for_GNSS_Recording_and_Simulation.pdf.
[17]
James Carroll and Kirk Montgomery. 2008. Global positioning system timing criticality assessment—preliminary performance results. In Proceedings of the 40th Annual Precise Time and Time Interval (PTTI) Meeting. 484--505.
[18]
CAST. 2013. CAST-SGX GPS Satellite Simulator. Retrieved February 29, 2016, from http://www.castnav.com/cast_pdf/CASTSGX.pdf.
[19]
Antonio Cavaleri, Beatrice Motella, Marco Pini, and Maurizio Fantino. 2010. Detection of spoofed GPS signals at code and carrier tracking level. In Proceedings of the ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC’10). IEEE, Los Alamitos, CA, 1--6.
[20]
Ran Chengqi. 2012. Development of the Beidou Navigation Satellite System. In Global Navigation Satellite Systems. National Academies Press, Washington, DC, 28--33.
[21]
Chronos. 2013. 520 GPS Jammer Detector & Locator. Retrieved February 29, 2016, from http://www.chronos.co.uk/files/pdfs/ctl/ctl3520.pdf.
[22]
Chronos. 2014. Sentinel Project Report on GNSS Vulnerabilities. Technical Report. Chronos Technology. http://www.chronos.co.uk/files/pdfs/gps/SENTINEL_Project_Report.pdf.
[23]
Cobham. 2015. GPSG-1000 GPS/Galileo Portable Positional Simulator. Retrieved February 29, 2016, from http://www.arsitec.com.br/pdfs/GPSG-1000is.pdf.
[24]
Karen Collier and Amelia Harris. 2013. Taxi Cheats Using GPS Jammers to Steal Fares. Retrieved February 29, 2016, from http://www.heraldsun.com.au/news/law-order/taxi-cheats-using-gps-jammers-to-steal-fares/story-fni0fee2-1226756138559.
[25]
Peter H. Dana. 1997. Global positioning system (GPS) time dissemination for real-time applications. Real-Time Systems 12, 9--40.
[26]
Saeed Daneshmand. 2013. GNSS Interference Mitigation Using Antenna Array Processing. Ph.D. Dissertation. School of Engineering, University of Calgary.
[27]
Dicom. 2014. GTR51—Time and Frequency Transfer GNSS Receiver. Retrieved February 29, 2016, from http://www.dicom.cz/en/product/1650-time-and-frequency-transfer-gnss-receiver.
[28]
A. J. Van Dierendonck. 2012. Impact of international, low power, in-band, personal privace device (PPDs) on aviation. In Global Navigation Satellite Systems. National Academies Press, Washington, DC, 147--152.
[29]
Michael Dimino. 1999. Telephone operable global tracking system for vehicles. Patent US 5918180 A.
[30]
DOD. 2008. Global Positioning System Standard Positioning Service Performance Standard 4th Edition. Technical Report. U.S. Department of Defense. http://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf.
[31]
Economist. 2011. No jam tomorrow. Economist, 1--6. http://www.economist.com/node/18304246.
[32]
Abdelsalam M. Elhaffar. 2008. Power Transmission Line Fault Location Based on Current Traveling Waves. Ph.D. Dissertation. Helsinki University of Technology.
[33]
ENISA. 2006. Risk Assessment and Risk Management Methods: Information Packages for Small and Medium Sized Enterprises (SMEs) Deliverable 2 Final Version, Version 1.0. Technical Report. ENISA. http://www.enisa.europa.eu/act/rm/files/deliverables/information-packages-for-small-and-medium-sized-enterprises-smes/at_download/fullReport
[34]
ETSI. 1996. GSM Technical Specification GSM 05.10. Technical Report. European Telecommunications Standards Institute. http://www.etsi.org/deliver/etsi_gts/05/0510/05.00.00_60/gsmts_0510v050000p.pdf.
[35]
Jean-Loup Ferrant, Mike Gilson, Sebastien Jobert, Michael Mayer, Laurent Montini, Michel Ouellette, Silvana Rodrigues, and Stefano Ruffini. 2013. Synchronous Ethernet and IEEE 1588 in Telecoms. Wiley, Hoboken, NJ.
