Burger menu

GPS-Spoofing Attacks and Countermeasures

There are several approaches for preventing GPS-spoofing attacks based on software, hardware, and hybrid solutions

What Is a GPS-Spoofing Attack?

The seamless takeover attack scenario on the GPS receivers

GPS-spoofing attack is a deliberate interference with the GPS signal with nefarious purposes. It is observed in two types:

  • Jamming. It implies signal transmissions that interfere with a GPS receiver to sabotage its work.
  • Spoofing. It involves transmission of a falsified signal, so a GPS system is forced to report a false geographical position and time.

GPS-spoofing is a tangible threat for multiple areas wherever the Global Navigation Satellite System (GNSS) can be involved: international logistics, air traffic, autonomous vehicles, national security, and so on.

Navstar 1, the first satellite of the GPS satellite group

Requirements for Successful GPS Spoofing Attacks

A GPS-signal simulator that can be used for spoofing attacks

GPS signal travels on the radio waves from the group of 31 satellites. As soon as it’s captured, the satellite signal is decoded into the binary format that a receiving device can understand.

GPS receiver’s work mechanism

Consequently, GPS signals can be tampered with, as wireless traffic can be intercepted, delayed, modified, relayed, and so on. For the civilian-grade hardware, a GPS-signal simulator — typically needed for testing the receiving devices — can be used to delay, accelerate, or modify the signal arbitrarily.    

The military-grade equipment is harder to spoof as it receives only valid GPS-signals. But with the help of broadband transceivers and high-gain directional antennas attackers can delay or boost/diminish the signal received by the military-grade gear.

Example of a GPS jamming device

Countermeasures for Preventing GPS-Spoofing Attacks

There are a number of methods that can prevent GPS-signal tampering.

  1. General Advices for Preventing GPS-Spoofing Attacks

Monitoring the overall strength of the GPS signal is one of the preventive techniques: in case it exceeds the expected signal’s strength manifold, it might indicate a spoofing attack. Other approaches include checking the strength of each separate satellite signal, time intervals between incoming signals, identification codes of the satellites, etc.

  1. General Methods for Preventing GPS-Spoofing Attacks
Factor graph structure in the LiDAR/GPS fusion

Among the preventive methods experts outline spatial correlation analysis based on the geometric distribution of a horizontal array of GPS antenna-receivers and the geometric configuration of visible navigation satellites, spoofing detection based on the geometry of a group of vehicles or vessels, plausibility confirmation of GPS signal localization, LiDAR and GPS integration enhanced with the factor graph-based state estimation framework for Chimera system that analyzes the GPS factor residuals, and others.

Multi-transmitter attack scenario
  1. Antennas and Receivers for Preventing GPS-Spoofing Attacks

A solution dubbed SPREE is claimed to be a spoofing-immune GPS receiver. It’s based on the Auxiliary Peak Tracking approach that allocates multiple channels to a single GPS satellite in order to receive both strong and weak signal correlations.

GPS-spoofing detection with the help of infrastructural units
  1. Using Software-Defined Radio for Preventing GPS-Spoofing Attacks

Software-based solutions focus on analyzing stages of a GPS receiver on the RF chain, providing cryptographic encryption of the satellite signal, monitoring correlation of the signals coming from a group of satellites, checking the angle-of-arrival and radio spectrum characteristics, and so on.

Structure of the GPS signal
  1. GPS-Spoofing Attack Detection Using Neural Networks

It is suggested to use a Multilayer Perceptron neural network (MLP) to prevent GPS attacks on power grids. The method employs the phasor measurement units (PMU) data, which flows into a decision block component that is capable of accurately locating GPS spoofing within the system.

  1. Fingerprinting of GPS Satellites
The algorithm of GPS signal fingerprinting and spoofing detection

Another method suggests that authentic GPS-signals should be protected with fingerprinting — a set of unique technical or other features that can be traced back to a certain satellite. The method is centered around the analysis of multivariate normal distribution, segmentation of GPS data, time complexity, and so on. What’s notable, a malicious actor cannot achieve perfect carrier-phase alignment while spoofing the signal.

  1. Infrastructure-Enabled GPS Spoofing Detection

The core idea of the proposal is the infrastructure-enabled defense (IED) of the GPS data. It’s based on the usage of the roadside GPS receiving units together with a detector that employs the Isolation Forest technique to detect anomalies in the GPS signal.

Try our AI Text Detector

Avatar Antispoofing

1 Followers

Editors at Antispoofing Wiki thoroughly review all featured materials before publishing to ensure accuracy and relevance.

Article contents

Hide

More from Philosophy of AI

avatar Antispoofing Joblessness in the AI Era

Will the Development of AI Lead to More Unemployed People? Emergence of the powerful Artificial Intelligence, capable of self-teaching, began…

avatar Antispoofing History of AI Picture Generators

When Did the First AI Image Generators Appear? The earliest known AI image generator can be dated back to 1973…

avatar Antispoofing History of GenAI and AI-Generated Content

When Did GenAI Appear? The foundation for GenAI was first laid with the introduction of the Markov chain (1906-13) —…

avatar Antispoofing The GenAI Race: Development of Generative AI in Different Countries

What Countries Are the Leaders in GenAI Development? Even though the early prototypes of GenAI emerged in the 1960s, little…