Detecting GNSS Jamming and Spoofing on Android Devices

Global navigation satellite system (GNSS) location engines on Android devices provide location and navigation utility to billions of people worldwide. However, these location engines currently have very limited protection from threats to their position, navigation, and time (PNT) solutions. External...

Full description

Bibliographic Details
Main Authors: Nicholas Spens, Dong-Kyeong Lee, Filip Nedelkov, Dennis Akos
Format: Article
Language:English
Published: Institute of Navigation 2022-08-01
Series:Navigation
Online Access:https://navi.ion.org/content/69/3/navi.537
_version_ 1797393364102938624
author Nicholas Spens
Dong-Kyeong Lee
Filip Nedelkov
Dennis Akos
author_facet Nicholas Spens
Dong-Kyeong Lee
Filip Nedelkov
Dennis Akos
author_sort Nicholas Spens
collection DOAJ
description Global navigation satellite system (GNSS) location engines on Android devices provide location and navigation utility to billions of people worldwide. However, these location engines currently have very limited protection from threats to their position, navigation, and time (PNT) solutions. External sources of radio frequency interference (RFI) can render PNT information unusable. Even worse, false signals or spoofing can provide a false PNT solution to Android devices. To mitigate this, four detection methods were developed and evaluated using native location parameters within Android: Comparing the GNSS and network locations, checking the Android mock location flag, comparing the GNSS and Android system times, and observing the automatic gain control (AGC) and carrier-to-noise density (C/N0) signal metrics. These methods provide a powerful means to significantly increase the robustness of the Android GNSS-based PNT solution and are implemented in the GNSSAlarm Android application to demonstrate real-time jamming and spoofing detection.
first_indexed 2024-03-09T00:01:19Z
format Article
id doaj.art-d2d25e260798443fa53a179261735ffc
institution Directory Open Access Journal
issn 2161-4296
language English
last_indexed 2024-03-09T00:01:19Z
publishDate 2022-08-01
publisher Institute of Navigation
record_format Article
series Navigation
spelling doaj.art-d2d25e260798443fa53a179261735ffc2023-12-12T17:44:12ZengInstitute of NavigationNavigation2161-42962022-08-0169310.33012/navi.537navi.537Detecting GNSS Jamming and Spoofing on Android DevicesNicholas SpensDong-Kyeong LeeFilip NedelkovDennis AkosGlobal navigation satellite system (GNSS) location engines on Android devices provide location and navigation utility to billions of people worldwide. However, these location engines currently have very limited protection from threats to their position, navigation, and time (PNT) solutions. External sources of radio frequency interference (RFI) can render PNT information unusable. Even worse, false signals or spoofing can provide a false PNT solution to Android devices. To mitigate this, four detection methods were developed and evaluated using native location parameters within Android: Comparing the GNSS and network locations, checking the Android mock location flag, comparing the GNSS and Android system times, and observing the automatic gain control (AGC) and carrier-to-noise density (C/N0) signal metrics. These methods provide a powerful means to significantly increase the robustness of the Android GNSS-based PNT solution and are implemented in the GNSSAlarm Android application to demonstrate real-time jamming and spoofing detection.https://navi.ion.org/content/69/3/navi.537
spellingShingle Nicholas Spens
Dong-Kyeong Lee
Filip Nedelkov
Dennis Akos
Detecting GNSS Jamming and Spoofing on Android Devices
Navigation
title Detecting GNSS Jamming and Spoofing on Android Devices
title_full Detecting GNSS Jamming and Spoofing on Android Devices
title_fullStr Detecting GNSS Jamming and Spoofing on Android Devices
title_full_unstemmed Detecting GNSS Jamming and Spoofing on Android Devices
title_short Detecting GNSS Jamming and Spoofing on Android Devices
title_sort detecting gnss jamming and spoofing on android devices
url https://navi.ion.org/content/69/3/navi.537
work_keys_str_mv AT nicholasspens detectinggnssjammingandspoofingonandroiddevices
AT dongkyeonglee detectinggnssjammingandspoofingonandroiddevices
AT filipnedelkov detectinggnssjammingandspoofingonandroiddevices
AT dennisakos detectinggnssjammingandspoofingonandroiddevices