[36]
Susan A. Fleming. 2013. Positive Train Control: Additional Authorities Could Benefit Implementation. Retrieved February 29, 2016, from http://www.gao.gov/products/GAO-13-720.
[37]
Börje Forssell. 2009. The dangers of GPS/GNSS. Coordinates V, 2, 6--8.
[38]
Giulio Gabelli, Ediz Cetin, Ryan J. R. Thompson, Andrew G. Dempster, and Giovanni E. Corazza. 2013. GNSS signal cancellation for enhanced interference detection and localization. In Proceedings of the International Global Navigation Satellite Systems Society IGNSS Symposium. 1--15.
[39]
Galileo. 2010. European GNSS (Galileo) Open Service Signal in Space Interface Control Document. Technical Report. European Union and European Space Agency.
[40]
GAO. 2013. Report to Congressional Requesters: GPS Disruptions. Technical Report. U.S. Government Accountability Office. http://www.gao.gov/assets/660/658792.pdf.
[41]
Alessia Garofalo, Cesario Di Sarno, Luigi Coppolino, and Salvatore D’Antonio. 2013. A GPS spoofing resilient WAMS for Smart Grid, In Dependable Computing. Lecture Notes in Computer Science, Vol. 7869. Springer, 134--147.
[42]
GBAS Working Group. 2013. GBAS Approach and Landing Systems. Available at http://flygls.net/.
[43]
Jay Giri, David Sun, and Rene Avila-Rosales. 2009. Enhancing grid reliability and stability with a better, smarter, faster control system is the key to avoiding total system collapse. IEEE Power and Energy Magazine March-April, 35--40.
[44]
Glonass. 2008. Global Navigation Satellite System GLONASS Interface Control Document Navigational Radiosignal in Bands L1, L2. Technical Report. Russian Institute of Space Device Engineering, Moscow.
[45]
GPO. 2008. Public Law 110--432—Rail Safety Improvement Act of 2008. Retrieved March 1, 2016, from https://www.fra.dot.gov/eLib/Details/L03588.
[46]
GPS. 1995. Global Positioning System Standard Positioning Service Signal Specification. Technical Report. Global Positioning System. http://www.gps.gov/technical/ps/1995-SPS-signal-specification.pdf.
[47]
GPS.GOV. 2013a. Information About GPS Jamming. Retrieved March 1, 2016, from http://www.gps.gov/spectrum/jamming/.
[48]
GPS.GOV. 2013b. New Civil Signals. Retrieved March 1, 2016, from http://www.gps.gov/systems/gps/modernization/civilsignals/.
[49]
GPS.GOV. 2014. GPS Accuracy. Retrieved March 1, 2016, from http://www.gps.gov/systems/gps/performance/accuracy/.
[50]
Anthony Grillo and John P. Veschi. 1999. GPS restraint system and method for confining a subject within a defined area. Patent US 6232916 B1. http://www.google.com.au/patents/US6232916.
[51]
Christoph Günter. 2014. A survey of spoofing and counter-measures. Navigation 6, 3, 159--177.
[52]
Randolph G. Hartman. 1996. Spoofing detection system for a satellite positioning system. Patent US 5557284 A.
[53]
Gunter W. Hein, Jose-Angel Avila-Rodríguez, Stefan Wallner, John W. Betz, Chris J. Hegarty, Joseph Rushanan, Andrea L. Kraay, Anthony R. Pratt, Lt. Sean Lenehan, John Owen, Lean-Luc Issler, and Thomas A. Stansell. 2006. MBOC: The new optimized spreading modulation recommended for Galileo L1 OS and GPS L1C. Inside GNSS May-June, 57--66.
[54]
Günter W. Hein, Jeremie Godet, Jean-Luc Issler, Jean-Christophe Martin, Phillipe Erhard, Rafael Lucas-Rodriguez, and Tony Pratt. 2002. Status of Galileo frequency and signal design. In Proceedings of the 15thInternational Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS’02). 34--37.
[55]
Gunter W. Hein, Felix Kneissl, Jose-Angel Avila-Rodriguez, and Stefan Wallner. 2007. Authenticating GNSS proofs against spoofs part 2. Inside GNSS September-October, 71--78.
