Spotr: GPS spoofing detection via device fingerprinting

As the world's predominant navigation system, GPS is critical to modern life, finding applications in diverse areas like information security, healthcare, marketing, and power and water grid management. Unfortunately this diversification has only served to underscore the insecurity of GPS and the critical need to harden this system against manipulation and exploitation. A wide variety of attacks against GPS have already been documented, both in academia and industry. Several defenses have been proposed to combat these attacks, but they are ultimately insufficient due to scope, expense, complexity, or robustness. With this in mind, we present our own solution: fingerprinting of GPS satellites. We assert that it is possible to create signatures, or fingerprints, of the satellites (more specifically their transmissions) that allow one to determine nearly instantly whether a received GPS transmission is authentic or not. Furthermore, in this paper we demonstrate that this solution detects all known spoofing attacks, that it does so while being fast, cheap, and simpler than previous solutions, and that it is highly robust with respect to environmental factors.

[1]  Todd E. Humphreys,et al.  An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing , 2011 .

[2]  Ahmed El-Rabbany,et al.  Temperature variation effects on stochastic characteristics for low-cost MEMS-based inertial sensor error , 2007 .

[3]  Peter Steigenberger,et al.  The Multi-GNSS Experiment (MGEX) of the International GNSS Service (IGS) - Achievements, prospects and challenges , 2017 .

[4]  Nils Ole Tippenhauer,et al.  Multi-receiver GPS spoofing detection: error models and realization , 2016, ACSAC.

[5]  Mani Mina,et al.  Physical-Layer Identification of Wired Ethernet Devices , 2012, IEEE Transactions on Information Forensics and Security.

[6]  Todd E. Humphreys,et al.  Practical cryptographic civil GPS signal authentication , 2011 .

[7]  Todd E. Humphreys,et al.  GNSS Spoofing and Detection , 2016, Proceedings of the IEEE.

[8]  Todd E. Humphreys,et al.  GPS Spoofing Detection via Dual-Receiver Correlation of Military Signals , 2013, IEEE Transactions on Aerospace and Electronic Systems.

[9]  Ming Li,et al.  SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks , 2019, ACSAC.

[10]  Horst Mehl,et al.  GPS – Global Positioning System , 1996, Informatik-Spektrum.

[11]  Todd E. Humphreys,et al.  Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer , 2009 .

[12]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[13]  Dennis M. Akos,et al.  Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) , 2012 .

[14]  Paul D. Groves,et al.  Principles of GNSS, Inertial, and Multi-sensor Integrated Navigation Systems , 2012 .

[15]  Gérard Lachapelle,et al.  Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver , 2015, GPS Solutions.

[16]  Srdjan Capkun,et al.  SPREE: a spoofing resistant GPS receiver , 2016, MobiCom.

[17]  P. Groves Principles of GNSS, Inertial, and Multi-Sensor Integrated Navigation Systems , 2007 .

[18]  Nasser M. Nasrabadi,et al.  Pattern Recognition and Machine Learning , 2006, Technometrics.

[19]  Todd E. Humphreys,et al.  The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques , 2012 .

[20]  Per K. Enge,et al.  Global positioning system: signals, measurements, and performance [Book Review] , 2002, IEEE Aerospace and Electronic Systems Magazine.

[21]  Dennis M. Akos,et al.  Automatic gain control (AGC) as an interference assessment tool , 2003 .

[22]  Siliang Wu,et al.  GNSS Jamming Mitigation Using Adaptive-Partitioned Subspace Projection Technique , 2019, IEEE Transactions on Aerospace and Electronic Systems.

[23]  Per Enge,et al.  Wide area augmentation of the Global Positioning System , 1996, Proc. IEEE.

[24]  T. Humphreys STATEMENT ON THE VULNERABILITY OF CIVIL UNMANNED AERIAL VEHICLES AND OTHER SYSTEMS TO CIVIL GPS , 2012 .

[25]  Srdjan Capkun,et al.  Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures , 2016, MobiCom.

[26]  Kroener Ulrich,et al.  Hardening of civilian GNSS trackers , 2010 .

[27]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[28]  Mani Mina,et al.  Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach , 2006, NDSS.

[29]  R.E. Ziemer,et al.  Digital and analog communication systems , 1981, Proceedings of the IEEE.

[30]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.

[31]  Srdjan Capkun,et al.  Attacks on physical-layer identification , 2010, WiSec '10.