On the requirements for successful GPS spoofing attacks

An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real ph...

ver descrição completa

Detalhes bibliográficos
Main Authors: Tippenhauer, N, Pöpper, C, Rasmussen, K, Capkun, S
Formato: Conference item
Publicado em: ACM 2011
_version_ 1826266279051264000
author Tippenhauer, N
Pöpper, C
Rasmussen, K
Capkun, S
author_facet Tippenhauer, N
Pöpper, C
Rasmussen, K
Capkun, S
author_sort Tippenhauer, N
collection OXFORD
description An increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations. In this paper, we investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. In particular, we are interested in identifying from which locations and with which precision the attacker needs to generate its signals in order to successfully spoof the receivers. We will show, for example, that any number of receivers can easily be spoofed to one arbitrary location; however, the attacker is restricted to only few transmission locations when spoofing a group of receivers while preserving their constellation. In addition, we investigate the practical aspects of a satellite-lock takeover, in which a victim receives spoofed signals after first being locked on to legitimate GPS signals. Using a civilian GPS signal generator, we perform a set of experiments and find the minimal precision of the attacker's spoofing signals required for covert satellite-lock takeover.
first_indexed 2024-03-06T20:36:29Z
format Conference item
id oxford-uuid:32ceadd4-cade-4f62-b75f-30d394f4bfc8
institution University of Oxford
last_indexed 2024-03-06T20:36:29Z
publishDate 2011
publisher ACM
record_format dspace
spelling oxford-uuid:32ceadd4-cade-4f62-b75f-30d394f4bfc82022-03-26T13:16:21ZOn the requirements for successful GPS spoofing attacksConference itemhttp://purl.org/coar/resource_type/c_5794uuid:32ceadd4-cade-4f62-b75f-30d394f4bfc8Department of Computer ScienceACM2011Tippenhauer, NPöpper, CRasmussen, KCapkun, SAn increasing number of wireless applications rely on GPS signals for localization, navigation, and time synchronization. However, civilian GPS signals are known to be susceptible to spoofing attacks which make GPS receivers in range believe that they reside at locations different than their real physical locations. In this paper, we investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. In particular, we are interested in identifying from which locations and with which precision the attacker needs to generate its signals in order to successfully spoof the receivers. We will show, for example, that any number of receivers can easily be spoofed to one arbitrary location; however, the attacker is restricted to only few transmission locations when spoofing a group of receivers while preserving their constellation. In addition, we investigate the practical aspects of a satellite-lock takeover, in which a victim receives spoofed signals after first being locked on to legitimate GPS signals. Using a civilian GPS signal generator, we perform a set of experiments and find the minimal precision of the attacker's spoofing signals required for covert satellite-lock takeover.
spellingShingle Tippenhauer, N
Pöpper, C
Rasmussen, K
Capkun, S
On the requirements for successful GPS spoofing attacks
title On the requirements for successful GPS spoofing attacks
title_full On the requirements for successful GPS spoofing attacks
title_fullStr On the requirements for successful GPS spoofing attacks
title_full_unstemmed On the requirements for successful GPS spoofing attacks
title_short On the requirements for successful GPS spoofing attacks
title_sort on the requirements for successful gps spoofing attacks
work_keys_str_mv AT tippenhauern ontherequirementsforsuccessfulgpsspoofingattacks
AT popperc ontherequirementsforsuccessfulgpsspoofingattacks
AT rasmussenk ontherequirementsforsuccessfulgpsspoofingattacks
AT capkuns ontherequirementsforsuccessfulgpsspoofingattacks