[56]
Liang Heng, Jonathan J. Makela, Alejandro D. Dominguez-Garcia, Rakesh B. Bobba, William H. Sanders, and Grace Xingxin Gao. 2014. Reliable GPS-based timing for power systems: A multi-layered multi-receiver architecture. In Proceedings of the IEEE Power and Energy Conference at Illinois. IEEE, Los Alamitos, CA, 1--7.
[57]
Liang Heng, Daniel B. Work, and Grace Xingxin Gao. 2013. Cooperative GNSS authentication reliability from unreliable peers. Inside GNSS September-October, 70--75.
[58]
Todd Humphreys. 2012. UAVs Vulnerable to Civil GPS Spoofing. Retrieved March 1, 2016, from http://www.insidegnss.com/node/3131.
[59]
Todd Humphreys. 2013a. Detection strategy for cryptographic GNSS anti-spoofing. IEEE Transactions on Aerospace and Electronic Systems 49, 2, 1073--1090.
[60]
Todd Humphreys. 2013b. Researchers Steer Off Course to Show Potential Power of ‘GPS Spoofing.’ Retrieved March 1, 2016, from http://www.pbs.org/newshour/bb/science-july-dec13-gps_08-02/.
[61]
Todd Humphreys. 2013c. UT Austin Researchers Spoof Superyacht at Sea. Retrieved March 1, 2016, from http://www.engr.utexas.edu/features/superyacht-gps-spoofing.
[62]
Todd Humphreys and Brent M. Ledvina. 2010. The GPS assimilator upgrading receivers via benign spoofing. Inside GNSS June, 50--58.
[63]
Todd E. Humphreys, Brent M. Ledvina, Mark L. Psiaki, Brady O’Hanlon, and P. M. Kintner Jr. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’08). 2314--2325.
[64]
Todd E. Humphreys, Mark L. Psiaki, and Paul M. Kintner. 2006. GNSS receiver implementation on a DSP: Status, challenges, and prospects. In Proceedings of the 19th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’06). 2370--2382.
[65]
Michaël Hurtgen and Jean-Claude Maun. 2012. Applications of PMU Measurements in the Belgian Electrical Grid. Technical Report. Belgian Federal Government. http://economie.fgov.be/nl/binaries/20120420_PMU_Final_Report_tcm325-200078.pdf.
[66]
Nick Hyde. 2012. Apple Maps gets drivers lost in Australian outback, police warn. Retrieved March 1, 2016, from http://www.cnet.com/au/news/apple-maps-gets-drivers-lost-in-australian-outback-police-warn/.
[67]
IEEE. 2002. IEEE P1547/D10 Draft Standard for Interconnecting Distributed Resources with Electric Power Systems. Technical Report. IEEE, Los Alamitos, CA. http://dg.raabassociates.org/Articles/Draft_IEEE_%20P1547.pdf.
[68]
IEEE. 2011. IEEE Std C37.118.2-2011—IEEE Standard for Synchrophasor Data Transfer for Power Systems. Retrieved March 1, 2016, from http://ieeexplore.ieee.org/servlet/opac?punumber=6111220.
[69]
IMO. 2004. International Convention for the Safety of Life at Sea. Retrieved March 1, 2016, from http://library.arcticportal.org/1696/1/SOLAS_consolidated_edition2004.pdf.
[70]
Oscar Isoz, Denis Akos, Tore Lindgren, Chih-Cheng Sun, and ShauShiun Jan. 2011. Assessment of GP L1/Galileo E1 interference monitoring system for the airport environment. In Proceedings of the 24th International Technical Meeting of the Satellite Division of theInstitute of Navigation (ION GNSS’11). 1920--1930.
[71]
Ali Jafarnia-Jahromi. 2013. GNSS Signal Authenticity Verification in the Presence of Structural Interference. Ph.D. Dissertation. Department of Geomatics Engineering, University of Calgary.
[72]
Ali Jafarnia-Jahromi, Ali Broumandan, John Nielsen, and Géard Lachapelle. 2012. GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation 2012, 1--16.
