Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3551661.3561365acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers

Published: 24 October 2022 Publication History

Abstract

The vulnerability of the Global Positioning System (GPS) against spoofing is known for quite some time. Also, the positioning and navigation of most semi-autonomous and autonomous drones are dependent on Global Navigation Satellite System (GNSS) signals. In prior work, simplistic or asynchronous GPS spoofing was found to be a simple, efficient, and effective cyber attack against L1 GPS or GNSS dependent commercial drones. In this paper, first we make some important observations on asynchronous GPS spoofing attacks on drones presented in prior research literature. Then, we design an asynchronous GPS spoofing attack plan. Next, we test the effectiveness of this attack against GNSS receivers (high volume consumer devices based on Android mobile phones) of different capabilities and a commercial drone (DJI Mavic 2 Pro) under various conditions. Finally, we present several novel insights based on the results of the tests.

References

[1]
Abdul Aabid, Bisma Parveez, Nagma Parveen, Sher Afghan Khan, and Md Abdul. 2022. Reviews on Design and Development of Unmanned Aerial Vehicle (Drone) for Different Applications. J. Mech. Eng. Res. Dev, Vol. 45, 2 (2022), 53--69.
[2]
Sandra Pérez Arteaga, Luis Alberto Mart'inez Hernández, Gabriel Sánchez Pérez, Ana Lucila Sandoval Orozco, and Luis Javier Garc'ia Villalba. 2019. Analysis of the GPS spoofing vulnerability in the drone 3DR solo. IEEE Access, Vol. 7 (2019), 51782--51789.
[3]
Sean Barbeau and Mike Lockwood. 2021. GPSTest android application. https://github.com/barbeau/gpstest
[4]
Juan Blanch, Todd Walter, and Per Enge. 2012. Satellite Navigation for aviation in 2025. Proc. IEEE, Vol. 100, Special Centennial Issue (2012), 1821--1830.
[5]
M.J. Boyle. 2020. The Drone Age: How Drone Technology Will Change War and Peace. Oxford University Press, Incorporated, UK. 2019047301 https://books.google.co.in/books?id=6wbcDwAAQBAJ
[6]
cddis.nasa.gov. 2022. Broadcast Ephemeris DataFile. https://cddis.nasa.gov/Data$_$and$_$Derived$_$Products/GNSS/broadcast $_$ephemeris $_$data.html
[7]
Vishal Dey, Vikramkumar Pudi, Anupam Chattopadhyay, and Yuval Elovici. 2018. Security Vulnerabilities of Unmanned Aerial Vehicles and Countermeasures: An Experimental Study. In 2018 31st International Conference on VLSI Design and 2018 17th International Conference on Embedded Systems (VLSID). IEEE, Pune, India, 398--403. https://doi.org/10.1109/VLSID.2018.97
[8]
Takuji Ebinuma. 2018. GPS-SDR-SIM. https://github.com/osqzss/gps-sdr-sim
[9]
EUSPA. 2020. GNSS User Technology Report 2020. https://www.euspa.europa.eu/european-space/euspace-market/gnss-market/gnss-user-technology-report
[10]
EUSPA. 2022. EUSPA EO and GNSS Market report 2022. https://www.euspa.europa.eu/2022-market-report
[11]
Sven Fischer. 2014. Observed time difference of arrival (OTDOA) positioning in 3GPP LTE. Qualcomm White Pap, Vol. 1, 1 (2014), 1--62.
[12]
Joshua Gordon, Victoria Kraj, Ji Hun Hwang, and Ashok Raja. 2019. A security assessment for consumer wifi drones. In 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, IEEE, Orlando, FL, USA, 1--5.
[13]
Kim Hartmann and Christoph Steup. 2013. The vulnerability of UAVs to cyber attacks-An approach to the risk assessment. In 2013 5th international conference on cyber conflict (CYCON 2013). IEEE, IEEE, Tallinn, Estonia, 1--23.
[14]
ME Hathaway. 2014. MELISSA E. HATHAWAYa and JOHNN. STEWARTb aCouncil of Experts, Global Cyber Security Center (GCSEC). Best Practices in Computer Network Defense: Incident Detection and Response, Vol. 35 (2014), 130.
[15]
Daojing He, Yinrong Qiao, Shiqing Chen, Xiao Du, Wenjie Chen, Sencun Zhu, and Mohsen Guizani. 2018. A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles. IEEE Network, Vol. 33, 2 (2018), 146--151.
[16]
Eric Horton and Prakash Ranganathan. 2018. Development of a GPS spoofing apparatus to attack a DJI Matrice 100 Quadcopter. The Journal of Global Positioning Systems, Vol. 16, 1 (2018), 1--11.
[17]
Ling Huang and Qing Yang. 2015. Low-cost GPS simulator GPS spoofing by SDR. In Proc. DEFCON. DEFCON23, Las Vegas, Nevada.
[18]
Todd E Humphreys, Brent M Ledvina, Mark L Psiaki, Brady W O'Hanlon, Paul M Kintner, et al. 2008. Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2008). Proceedings of the 21st International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2008), Savannah, GA, 2314--2325.
[19]
Divya Joshi. 2019. Drone technology uses and applications for commercial, industrial and military drones in 2020 and the future. Business Insider, Vol. Dec (2019).
[20]
A Karunakaran. 2022. Swarm Drones and Indian Academia. Journal of Defence Studies, Vol. 16, 1 (2022), 73--81.
[21]
Shah Zahid Khan, Mujahid Mohsin, and Waseem Iqbal. 2021. On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions. PeerJ Computer Science, Vol. 7 (2021), e507.
[22]
CG Leela Krishna and Robin R Murphy. 2017. A review on cybersecurity vulnerabilities for unmanned aerial vehicles. In 2017 IEEE International Symposium on Safety, Security and Rescue Robotics (SSRR). IEEE, IEEE, Shanghai, China, 194--199.
[23]
Mamidala Jagadesh Kumar. 2021. The sky is not the limit: The new rules give wings to the Drone Technology in India., 463--464 pages.
[24]
Labsat. 2021. SatGen GNSS Signal Simulation Software. https://www.labsat.co.uk/index.php/en/products/satgen-simulator-software
[25]
Marco Lisi. 2020. GNSS User Technology Report 2020. GEOmedia, Vol. 24, 5 (2020).
[26]
Jules G McNeff. 2002. The global positioning system. IEEE Transactions on Microwave theory and techniques, Vol. 50, 3 (2002), 645--652.
[27]
P. Misra and P. Enge. 2011. Global Positioning System: Signals, Measurements, and Performance. Ganga-Jamuna Press, Lincoln, MA. https://books.google.co.in/books?id=5WJOywAACAAJ
[28]
Juhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, and Yongdae Kim. 2019. Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing. ACM Transactions on Privacy and Security (TOPS), Vol. 22, 2 (2019), 1--26.
[29]
Orolia. 2021. Skydel BroadSim GNSS Simulation Platform. https://www.orolia.com/document/broadsim-datasheet/
[30]
Qualcomm.com. 2022. Snapdragon 636 specifications. https://www.qualcomm.com/products/application/smartphones/snapdragon-6-series-mobile-platforms/snapdragon-636-mobile-platform-Overview
[31]
Akmal Rustamov, Neil Gogoi, Alex Minetto, and Fabio Dovis. 2020. Assessment of the vulnerability to spoofing attacks of gnss receivers integrated in consumer devices. In 2020 international conference on localization and gnss (icl-gnss). IEEE, IEEE, Tampere, Finland, 1--6.
[32]
Jabang Aru Saputro, Esa Egistian Hartadi, and Mohamad Syahral. 2020. Implementation of GPS Attacks on DJI Phantom 3 Standard Drone as a Security Vulnerability Test. In 2020 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering (ICITAMEE). IEEE, IEEE, Yogyakarta, Indonesia, 95--100.
[33]
Dinesh Sathyamoorthy, Z Fitry, Esa Selamat, S Hassan, Ahmad Firdaus, and Z Zaimy. 2020. Evaluation of the vulnerabilities of unmanned aerial vehicles (UAVs) to global positioning system (GPS) jamming and spoofing. Defence S and T Technical Bulletin, Vol. 13 (2020), 333--343.
[34]
Daniel P Shepard, Jahshan A Bhatti, and Todd E Humphreys. 2012. Drone hack: Spoofing attack demonstration on a civilian unmanned aerial vehicle.(2012). Google Scholar (2012).
[35]
Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. 2011. On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security. Association for Computing Machinery, New York, NY, United States, 75--86.
[36]
Burak Tufekci and Cihan Tunc. 2021. Vulnerability and Threat Analysis of UAVs. In 2021 IEEE/ACS 18th International Conference on Computer Systems and Applications (AICCSA). IEEE, IEEE, Tangier, Morocco, 1--2.
[37]
Wikipedia contributors. 2022. GPS signals -- Wikipedia, The Free Encyclopedia. https://en.wikipedia.org/w/index.php?title=GPS_signals&oldid=1091064831 [Online; accessed 3-June-2022].
[38]
Jean-Paul Yaacoub, Hassan Noura, Ola Salman, and Ali Chehab. 2020. Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, Vol. 11 (2020), 100218.
[39]
Xian-Chun Zheng and Hung-Min Sun. 2020. Hijacking unmanned aerial vehicle by exploiting civil GPS vulnerabilities using software-defined radio. Sensors and Materials, Vol. 32, 8 (2020), 2729--2743.
[40]
Jasmine Zidan, Elijah I Adegoke, Erik Kampert, Stewart A Birrell, Col R Ford, and Matthew D Higgins. 2020. GNSS vulnerabilities and existing solutions: A review of the literature. IEEE Access, Vol. 9 (2020), 153960--153976.

