Gps PDF
Gps PDF
Gps PDF
ABSTRACT kle monitors, and aviation controls trust the correct monitoring of
An increasing number of wireless applications rely on GPS signals airplane traffic.
for localization, navigation, and time synchronization. However, This heavy reliance on civilian GPSfollowing the discontinu-
civilian GPS signals are known to be susceptible to spoofing at- ation of the selective availability feature of GPS in the year 2000
tacks which make GPS receivers in range believe that they reside motivated a number of investigations on the security of GPS. These
at locations different than their real physical locations. In this pa- investigations found that civilian GPS is susceptible to jamming
per, we investigate the requirements for successful GPS spoofing and spoofing attacks [9, 11, 16, 19]. Successful spoofing experi-
attacks on individuals and groups of victims with civilian or mili- ments on standard receivers have been reported [7, 23], showing
tary GPS receivers. In particular, we are interested in identifying that commercial-off-the-shelf receivers do not detect such attacks.
from which locations and with which precision the attacker needs The increased availability of programmable radio platforms such as
to generate its signals in order to successfully spoof the receivers. USRPs [5] leads to a reduced cost of attacks on GPS. However, the
We will show, for example, that any number of receivers can requirements for GPS spoofing were so far not analyzed systemati-
easily be spoofed to one arbitrary location; however, the attacker is cally and many of the previously proposed countermeasures [8, 16]
restricted to only few transmission locations when spoofing a group assume a weak attacker that is, e. g., not able to generate signals
of receivers while preserving their constellation. with sufficient precision.
In addition, we investigate the practical aspects of a satellite- In this work, we investigate spoofing attacks on civilian and mil-
lock takeover, in which a victim receives spoofed signals after first itary GPS and analyze the requirements for their success as well as
being locked on to legitimate GPS signals. Using a civilian GPS their limitations in practice. We divide the problem of GPS spoof-
signal generator, we perform a set of experiments and find the min- ing into the following two problems: (i) sending the correct spoof-
imal precision of the attackers spoofing signals required for covert ing signals such that they reach the receiver with the right timing,
satellite-lock takeover. and (ii) getting a victim that is already synchronized to the legiti-
mate GPS service to lock onto the attackers spoofing signal. Re-
garding the first problem, we analyze the effects of GPS spoofing
1. INTRODUCTION signals on multiple receivers and analyze under which conditions a
The Global Positioning System (GPS), originally introduced by group of victims can be spoofed such that, e. g., their mutual dis-
the US military, has become an essential component for numerous tances are preserved. Our analysis shows that, in order to spoof a
civilian applications. Unlike military GPS signals, civilian GPS group of victims while preserving the mutual distances, the attacker
signals are not encrypted or authenticated and were never intended can only transmit from a restricted set of locations. To the best of
for safety- and security-critical applications. Nevertheless, GPS- our knowledge, such an analysis has not been done before. The
provided locations are being used in applications such as vehic- second problem of taking over the satellite lock is relevant for per-
ular navigation and aviation, asset monitoring (e. g., cargo track- forming attacks in real-world situations. In most cases, the victim
ing), and location-based services (e. g., routing) [22]. The use of will have been receiving legitimate GPS signals when the spoofing
the GPS system also includes time synchronization; examples are attack starts. It is thus important to know the required precision
time stamping in security videos and critical time synchronization of the spoofing signal such that the victim seamlessly (i. e., with-
in financial, telecommunications and computer networks. Users out detection) switches lock from the legitimate GPS signal to the
highly rely on the precision and correctness of GPS location and attackers spoofing signal. We explore the influence of imperfec-
time: transport companies depend on the correctness of localiza- tions (in different aspects of signal power and timing) in a series of
tion to track trucks, cargoes, and goods under GPS surveillance, experiments and discuss the findings.
courts rely on criminals being correctly tracked by GPS-based an- In short, our main contributions are as follows: First, we define
the GPS group spoofing problem. Second, we analyze spoofing at-
tacks on single and multiple receivers in civilian and military GPS
systems and we infer theoretical bounds on the conditions for their
success. Third, using a GPS signal generator1 , we investigate the
Permission to make digital or hard copies of all or part of this work for requirements for civilian GPS spoofing by seamless satellite-lock
personal or classroom use is granted without fee provided that copies are takeover under varying power, timing, and location precision of the
not made or distributed for profit or commercial advantage and that copies attackers spoofing signals and we provide bounds on these param-
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific 1
permission and/or a fee. Satellite signal generators are also called satellite simulatorswe
Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$10.00. use both notations in this paper.
1
eters for the receiver used in our experiments.