[73]
Ali Jafarnia-Jahromi, Saeed Daneshmand, and Gérard Lachapelle. 2013. Spoofing countermeasure for GNSS receivers—a review of current and future research trends. In Proceedings of the 4th International Colloquium on Scientific and Fundamental Aspects of the Galileo Programme European Space Agency. 1--8.
[74]
JFC. 2014. Jammer from China. Retrieved March 1, 2016, from http://www.jammerfromchina.com/categories/GPS_Jammers/.
[75]
Shengyue Ji, Wu Chen, Xiaoli Ding, Yongqi Chen, Chunmei Zhao, and Congwei Hu. 2010. Potential benefits of GPS/GLONASS/GALILEO integration in an urban canyon—Hong Kong. Journal of Navigation 63, 681--693.
[76]
Xichen Jiang, Brian J. Harding, and Alejandro D. Domínguez-García. 2013. Spoofing GPS receiver clock offset of phasor measurement units. IEEE Transactions on Power Systems 28, 3, 3253--3262.
[77]
Chen Jinping. 2012. Analysis of the GNSS augmentation technology architecture. In Global Navigation Satellite Systems. National Academies Press, Washington, DC, 139--144.
[78]
Shenzen Juneo. 2015. Shenzen Juneo Technology Limited TK106. Retrieved March 1, 2016, from http://www.tkstargps.com/ProductShow.asp?ID=181.
[79]
Hee Jung, Mark L. Psiaki, and Stephen P. Powell. 2003. Kalman-filter-based semi-codeless tracking of weak dual-frequency GPS signals. In Proceedings of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS/GNSS’03). 2515--2523.
[80]
Elliot D. Kaplan. 1996. Understanding GPS Principles and Applications. Artech House, Norwood, MA.
[81]
Gorkem Kar, Hossen Mustafa, Yan Wang, Yingying Chen, Wenyuan Xu, Marco Gruteser, and Tam Vu. 2014. Detection of on-road vehicles emanating GPS interference. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS’14). ACM, New York, NY, 621--632.
[82]
Andrew J. Kerns, Daniel P. Shepard, Jahshan A. Bhatti, and Todd E. Humphreys. 2013. Unmanned Aircraft capture and control via GPS spoofing. Retrieved March 1, 2016, from http://radionavlab.ae.utexas.edu/images/stories/files/papers/unmannedCapture.pdf.
[83]
Alfred Kleusberg. 2003. Analytical GPS navigation solution. In Geodesy: The Challenge of the Third Millennium. Springer, Heidelberg, Germany, 93--96.
[84]
Hiroaki Koshima and Joseph Hoshen. 2000. Personal locator services emerge. IEEE Spectrum 37, 2, 41--48.
[85]
Marcus G. Kuhn. 2004. An asymmetric security mechanism for navigation signals. In Information Hiding. Lecture Notes in Computer Science, Vol. 3200. Springer, 239--252.
[86]
Boris Landoni. 2011. Mini GSM Localizer with GPS. Retrieved March 1, 2016, from http://www.open-electronics.org/mini-gsm-localizer-without-gps/.
[87]
Brent M. Ledvina, William J. Bencze, Bryan Galusha, and Issac Miller. 2010. An in-line anti-spoofing device for legacy civil GPS receivers. In Proceedings of the 2010 International Technical Meeting of The Institute of Navigation. San Diego, CA, 698--712.
[88]
Peter Levin, David S. De Lorenzo, Per K. Enge, and Sherman C. Lo. 2011. Authenticating a signal based on an unknown component thereof. U.S. Patent 7,969,354 B2.
[89]
Sherman Lo and Per Enge. 2010. Authenticating aviation augmentation system broadcasts. In Proceedings of IEEE/ION Position Location and Navigation Symposium (PLANS’10). IEEE, Los Alamitos, CA, 708--717.
[90]
Sherman Lo, David De Lorenzo, Per Enge, Dennis Akos, and Paul Bradley. 2009. Signal authentication a secure civil GNSS for today. Inside GNSS September-October, 30--39.
[91]
Michael A. Lombardi, Lisa M. Nelson, Andrew N. Novick, and Victor S. Zhang. 2001. Time and frequency measurements using the global positioning system. International Journal of Metrology 8, 3, 26--33.
