Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation

When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (SPE) that can be used to calculate the tracking point of the delay lock loop (DLL) at regular chip intervals for the entire spoofing process. The condition for a successful spoofing signal is analyzed using the SPE. To derive the SPE, parameters, such as the signal strength, sweep velocity, loop filter order, and DLL bandwidth are considered. The success or failure of a spoofing attack is determined for a specific spoofing signal using the SPE. In addition, a correlation between each parameter for a successful spoofing attack could be obtained through the SPE. The simulation results show that the SPE performance is largely consistent with that of general DLL methods, even though the computational load of SPE is very low.

[1]  Mingquan Lu,et al.  GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation , 2017, Sensors.

[2]  Beatrice Motella,et al.  Detection of spoofed GPS signals at code and carrier tracking level , 2010, 2010 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC).

[3]  Todd E. Humphreys,et al.  Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle , 2012 .

[4]  Kang Wang Time and Position Spoofing with Open Source Projects , 2015 .

[5]  Todd E. Humphreys,et al.  Hostile Control of Ships via False GPS Signals: Demonstration and Detection , 2017 .

[6]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[7]  Fabio Dovis,et al.  On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection , 2016, Sensors.

[8]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[9]  Saeed Daneshmand,et al.  A Low-Complexity GPS Anti-Spoofing Method Using a Multi-Antenna Array , 2012 .

[10]  Ke Liu,et al.  Spoofing Detection Algorithm Based on Pseudorange Differences , 2018, Sensors.

[11]  Gérard Lachapelle,et al.  GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques , 2012 .

[12]  Gérard Lachapelle,et al.  Implementation of a Software GPS Receiver , 2004 .

[13]  T. Humphreys,et al.  Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer , 2008 .

[14]  Todd E. Humphreys,et al.  GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[15]  Gérard Lachapelle,et al.  Spoofing Detection Using GNSS/INS/Odometer Coupling for Vehicular Navigation , 2018, Sensors.

[16]  Grace Xingxin Gao,et al.  Mitigating jamming and meaconing attacks using direct GPS positioning , 2016, 2016 IEEE/ION Position, Location and Navigation Symposium (PLANS).

[17]  Yansui Liu,et al.  Physical Capital, Human Capital, and Social Capital: The Changing Roles in China’s Economic Growth , 2015 .

[18]  Hui Hu,et al.  A study of GPS jamming and anti-jamming , 2009, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS).

[19]  Todd E. Humphreys,et al.  GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.

[20]  Mohammad Reza Mosavi,et al.  Detection of Spoofing Attack using Machine Learning based on Multi-Layer Neural Network in Single-Frequency GPS Receivers , 2017, Journal of Navigation.