The structure of the paper is as follows. We give background
information on GPS positioning and discuss related work on GPS
spoofing in Section 2. We introduce the GPS spoofing problem
and our system and attacker models in Section 3. In Section 4,
we analyze under which conditions GPS spoofing attacks are suc-
cessful on single victims and groups of victims. The results of our
experimental evaluation are presented in Section 5. In Section 6,
we introduce a novel countermeasure against GPS spoofing attacks
which is based on multiple receivers. We conclude the paper in
Section 7. Figure 1: A GPS receiver V works by observing the signals
from a set of satellites. The relative delays of the signals si (t)
can be used to solve four equations which determine the 3-
2. BACKGROUND dimensional position L and the time offset of the receiver V .
In this section, we introduce the fundamental concepts of GPS
(based on [11]) which are necessary for this work. We also sum-
marize related work on the security of GPS. The clock offset adds a fourth unknown scalar. With pseudo-
range measurements to at least four transmitters Si , the resulting
2.1 The Global Positioning System system of equations (4) can be solved for both L and , providing
The Global Positioning System (GPS) uses a number of satel- both the exact position and time, without requiring a precise local
lite transmitters Si located at known locations LS 3
i R . Each clock. Given LS S S S
i = (xi , yi , zi ), L = (x, y, z), and = c , we
transmitter is equipped with a synchronized clock with no clock can transform (4) into the following set of equations [1]:
offset to the exact system time tS and broadcasts a carefully cho-
sen navigation signal si (t) (low auto-/cross-correlation2 , including (x xS 2 S 2 S 2
i ) + (y yi ) + (z zi ) = (Ri )
2
Si (5)
timestamps and information on the satellites deviation from the
Geometrically, given a , each Si s equation translates into a sphere
predicted trajectories). The signal propagates with speed c (see
with LSi being the center. The set of equations (5) is overdeter-
Figure 1).
mined for more than four satellites and generally does not have a
A receiver V located at the coordinates L R3 (to be deter-
unique solution for L because of data noise. It can be solved by nu-
mined) and using an omnidirectional antenna will receive the com-
merical methods such as a least-mean-square approach or Newtons
bined signal of all satellites in range:
method [1].
|LS L|
X
g(L, t) = A i si t i + n(L, t) (1) 2.2 Related Work
i
c
In 2001, the Volpe report [8] identified that (malicious) interfer-
where Ai is the attenuation that the signal suffers on its way from ence with the civilian GPS signal is a serious problem. Starting
LS S
i to L, |Li L| denotes the Euclidean distance between Li and
S
with this report, practical spoofing attacks were discussed in sev-
L, and n(L, t) is background noise. eral publications. In [23], the authors use a WelNavigate GS720
Due to the properties of the signals si (t), the receiver can sepa- satellite simulator mounted in a truck to attack a target receiver in
rate the individual terms of this sum and extract the relative spread- a second truck. The authors succeeded in taking over the victims
ing code phase, satellite ID, and data content using a replica of the satellite lock by manually placing an antenna close to the victims
used spreading code. Given the data and relative phase offsets, the receiver. After the victim was locked onto the attackers signal
receiver can identify the time delay |LS i L|/c for each satellite the spoofing signal could be sent from a larger distance. Instead
and from that infer the ranges of using a GPS simulator, the authors of [7] create GPS spoofing
signals by decoding legitimate GPS signals and generating time-
di = |LS
i L|. (2) shifted copies which are then transmitted with higher energy to
overshadow the original signals; a similar approach is also used
With three known ranges di to known transmitter positions LS i ,
in [14]. This approach requires less expensive equipment but intro-
three equations (2) can be solved unambiguously for L (unless all
duces considerable delays between the legitimate and the spoofed
three Si are located on a line). Since highly stable clocks (e. g.,
signals. GPS spoofing attacks are discussed analytically in [11],
cesium oscillators) are costly and GPS receivers cannot participate
showing that an attacker can manipulate the arrival times of mil-
in two-way clock synchronization, in practice, V will have a clock
itary and civilian GPS signals by pulse-delaying or replaying (in-
offset to the exact system time: t = tS + . With this, Eq. 1 can
dividual) navigation signals with a delay. We note that there is no
be rewritten:
unique attacker model used for spoofing attacks, and thus the as-
X di
sumptions on the attackers capabilities vary between these works.
g(L, tS ) = A i si t + n(L, tS ) (3)
i
c Given the lack of attacker models, the proposed countermeasures
range from simple measures to constant monitoring of the channel.
where the receiver can only infer the pseudoranges Ri from the In [8], consistency checks based on inertial sensors, cryptographic
delays di /c + : authentication, and discrimination based on signal strength, time-
of-arrival, polarization, and angle-of-arrival are proposed. The au-
Ri = di + c . (4) thors of [16, 17, 24] propose countermeasures based on detecting
the side effects of a (not seamless) hostile satellite-lock takeover,
2
In civilian GPS, the signals are spread using publicly known e. g., by monitoring the local clock and Doppler shift of the sig-
spreading codes. The codes used for military GPS are kept secret; nals. Kuhn proposes an asymmetric scheme in [11], based on the
they serve for signal hiding and authentication. delayed disclosure of the spreading code and timing information.