[92]
Jaroslaw Magiera and Ryszard Katulski. 2015. Detection and mitigation of GPS spoofing based on antenna array processing. Journal of Applied Research and Technology 131, 1, 45--57.
[93]
Pratyusa K. Manadhata and Jeanette M. Wing. 2010. An attack surface metric. IEEE Transactions on Software Engineering 37, 3, 1--17.
[94]
Paul Marks. 2013. Radar Gun Spots Vehicles with Illegal GPS Jammers. Retrieved March 1, 2016, from http://www.newscientist.com/article/dn23984-radar-gun-spots-vehicles-with-illegal-gps-jammers.html.
[95]
Charles E. McDowell. 2007. GPS spoofer and repeater mitigation system using spatial nulling. Patent US 7250903 B1.
[96]
Meinberg. 2015. Manual LANTIME NTP Server (FW LTOS 6.16). Available at https://www.meinbergglobal.com.
[97]
MeitrackUSA. 2015. Meitrack MVT100. Retrieved March 1, 2016, from http://www.meitrackusa.com/trackers/gps-vehicle-trackers/mvt100.
[98]
K. Michael, A. McNamee, and M. G. Michael. 2006. The emerging ethics of humancentric GPS tracking and monitoring. In Proceedings of the International Conference on Mobile Business (ICMB’06). IEEE, Los Alamitos, CA, 34.
[99]
MightyGPS. 2009. Ankle Bracelet GPS Tracker. Retrieved March 1, 2016, from http://www.mightygps.com/Ankle_GPS_tracker.htm.
[100]
Paul Y. Montgomery, Todd E. Humphreys, and Brett M. Ledvina. 2009. A multi-antenna defense receiver-autonomous GPS spoofing detection. Inside GNSS March-April, 40--46.
[101]
Beatrice Motella, Marco Pini, Maurizio Fantino, and Paolo Mulassano. 2010. Performance assessment of low cost GPS receivers under civilian spoofing attacks. In Proceedings of the 5th ESA Workshop on Satellite Navigation Technologies and the European Workshop on GNSS Signals and Signal Processing (NAVITEC’10). IEEE, Los Alamitos, CA, 1--8.
[102]
Navstar. 2006. Navstar Global Positioning System Interface Specification IS-GPS-200 Revision D. Technical Report. GPS Joint Program Office. http://www.losangeles.af.mil/shared/media/document/AFD-070803-059.pdf.
[103]
NERC. 2012. Extended Loss of GPS Impact on Reliability. Technical Report. North American Electric Reliability Corporation. http://www.nerc.com/docs/escc/PNT%20-%20Power%20Systems%20V19.pdf.
[104]
John Nielsen, Ali Broumandan, and Gérard Lachapelle. 2011. GNSS spoofing detection for single antenna handheld receivers. Navigation 58, 4, 335--344.
[105]
Tyler Nighswander, Brent Ledvina, Johnathan Diamond, Robert Brumley, and David Brumley. 2012. GPS software attacks. In Proceedings of the 2012 ACM Conference on Computer and Communications Security. ACM, New York, NY, 450--461.
[106]
JSC NIIAS. 2015. JSC NIIAS Research & Design Institute for Information Technology, Signalling and Telecommunications on Railway Transport. Retrieved March 1, 2016, from http://www.vniias.ru/en/images/stories/docs/niias_brochure_en.pdf.
[107]
NIST. 2012. Guide for Conducting Risk Assessments NIST Special Publication 800-30 Revision 1. Technical Report. National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf.
[108]
NTSB. 1997. Grounding of the Panamanian Passenger Ship Royal Majesty on Rose and Crown Shoal Near Nantucket, Massachusetts June 10, 1995. Technical Report. National Transportation Safety Board. http://www.ntsb.gov/investigations/AccidentReports/Reports/mar9701.pdf.
[109]
Brady W. O’Hanlon, Mark L. Psiaki, Jahshan A. Bhatti, Daniel P. Shepard, and Todd E. Humphreys. 2013. Real-time GPS spoofing detection via correlation of encrypted signals. Navigation 60, 4, 267--278.
