Vulnerability Analysis of GPS Receiver Software

G. Gonzalez, I. Petrunin, R. Zbikowski, K. Voutsis, R. V. Moreno
{"title":"Vulnerability Analysis of GPS Receiver Software","authors":"G. Gonzalez, I. Petrunin, R. Zbikowski, K. Voutsis, R. V. Moreno","doi":"10.1109/ICL-GNSS.2019.8752862","DOIUrl":null,"url":null,"abstract":"Satellite navigation systems such as the Global Positioning System (GPS)makes it possible for users to find their relative or absolute position. Thanks to its mobility and reliability, the GPS is used in many civil and military applications. However, the GPS does not provide an advanced level of security. Therefore, it could be potentially a target of attacks. With the development of new GPS attacks, the security knowledge has to grow at the same rate, so existing attacks can be detected by updated versions of receiver software or hardware. In this paper, a comparative analysis of GPS receiver resilience to software attacks is performed with the help of GNSS simulator from Spirent. The main objective of this work is to perform a sensitivity analysis of variables involved in calculation of position of the GPS receivers from different price bands that might be targeted by existing or future GPS attack. Variables making the biggest impact on calculated position are determined using the model. Experimentation validation of their influence is performed using selected receivers and corrupted signals generated by GNSS simulator. The testing is based on tuning the selected variables in order to simulate the theoretical error obtained from the sensitivity analysis. The results obtained from testing are discussed in order to analyse the behaviour of the considered GNSS receivers (including the premium class ones)and establish whether they provide a protection from existing or potential GPS attacks.","PeriodicalId":119581,"journal":{"name":"2019 International Conference on Localization and GNSS (ICL-GNSS)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Localization and GNSS (ICL-GNSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICL-GNSS.2019.8752862","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Satellite navigation systems such as the Global Positioning System (GPS)makes it possible for users to find their relative or absolute position. Thanks to its mobility and reliability, the GPS is used in many civil and military applications. However, the GPS does not provide an advanced level of security. Therefore, it could be potentially a target of attacks. With the development of new GPS attacks, the security knowledge has to grow at the same rate, so existing attacks can be detected by updated versions of receiver software or hardware. In this paper, a comparative analysis of GPS receiver resilience to software attacks is performed with the help of GNSS simulator from Spirent. The main objective of this work is to perform a sensitivity analysis of variables involved in calculation of position of the GPS receivers from different price bands that might be targeted by existing or future GPS attack. Variables making the biggest impact on calculated position are determined using the model. Experimentation validation of their influence is performed using selected receivers and corrupted signals generated by GNSS simulator. The testing is based on tuning the selected variables in order to simulate the theoretical error obtained from the sensitivity analysis. The results obtained from testing are discussed in order to analyse the behaviour of the considered GNSS receivers (including the premium class ones)and establish whether they provide a protection from existing or potential GPS attacks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
GPS接收机软件漏洞分析
诸如全球定位系统(GPS)之类的卫星导航系统使用户能够找到他们的相对或绝对位置。由于其机动性和可靠性,GPS在许多民用和军事应用中得到了应用。然而,GPS并不提供高级别的安全性。因此,它可能成为潜在的攻击目标。随着新的GPS攻击的发展,安全知识必须以同样的速度增长,因此可以通过更新版本的接收器软件或硬件来检测现有的攻击。本文利用思博伦公司的GNSS模拟器,对GPS接收机抵御软件攻击的能力进行了对比分析。这项工作的主要目的是对可能被现有或未来GPS攻击的不同价格波段的GPS接收器的位置计算所涉及的变量进行敏感性分析。利用该模型确定对计算位置影响最大的变量。利用选定的接收机和GNSS模拟器产生的损坏信号,对其影响进行了实验验证。测试是基于调整所选变量,以模拟从灵敏度分析得到的理论误差。本文将讨论从测试中获得的结果,以分析所考虑的GNSS接收器(包括高级接收器)的行为,并确定它们是否提供了对现有或潜在GPS攻击的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data from GNSS-Based Passive Radar to Support Flood Monitoring Operations Discrete Positioning Using UWB Channel Impulse Responses and Machine Learning On the Effective Length of Channel Impulse Responses in UWB Single Anchor Localization V2X based Probabilistic Cooperative Position Estimation Applying GNSS Double Differences Blind Spoofing Detection Using a Multi-Antenna Snapshot Receiver
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1