2
Si i-th satellite Ai i-th attacker unit
LSi coordinates of Si PiA physical coordinates of Ai
si signal sent by Si LA i claimed coordinates of Ai
Vj j-th victim (receiver) sAi signal sent by Ai
Lj GPS coordinates of Vj iA time offset of sA
i
Lj spoofed coordinates of Vj j GPS clock offset of Vj
Pj physical coordinates of Vj j spoofed clock offset of Vj
Rij Vj s calculated PR to Si c signal propagation speed
RijA
Vj s spoofed PR (by Ai ) j = j c
Figure 2: Basic attack scenario. (a) Visualization of the setup. e. g. the one reported in [23]. In this scenario, a cargo truck (the
The victim uses a GPS-based localization system and is syn- victim), had a GPS unit that was housed in a tamper-proof cas-
chronized to the legitimate satellites. (b) Abstract representa- ing and was sending cryptographically authenticated status updates
tion of the scene. (c) The attacker starts sending own spoofing with a fixed rate to a monitoring center. The attacker planned to
and jamming signals. (d) The victim synchronizes to the at- steal the truck to get access to its loaded goods at a remote place.
tackers signals. He got close to the victim and started transmitting forged (spoofed)
signals in order to modify the location computed by the receiver
(see Figure 2). In this setting, if the attacker can influence the lo-
In general, countermeasures that rely on modifications of the GPS calization process, he can make the victim report positions to the
satellite signals or the infrastructure (such as [11] and certain pro- monitoring center that are unrelated to its actual physical position
posals in [8]) are unlikely to be implemented in the near future due and thus steal the truck without raising suspicion or revealing the
to long procurement and deployment cycles. At the same time, trucks real location.
countermeasures based on lock interrupts or signal jumps do not
detect seamless satellite-lock takeovers. 3.2 System Model
Few publications [3, 1214] present experimental data on the ef- Our system consists of a set of legitimate GPS satellites and a
fects seen by the victim during a spoofing attack. The authors set V of victims (see Table 1 for notations used). Each victim is
of [13] use a setup based on two antennas to measure the phase equipped with a GPS receiver that can compute the current position
difference for each satellite to detect the lock takeover. [3] and [14] and time as described in Section 2. We assume that each receiver
analyze the spoofing effect on the carrier and code level. The au- Vj V is able to receive wireless GPS signals, compute its po-
thors of [12] present a device that prevents spoofing by monitor- sition, and store its position/time-tuples. If several GPS receivers
ing and potentially suppressing the received signals before they are belong to a common group (e. g., they are mounted on the same
processed by the GPS receiver. vehicle), we assume that they can communicate to exchange their
All works above only consider attacks on single GPS receivers computed locations or are aware of the groups (fixed) formation.
but not on groups of receivers. In addition, none of them inves- The GPS location of each individual victim Vj V is given by
tigated the requirements for successful attacks on public GPS re- its coordinates Lj R3 in space and the victims clock offset j
ceivers, such as required precision of the attackers spoofing sig- with respect to the GPS system time tS . We note that the computed
nals. Although we expect that more works on GPS spoofing and GPS coordinates Lj and clock offset j do not necessarily corre-
anti-spoofing countermeasures were performed in classified (mili- spond to the true (physical) coordinates Pj R3 and time.3 We
tary) settings, they are not accessible to the public. define the local time of Vj as tj = tS + j , i. e., j < 0 refers to an
internal clock that lags behind. We use L to denote the set of GPS
3. PROBLEM FORMULATION locations of the victims in V.
In order to give an intuition of the problem, we present our mo- A GPS spoofing attack may manipulate a receivers coordinates
tivation and an exemplary use case. Subsequently we define our in space and/or its local time. We denote a victims spoofed coor-
system and attacker models and formulate the GPS spoofing prob- dinates by Lj R3 and the spoofed time offset by j . We use L
lem. for the set of spoofed victim locations.
In our analysis in Section 4, we distinguish between civilian
3.1 Motivation GPS, which uses the public C/A codes so that each satellite sig-
nal si contains only public information, and military GPS, which
The fundamental reasons why GPS spoofing works have been
provides authentic, confidential signals using the secret P(Y) codes.
discussed in the literature before, and spoofing attacks have been
In the experimental evaluation in Section 5, we use a satellite signal
demonstrated on single receivers experimentally. In this work, we
generator for civilian GPS.
show under which conditions the attacker can establish the cor-
rect parameters to launch a successful spoofing attack on one or 3.3 Attacker Model
more victims, and later in the experiments, how inaccuracies in
GPS signals can be trivially spoofed under a Dolev-Yao [4]-like
these parameters influence the lock takeover during the attack. This
attacker that is able to fully control the wireless traffic by inter-
analysis enables us to identify which attacks are theoretically pos-
cepting, injecting, modifying, replaying, delaying, and blocking
sible and which attacks would be noticeable as (potentially non-
messages without temporal constraints for individual receivers, see
malicious) signal loss at the GPS receivers. This is important for
Figure 3(b). If the attacker has full control over the input to each
proposing effective receiver-based countermeasures, which are not
individual receiver antenna, he can send the signals as they would
implemented yet in current standard GPS receivers.