[110]
Jorge L. Olenewa. 2014. Guide to Wireless Communications (3rd ed.). Cengage Learning, Boston, MA.
[111]
Mario Paolone, Alberto Borghetti, and Carlo A. Nucci. 2009. Development of an RTU for synchrophasors estimation in active distribution networks. In Proceedings of the IEEE Bucharest Power Tech Conference. 1--6.
[112]
Panagiotis Papadimitratos and Aleksander Jovanovic. 2008a. GNSS-based positioning: Attacks and countermeasures In Proceedings of the IEEE Military Communications Conference (MILCOM’08). 3168--3174.
[113]
Pangiotis Papadimitratos and Aleksander Jovanovic. 2008b. Protection and fundamental vulnerability of GNSS. In Proceedings of the IEEE International Workshop on Satellite and Space Communications (IWSSC’08). IEEE, Los Alamitos, CA, 167--171.
[114]
Brian K. Payne, David C. May, and Peter B. Wood. 2014. The ‘pains’ of electronic monitoring: A slap on the wrist or just as bad as prison? Criminal Justice Studies 27, 2, 133--148.
[115]
Adrian Perrig, Ran Canetti, Doug Tygar, and Dawn Song. 2002. The TESLA broadcast authentication protocol. CryptoBytes 5, 2, 2--13.
[116]
Scott Peterson and Payam Faramarzi. 2011. Exclusive: Iran Hijacked US Drone, Says Iranian Engineer (Video). Retrieved March 1, 2016, from http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video.
[117]
IIvan Petrovski and Takuji Ebinuma. 2010. Everything you always wanted to know about GNSS simulators but were afraid to ask. Inside GNSS September, 48--58.
[118]
PNT. 2010. National PNT Advisory Board Comments on Jamming the Global Positioning System: A National Security Threat: Recent Events and Potential Cures. White Paper. National Space-Based Positioning, Navigation, and Timing (PNT) Advisory Board. http://www.gps.gov/governance/advisory/recommendations/2010-11-jammingwhitepaper.pdf.
[119]
Oscar Pozzobon. 2004. Secure tracking using trusted GNSS receivers and Galileo authentication services. Journal of Global Positioning Systems 3, 1--2, 200--207.
[120]
Oscar Pozzobon. 2011. Keeping the spoofs out signal authentication for future GNSS. Inside GNSS May-June, 48--56.
[121]
Mark L. Psiaki, Barry W. O’Hanlon, Jahshan A. Bhatti, Daniel P. Shepard, and Todd E. Humphreys. 2011. GPS spoofing detection via dual-receiver correlation of military signals. IEEE Transactions on Aerospace and Electronic Systems 49, 4, 2250--2267.
[122]
Mark L. Psiaki, Steven P. Powell, and Brady W. O’Hanlon. 2013. Correlating Carrier Phase with Rapid Antenna Motion. Retrieved March 1, 2016, from http://gpsworld.com/innovation-gnss-spoofing-detection-correlating-carrier-phase-with-rapid-antenna-motion/.
[123]
Rama Rao, Eddie N. Rosario, and Robert J. Davis. 2006. Radiation pattern analysis of aircraft mounted GPS antennas and verification through scale model testing. In Proceedings of the IEEE/ION PLANS Meeting. IEEE, Los Alamitos, CA, 306--318.
[124]
RAoE. 2011. Global Navigation Space Systems: Reliance and Vulnerabilities. Technical Report. Royal Academy of Engineering. http://www.raeng.org.uk/news/publications/list/reports/RAoE_Global_Navigation_Systems_Report.pdf.
[125]
Schweitzer. 2014. SEL-3378 Synchrophasor Vector Processor. Retrieved March 1, 2016, from https://selinc.com/products/3378/.
[126]
Schweizer. 2015. Dependable Communications for Critical Infrastructure. Available at https://www.selinc.com/ICON/.
[127]
Logan Scott. 2003. Anti-spoofing and authenticated signal architectures for civil navigation systems. In Proceedings of the Institute of Navigation GPS/GNSS Conference. 1543--1552.