Cited By

View all
  • (2023)Security and privacy risks in drone-based last mile deliveryEuropean Journal of Information Systems10.1080/0960085X.2023.2214744(1-14)Online publication date: 17-May-2023
  • (2022)Identification of GPS Spoofing as a Drone Cyber-vulnerability and Evaluation of Efficacy of Asynchronous GPS spoofingIFAC-PapersOnLine10.1016/j.ifacol.2023.03.06655:22(394-399)Online publication date: 2022

Index Terms

  1. Efficacy of Asynchronous GPS Spoofing Against High Volume Consumer GNSS Receivers

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    Q2SWinet '22: Proceedings of the 18th ACM International Symposium on QoS and Security for Wireless and Mobile Networks
    October 2022
    145 pages
    ISBN:9781450394819
    DOI:10.1145/3551661
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 October 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. GNSS receiver
    2. GPS spoofing
    3. asynchronous
    4. attack plan
    5. vulnerability

    Qualifiers

    • Research-article

    Funding Sources

    • IRCC, IIT Bombay

    Conference

    MSWiM '22
    Sponsor:

    Acceptance Rates

    Q2SWinet '22 Paper Acceptance Rate 16 of 47 submissions, 34%;
    Overall Acceptance Rate 46 of 131 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)28
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Security and privacy risks in drone-based last mile deliveryEuropean Journal of Information Systems10.1080/0960085X.2023.2214744(1-14)Online publication date: 17-May-2023
    • (2022)Identification of GPS Spoofing as a Drone Cyber-vulnerability and Evaluation of Efficacy of Asynchronous GPS spoofingIFAC-PapersOnLine10.1016/j.ifacol.2023.03.06655:22(394-399)Online publication date: 2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media