3
Our work is further motivated by the real-life spoofing attacks, Typically, the difference |L P | is less than a few meters [21].
3
|LS A
i Pi | c, i. e., signals can be delayed but not sent prior
to their reception. We note that neither the spreading codes
nor the data content of the signal need to be known to the
attacker for a successful selective-delay attack.
We note that these attacker models are very strong. Nevertheless,
we consider them appropriate for our analysis because we want to
make general statements that hold even under very strong (worst-
case) attackers with sophisticated equipment.
4
Equally, we define bijk as the difference of pseudoranges of the
claimed satellite location LA
i and the spoofed victim locations Lj
and Lk (see Figure 4):
bijk = Rij
Rik
= |Lj LA A
i | |Lk Li | + j k . (12)
In the following, let bijk be the difference in pseudoranges to PiA We demonstrate this by giving a simple example: the victims
between Vj and Vk (see Equation 6): are located at P1 = (1, 0, 0) and P2 = (1, 0, 0), the physical
A A
distance between the victims is |P1 P2 | = 2. The attacker wants
bijk = Rij Rik = |Pj PiA | |Pk PiA |. (11) to spoof the two victims to the locations L1 = (0, 0, 0) and L2 =
5
As previously, to show this, we consider each signal sA i sepa-
rately. By computing bi12 , bi13 , bi14 (and bi11 = 0) according to
Equation 11 and setting bijk = bijk , we can construct three hyper-
boloids. Their intersection points are possible placements for the
antennas of the attacker. As the intersection of two hyperboloids
yields a spaced curve, the intersection of three hyperboloids is an
intersection of this curve with a third hyperboloid, which results
in at most two points. We can also arrive at this number of solu-
Figure 5: Hyperbolas of possible antenna placements for the at- tions by considering the system of four quadratic equations based
tacker when impersonating a satellite for two victims (Example on Equation 7. These can be transformed into three linear and one
for Result 2, in 2D). Each hyperbola represents possible place- quadratic equation [1], defining the solutions for the location LA i
ments for an antenna PiA . and time offset iA . As the quadratic equation has at most two solu-
tions [1], and each of the linear equations has one unique solution,
there are at most two solutions for the attackers position and trans-
(0, 2, 0), both with time offset zero: 1 = 2 = 0. The attacker mission time.
now (arbitrarily) chooses LA A
1 = (3, 2, 0), L2 = (2, 0, 0),
and LA 3 = (2, 2, 0) for the claimed satellite positions in the GPS This result can also be observed in our example by adding a
messages. This determines three hyperboloids relative to P1 and fourth victim placed at P4 = (10, 0, 0), which is spoofed to L4 =
P2 based on b112 , b212 , and b312 . (1, 0, 0) with 4 = 0. The possible placements for the attackers
antenna is now the intersection of the previously obtained curve
Result 3. A necessary condition for a successful GPS group spoof- with another hyperboloid, yielding two points only (Figure 6(c)).
ing attack is that Vj , Vk , si , bijk |Pj Pk | .
Result 6. In a GPS group spoofing attack on five or more victims
In other words, the difference bijk of the perceived pseudoranges V1 , . . . , Vn to specific locations Lj and time offsets j , there is at
of each signal sA i at any two spoofed victim locations Lj and Lk most one possible placement for PiA to impersonate a satellite at
must be smaller than or equal to the distance between the victims LA i . This is the intersection point of n 1 hyperboloids defined by
physical locations Pj and Pk . From Equation 11 and the triangle bi12 , . . . , bi1n .
inequality it follows that bijk |Pj Pk |. Since it must hold that
bijk = bijk , if bijk > |Pj Pk | for any si , then there is no possible This result directly continues our previous reasoning: Each added
solution for the attackers placement PiA . Thus we get victim adds another hyperboloid to the set of hyperboloids which
must intersect to yield a possible PiA . For five or more receivers,
|Pj Pk | |Lj LA A
i | |Lk Li | + j k (13) the set of (n 1) linear equations and one quadratic equation is
as a necessary condition for a successful attack. overdetermined, and therefore has at most one solution.
As we know from Result 2, for two victims, all possible an- From Result 5, we know that for military GPS receivers, there
tenna placements for the attacker lie on a hyperboloid defined by are at most two solutions for a given combination of Pj , Lj , j , and
Pj , Lj , j and LA LA S
i = Li . For attacks on civilian GPS receivers, the attacker can
i . We will now extend this result to the case of
three and more victims. In the following, we assume that bijk influence the position of the two solutions of the system of equa-
|Pj Pk | is fulfilled Vj , Vk and si , i. e., it is physically possible tions by changing the claimed satellite location LAi . We will now
to spoof the locations of the receivers. give an intuition where these solutions are located for a formation-
preserving GPS spoofing attack.