[128]
Logan Scott. 2011. Receiver Certification: Making the GNSS Environment Hostile to Jammers & Spoofers. Retrieved March 1, 2016, from http://www.gps.gov/governance/advisory/meetings/2011-11/scott.pdf.
[129]
Daniel P. Shepard and Todd E. Humphreys. 2011. Characterization of receiver response to spoofing attacks. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’11). 2608--2618. http://radionavlab.ae.utexas.edu/images/stories/files/papers/spcharION2011.pdf.
[130]
Daniel P. Shepard, Todd E. Humphreys, and Aaron A. Fansler. 2012. Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection 5, 3--4, 146--153.
[131]
Peter F. Swaszek, Richard J. Hartnett, Matthew V. Kempe, and Gregory W. Johnson. 2013. Analysis of a simple, multi-receiver GPS spoof detector. In Proceedings of the 2013 International Technical Meeting of the Institute of Navigation. 884--892.
[132]
Peter F. Swaszek, Scott A. Pratz, Benjamin N. Arocho, Kelly C. Seals, and Richard J. Hartnett. 2014. GNSS spoof detection using Shipboard IMU measurements. In Proceedings of the 27th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’14). 745--758.
[133]
Symmetricom. 2014. XLi Time and Frequency System Data Sheet—XLi. Retrieved March 1, 2016, from http://www.microsemi.com/products/timing-synchronization-systems/time-frequency-distribution/gps-instruments/xli.
[134]
Michael J. Thompson. 2012. Fundamentals and advancements in generator synchronizing systems. In Proceedings of the 65th Annual Conference for Protective Relay Engineers. IEEE, Los Alamitos, CA, 203--214. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber==6201234.
[135]
Nils Ole Tippenhauer, Christina Pöpper, Kaspar B. Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS’11). ACM, New York, NY, 75--86.
[136]
Trimble. 2013. Resolution SMT GG Multi-GNSS Timing Module User Guide. Trimble Navigation Limited, Sunnyvale, CA.
[137]
U-blox. 2013. AMY-5M: World’s smallest GPS receiver module. Retrieved March 1, 2016, from http://www.u-blox.com/en/amy-5m.html.
[138]
US-Cert. 2015. Advisory (ICSA-14-345-01) Arbiter Systems 1094B GPS Clock Spoofing Vulnerability. Retrieved March 1, 2016, from https://ics-cert.us-cert.gov/advisories/ICSA-14-345-01.
[139]
Sandra Verhagen and Peter J. G. Teuissen. 2013. Ambiguity resolution performance with GPS and BeiDou for LEO formation flying. Advances in Space Research 54, 5, 830--839.
[140]
Volpe. 2001. Vulnerability Assessment of the Transportation Infrastructure Relying on the Global Positioning System. Final Report, 2001. Technical Report. John A. Volpe National Transportation Systems Center.
[141]
Jon S. Warner and Roger G. Johnson. 2002. A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing. Journal of Security Administration 25, 19--28.
[142]
Jon S. Warner and Roger G. Johnston. 2003. GPS Spoofing Countermeasures. Retrieved March 1, 2016, from http://permalink.lanl.gov/object/tr?what=info:lanl-repo/lareport/LA-UR-03-6163.
[143]
Marc Weiss. 2012. Telecom Requirements for Time and Frequency Synchronization. Retrieved March 1, 2016, from http://www.gps.gov/cgsic/meetings/2012/weiss1.pdf.
[144]
Mark Weiss. 2013. GPS Vulnerability in Mobile Networks. Retrieved March 1, 2016, from http://www.gps.gov/multimedia/presentations/2013/12/MNSS/weiss.pdf.
[145]
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys. 2012. Practical cryptographic civil GPS signal authentication. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’12). 3335--3345.
[146]
Kyle Wesson, Daniel Shepard, Jahshan Bhatti, and Todd E. Humphreys. 2011. An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS’11). 1--11.
[147]
Chuck Wheatley. 1999. Self-synchronizing a CDMA cellular network. Microwave Journal May, 320--328.
[148]
Dale Williston and Dale Finney. 2011. Consequences of Out-of-Phase Reclosing on Feeders with Distributed Generators. Technical Report. Schweitzer Engineering Laboratories Inc. http://grouper.ieee.org/groups/scc21/1547.8/email/pdfX2pEArHjt0.pdf.