Result 4. In a GPS group spoofing attack on three victims V1 , V2 , V3
to specific locations Lj and time offsets j , all possible attacker Result 7. When spoofing a group of GPS receivers V1 , . . . , Vn
placements PiA lie on the intersection of two hyperboloids defined such that the formation (i. e., the mutual distances and relative time
by bi12 , bi13 . offsets) is preserved, there is always at least one solution to the
decisional group GPS spoofing problem.
This can be shown by constructing two hyperboloids using bi12
and bi13 as in Result 2. Both hyperboloids yield the possible place- One way to show this result is to use an affine transformation to
ments of attackers antennas to achieve the correct pseudorange for describe the relation between physical and spoofed locations of the
V1 , V2 or V1 , V3 , respectively. Each point on the intersection of the receivers and senders. If the formation of the victims is preserved,
two hyperboloids has a specific iA and is at the correct distance to there exists a bijective affine augmented transformation matrix T
all three victims. Therefore, all points of this space curve are valid which describes this translation and rotation. Assuming that L and
PiA to solve the group spoofing problem. P are represented as augmented row vectors, we can therefore write
T Lj = Lj . Then, the inverse transformation T 1 applied to LAi
We can extend our example from Result 2 by a third victim will yield a possible antenna placement PiA = T 1 LA i , because
placed at P3 = (1, 5, 0), which is spoofed to L3 = (1, 1, 0) with all pseudoranges Rij
between Lj and LAi and the measured range
3 = 0. This reduces the possible locations from the hyperboloid as A
Rij between Pi and Pj will be the same (the transformation pre-
shown in Figure 6(a) to the intersection curve of the hyperboloids serves the Euclidean distance).
constructed using bi12 and bi13 , as shown in Figure 6(b).
As a consequence of Results 6 and 7, spoofing five or more re-
Result 5. In a GPS group spoofing attack on four victims V1 , . . . , V4 ceivers while retaining their formation has exactly one solution, an
to specific locations Lj and time offsets j , there are at most two affine transformation of the claimed satellite position LA
i .
possible placements for PiA to impersonate a satellite at LA i . These
are the intersection points of three hyperboloids defined by bi12 , Summary of results: Table 2 gives an overview of sets of possible
bi13 , bi14 . positions PiA for the attackers antenna depending on the number
6
15 15 15
10 10 10
5 5 5
z 0 z 0 z 0
5 5 5
10 10 10
15 15 15
0 4 0 0
4 4 4 4 4
2 2 8 2
0 8 0 0 8
y 12 x y 2 12 x y 12 x
2 16 16 2 16
4 4 20 4
20 20
(a) 2 receivers (b) 3 receivers (c) 4 receivers
Figure 6: Visualization of possible attacker placements. For (a) two victims, all points on the hyperboloid are viable solutions; for (b)
three victims the solutions lie on a curve (red/white intersection); and (c) for four victims only two points are viable solutions (white
dots).
7
8000
longitude
2000 1
latitude failed takeover (ratio)
height
Error ratio
1200 0.6
4000
800 0.4
2000
400 0.2
0
0 50 t 100 t 150 200 250 300 0 0
s m 3 2 1 0 1 2 3 4 5 6 7
Time (s) Relative power in dB
(a) Sample run with +0dB power offset (b) Average error as a function of power offset
300
longitude 500 1
latitude failed takeover (ratio)
height 400 lost lock (ratio)
Error ratio
300 0.6
200 0.4
100
100
0.2
0 0
0 50 100 150 200 250 300 0
ts tm 0 20 40 60 80 100 120 140 160 180
Time (s) Time offset in ns
(c) Sample run with 120ns time offset (d) Average error as a function of time offset
Figure 8: (a-b) Effects of relative signal power. (a) Example of unsuccessful takeover with too little power used. The spoofing signal
is switched on at ts = 60s and starts moving at tm . (b) Average error over the measurement as a function of relative power. (c-d)
Example of effects of spoofing signals with time offset. (c) During the takeover, the location jumps, in particular the height. The
spoofing signal is switched on at t = 60s. (d) Average error over the measurement as a function of the time offset.
GPS constellations with up to 16 satellites in each. One constel- gate are relative signal power, relative time offset and constant time
lation is simulating the signals from the legitimate GPS satellites, offset. For each parameter value, five experiments were run.
and the other is simulating the attackers signals. Both are mixed We say that the lock takeover was successful if at the end of the
together and sent to the GPS receiver via a wired connection. The experiment the victims final location is close to L . If the victim
GPS receiver in our experiments is an Antaris evaluation kit by u- is close to L but was close unable to compute a valid position for
blox, containing the ATR0600 GPS chip from Atmel. more than one second during the lock takeover, we consider the
At the start of each experiment, we send only the legitimate GPS attack a partial success and use the number of seconds the victim
signals for a static location. We reset the GPS receiver to make sure was not able to calculate a valid position as an error metric.
all experiments are independent and no internal state is kept from
a previous experiment. After about 30 seconds the GPS receiver
will lock on to enough satellites to be able to calculate a stable po-
5.2 Results of the Experiments
sition. This position is the legitimate position L and the goal of the Relative signal power of the spoofing signal: In this experiment,
attacker is now to move the victim to a new location L such that (i) ideal spoofing signals are sent, but the power of the spoofing sig-
the victim is continuously able to compute its position (ii) no no- nals is varied between 2dB and +8dB relative to the legitimate
ticeable discontinuities in the location are reported by the victims signals.
receiver. Figure 8(a) shows the effect of using spoofing signals that have
The attack then consists of two phases: first, the attacker sends the same power as the legitimate signals. In this figure, ts marks
signals which are supposed to match the legitimate satellites sig- the time at which the spoofing signals are turned on and tm the
nals at the location of the victim. These are generated by the at- time when the spoofed location starts to move away from Linit .
tacker by approximating the current location of the victim as Linit , The errors in longitude, latitude, and height are shown separately
and constructing signals with time delays and data content appro- and are measured between the location as reported by the receiver
priate for that location (see Section 4.1). This first phase lasts for and the one sent by the simulator. Although the victim reports the
one minute to allow the victim to lock on to the new signals. In spoofed location for some time, it switches back to L after 170s of
the second phase, the attacker start to move the spoofed location the experiment, which causes the growing error in longitude.
towards the final location L , imitating an acceleration of 0.5m/s2 . Figure 8(b) shows the error in meters between the position re-
After 3 minutes, the final location is reached. If this final location ported by the GPS receiver and the location sent by the attacker, as
is not remotely close to L (height difference 150m, horizontal a function of the relative power of the attackers signals. The error
distance 1km), we consider the takeover failed. bars show the standard deviation for the error value over the five
We vary the distance between the victims true location L and experimental runs. The gray bars indicate the ratio of experiments
its initial location as assumed by the attacker Linit as one of the in which the receiver was unable to determine its position during
parameters in the experiments. We refer to this distance as the lo- the experiment. We use this as a metric to evaluate the smoothness
cation offset dinit = |L Linit |. The other parameters we investi- of the lock takeover. If the receiver reported a location too far away
from L , we count this run as failed takeover. Blue bars in the figure
8
longitude 300 1
600
latitude failed takeover (ratio)
height lost lock (ratio) 0.8
Error ratio
400
Error (m)
0.6
100 0.4
200
0.2
0
0 0
0 50 ts 100 tm 150 200 250 300 0 50 100 150 200 250 300 350 400
Time (s) Location offset in m
(a) Sample run with 340m location offset (b) Average error as a function of location offset
longitude 400 1
120 latitude failed takeover (ratio)
height lost lock (ratio) 0.8
Error ratio
80 0.6
Error (m)
200
0.4
40 100
0.2
0
0 0
0 50 ts 100 tm 150 200 250 300 0 20 40 60 80 100 120 140 160 180
Time (s) Satellite signal desynchronization in ns
(c) Sample run with 140ns time delay mismatch offset (d) Average error as a function of time delay mismatch
Figure 9: (a-b) Example of effects of spoofing signals with location offset. (a) Example with 340m offset. During the takeover, the
location is unstable. The spoofing signal is switched on at t = 60s. (b) Average error over the measurement as a function of the
location offset. (c-d) Example of effects of spoofing signals with inconsistent time offset for half of the satellites. (c) With a 140ns
time offset between the attackers satellites, the takeover leads to an unstable lock. The spoofing signal is switched on at t = 60s. (d)
Average error over the measurement as a function of the time delay mismatch.
denote the ratio of attempts in which the GPS receiver was unable to the time offset, this location offset can lead to a relatively large
to compute a valid location. error during the lock takeover. An example with offset of 340m is
It can be seen that for at least 2dB more power, the receiver con- given in Figure 9(a).
sistently locks onto the spoofing signals without any offset occur- In Figure 9(b), we show the average error as a function of the lo-
ring. 2dB of power is sufficiently low to not be detected by power cation offset. Regardless of the intermediate errors, eventually the
based spoofing-countermeasures in practice. victim always synchronizes to the attackers signals in all our ex-
Constant time offset influence: The second question we investi- periments. This shows that the initial position is not very sensitive
gate is the effect of a general delay on all signals sent by the attacker to small errors. If an attacker knows the location of his victim to
relative to the legitimate signals. Such time delays can occur if the within about 100 meters, he can perform a smooth takeover without
attackers system setup is not perfectly compensating for internal the victim losing lock. There will of course be a detectable jump in
delays, the distance to the victim is unknown or the system clock position from L to Linit when the attackers signal is turned on but
of the attacker is not synchronized perfectly to the clock of the le- the victim will not lose lock with any satellite.