[149]
Allen J. Wood, Bruce F. Wollenberg, and Gerald B. Sheblé. 2014. Power Generation, Operation and Generation (3rd ed.). Wiley, Hoboken, NJ.
[150]
Willian Wright, Michael Russell, and John Brockhaus. 2011. Myth busted: Civilian receivers actually do have access to the L2 frequency. Army Space Journal Fall-Winter, 46--47. http://www.dtic.mil/dtic/tr/fulltext/u2/a538975.pdf.
[151]
Chris Wullems, Oscar Pozzobon, and Kurt Kubik. 2005. Signal authentication and integrity schemes for next generation global navigation satellite systems. In Proceedings of the European Navigation Conference (GNSS’05). 1--10.
[152]
Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, and David Basin. 2014. Short paper: Detection of GPS spoofing attacks in power grids. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, New York, NY, 99--104.
[153]
Sandra Zaragoza. 2013. Spoofing a Superyacht at Sea. Retrieved March 1, 2016, from http://www.utexas.edu/know/2013/07/30/spoofing-a-superyacht-at-sea/.
[154]
Zhenghao Zhang, Matthew Trinkle, Lijun Qian, and Husheng Li. 2012. Quickest detection of GPS spoofing attack. In Proceedings of the Military Communications Conference. IEEE, Los Alamitos, CA, 1--6.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 48, Issue 4
May 2016
605 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/2891449
  • Editor:
  • Sartaj Sahni
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2016
Accepted: 01 February 2016
Revised: 01 January 2016
Received: 01 November 2014
Published in CSUR Volume 48, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. GNSS
  2. Global navigation satellite system
  3. attacks
  4. constellation
  5. denial-of-service
  6. jamming
  7. navigation
  8. spoofing
  9. timing
  10. vulnerability

Qualifiers

  • Survey
  • Research
  • Refereed

Funding Sources

  • Practical Cyber Security for Next Generation Power Transmission Networks
  • Australian Research Council Linkage

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)315
  • Downloads (Last 6 weeks)47
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Time Synchronization Attack Protection Scheme Based on Three-Step Iterative FilterElectronics10.3390/electronics1402021814:2(218)Online publication date: 7-Jan-2025
  • (2025)Fast GNSS spoofing detection based on LSTM-detect modelGPS Solutions10.1007/s10291-025-01819-729:1Online publication date: 1-Jan-2025
  • (2025)A real-time GNSS time spoofing detection framework based on feature processingGPS Solutions10.1007/s10291-024-01802-829:1Online publication date: 1-Jan-2025
  • (2024)Wireless signal injection attacks on VSAT satellite modemsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699240(6075-6091)Online publication date: 14-Aug-2024
  • (2024)An Experimental Performance Assessment of Galileo OSNMASensors10.3390/s2402040424:2(404)Online publication date: 9-Jan-2024
  • (2024)Adaptive Resilience in Navigation: Multi-Spoofing Attacks Defence with Statistical Hypothesis Testing and Directional Receivers2024 27th International Conference on Information Fusion (FUSION)10.23919/FUSION59988.2024.10706399(1-8)Online publication date: 8-Jul-2024
  • (2024)SatPrint: Satellite Link FingerprintingProceedings of the 39th ACM/SIGAPP Symposium on Applied Computing10.1145/3605098.3636011(177-185)Online publication date: 8-Apr-2024
  • (2024)GNSS Signal Authentication Method Based on Power Monitoring and Early-late Phase Metric2024 39th Youth Academic Annual Conference of Chinese Association of Automation (YAC)10.1109/YAC63405.2024.10598740(259-265)Online publication date: 7-Jun-2024
  • (2024)Evaluation and Optimization of Positional Accuracy for Maritime Positioning Systems2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM60985.2024.00045(222-228)Online publication date: 4-Jun-2024
  • (2024)OFDM-BOC: A Broadband Multicarrier Navigation Modulation-Based BOC for Future GNSSIEEE Transactions on Vehicular Technology10.1109/TVT.2023.332825273:3(3964-3979)Online publication date: Mar-2024
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media