gitimate GPS satellites. The interesting question is if such a general Relative time offset influence: In the case where the attacker has
time offset will result in detectable errors in the victims reported access to more than one transmission antenna, he can send the
position, and if such a time offset will increase the chance of the spoofing signals using two or more omnidirectional antennas (see
victim losing lock completely during the takeover. To evaluate the Section 4). Depending on the relative position of the individual an-
influence of a constant time offset, we run the tests with time off- tennas, the victim will receive the spoofing signals with different
sets between 0ns and 240ns. We plot the location error between time delays. Relative time offsets of the signals can also be caused
the attackers intended location and the actual location reported by by inaccuracies in the delay setup in the case of military GPS sig-
the victim an example run in Figure 8(c). The effects are consistent nals. In this experiment, we evaluate the consequences of having
over several runs with the same parameters, but can vary quite a lot half of the spoofed satellite signals shifted by a fixed amount of
with these parameters. time relative to the other half of the signals. In Figure 9(c), we
In Figure 8(d), we show the general relation between the average show an example run with a time delay mismatch of 140ns. The
errors during the measurement as a function of the time offset for results for all tested values are presented in Figure 9(d).
the first 120ns. After this time, lock takeover was not working
consistently any more.
Location offset influence: In this series of experiments we deter- 5.3 Discussion on Practical Issues in Spoofing
mine the influence of an offset dinit between the position of the Attacks
victim as determined from the legitimate satellites L and the spoof- Because our experiments are based on a single GPS receiver,
ing signals sent by the attacker Linit . We evaluate the influence of we do not attempt to make precise general statements about the
such a location offset for values between 0 and 450m. Similarly parameter values that are necessary to perform a seamless takeover
of any platform. Instead we point out that ranges with acceptable
9
Parameter value required
for successful spoofing
Relative signal power +2dB
Constant time offset 75ns
Location offset 500m
Relative time offset 80ns
values exist and we present the values for our receiver in Table 3.
According to our experiments, the constant time offset is sensi-
tive to variation and should be less than 75ns. Anything more than
that will cause the GPS receiver to lose lock when the spoofing sig-
nal is turned on. A value of 75ns roughly corresponds to a distance Figure 10: Proposed countermeasures: For an attacker with a
of 22.5m, meaning that the attacker must know the distance from single antenna, the two-receiver countermeasure is enough. If
himself to the victim with an accuracy of 22.5m (or better) a the attacker uses multiple antennas, four (or more) receivers
higher offset will cause the victim to lose lock due to the signal severely restrict the attackers antenna placements. Wrong an-
(chip phase) misalignment. We found that the initial location off- tenna placements will change the distances of the receivers and
set will cause a noticeable jump of the victims reported position can thus be detected.
during the attack. Large offsets could therefore be detected by the
victim by monitoring its position. Any change in the arrival time
of the signal from different antennas will directly impact the posi- ducting such an attack is very difficult. It becomes even impossible
tion calculated by the victim. If the relative time offset gets above if the victim can hide the exact positioning of at least one GPS re-
80ns the signals are sufficiently misaligned to cause the receiver to ceiver from the attacker (e. g., by keeping it mobile on the vehicle)
lose lock. This means that, if an attacker has multiple antennas, he such that the attacker cannot adapt to its position.
must precisely know the distance from each antenna to the attacker In summary, our countermeasure requires no modifications of
in order to be able to spoof a desired location. the GPS signal, the satellite infrastructure, or the GPS receiver, it is
resistant against a wide range of attackers, and it can be deployed
using multiple standard GPS receivers.
6. GPS SPOOFING COUNTERMEASURE Outlook: Further possible applications are not restricted to mobile
Spoofing detection based on lock loss has two disadvantages: (i) scenarios with a fixed formation (such as in the cargo ship exam-
strong attackers can achieve a seamless satellite-lock takeover, and ple above). The countermeasure can also be applied (i) to fixed and
(ii) lock loss can occur due to natural causes (e. g. signal loss in static (i. e., immobile) settings where GPS is used for time synchro-
a tunnel). We propose a countermeasure against GPS spoofing at- nization and (ii) to mobile settings with varying formations (e. g.,
tacks that does not rely on the signal analysis or on the lock loss mobile formation of cars, robots, etc.). In the latter case, the de-
of signal. Instead, our mechanism is based on our insights of Sec- vices can apply additional ranging techniques to identify their for-
tion 4 and relies on the use of several GPS receivers. These GPS mation and use it in the sanity check with the calculated GPS loca-
receivers can be deployed in a static, known formation, e. g., they tions (as long as the ranging techniques are secure [?, 2, 6, 10, 18]).
are fixed on the deck of a cargo ship (see Figure 10). The basic We leave the elaboration of these ideas for future work.
idea of the countermeasure is the following: If the GPS receivers
can exchange their individual GPS locations, they can check if their
calculated locations preserve their physical formation (within cer- 7. CONCLUSION
tain error bounds). In the case that the calculated GPS locations do In this paper, we analyzed the requirements for successful GPS
not match the known formation, an attack must be suspected and spoofing attacks on individuals and groups of victims with civilian
there should be a warning message. For the exchange of position- or military GPS receivers. In particular, we identified from which
ing information, the victim could also resort to wired connections if locations and with which precision the attacker needs to generate
available (which would be resistant against spoofing and jamming its signals in order to successfully spoof the receivers.
attacks). For example, we show how spoofing a group of victims can only
Even if only two GPS receivers are used, this countermeasure be achieved from a restricted set of locations, if the attacker aims to
can detect any attacker that is only using a single antenna. As preserve the mutual distances and time offsets of the victims. With
shown in Result 1, in case of a single-antenna attack both GPS growing size of the group of victims, less spoofing location become
receivers would report the same location (with small time offsets). available, until only single points remain for 5 victims or more. In
As shown in Results 46, a strong attacker using multiple an- addition, we discussed the practical aspects of seamless satellite-
tennas could attempt to send signals such that the mutual distances lock takeover. We used a GPS signal generator to perform a set
between multiple receivers are preserved. Nevertheless, each addi- of experiments in which we investigated the required precision of
tional receiver of the victim makes these spoofing attacks exceed- the attackers spoofing signals. Besides demonstrating the effects
ingly more difficult because the space of possible antenna place- of such lock takeovers on the victim, our results include minimal
ments for the attacker gets reduced significantly (see Table 2). From bounds for critical parameters to allow a seamless takeover of our
Results 6 and 7 we know that there exists only one location per target platform. Finally, we proposed a technique for the detection
satellite where the attacker can place his antenna; this location is of spoofing based on a group of standard GPS receivers (without
the rotated and translated satellite position of the GPS signal. Con- specific spoofing detection measures) in a static formation.
10
8. REFERENCES (2008).
[1] B ENSKY, A. Wireless Positioning Technologies and [17] PAPADIMITRATOS , P., AND J OVANOVIC , A. Protection and
Applications. GNSS Technology and Applications Series. fundamental vulnerability of GNSS. In Proceedings of the
Artech House, 2008. International Workshop on Satellite and Space
[2] B RANDS , S., AND C HAUM , D. Distance-bounding Communications (2008).
protocols. In Workshop on the theory and application of [18] R ASMUSSEN , K. B., AND C APKUN , S. Realization of rf
cryptographic techniques on Advances in cryptology distance bounding. In Proceedings of the USENIX Security
(EUROCRYPT) (1994), Springer. Symposium (2010).
[3] C AVALERI , A., M OTELLA , B., P INI , M., AND FANTINO , [19] S COTT, L. Anti-spoofing & authenticated signal
M. Detection of spoofed GPS signals at code and carrier architectures for civil navigation systems. In Proceedings of
tracking level. In Proceedings of the 5th ESA Workshop on the ION GNSS International Technical Meeting of the
Satellite Navigation Technologies and European Workshop Satellite Division (2003).
on GNSS Signals and Signal Processing (Navitec) (2010). [20] S PIRENT C OMMUNICATIONS PLC. SimGEN simulation
[4] D OLEV, D., AND YAO , A. C. On the security of public key software. http://www.spirent.com.
protocols. IEEE Transactions on Information Theory 29, 2 [21] U. S. D EPARTEMENT OF D EFENSE . Global positioning
(1983). system. standard positioning service. performance standard,
[5] E TTUS. Universal software radio peripheral (USRP). Sep 2008.
http://www.ettus.com. [22] U. S. G OVERNMENT . Global positioning system.
[6] H ANCKE , G. P., AND K UHN , M. G. An RFID Distance http://www.gps.gov, 2010.
Bounding Protocol. IEEE Computer Society. [23] WARNER , J. S., AND J OHNSTON , R. G. A simple
[7] H UMPHREYS , T. E., L EDVINA , B. M., P SIAKI , M. L., demonstration that the global positioning system (GPS) is
OH ANLON , B. W., AND K INTNER , P. M. Assessing the vulnerable to spoofing. Journal of Security Administration
spoofing threat: Development of a portable GPS civilian (2002).
spoofer. In Proceedings of the ION GNSS International [24] WARNER , J. S., AND J OHNSTON , R. G. GPS spoofing
Technical Meeting of the Satellite Division (2008). countermeasures. Homeland Security Journal (2003).
[8] J OHN A. VOLPE NATIONAL T RANSPORTATION S YSTEMS
C ENTER. Vulnerability assessment of the transportation APPENDIX
infrastructure relying on the global positioning system. Final
Report, 2001. A. PROOF OF RESULT 1
[9] J OHNSTON , R. G., AND WARNER , J. S. Think GPS cargo
tracking = high security? Think again. In Proceedings of To show Result 1, we first focus on a single receiver V1 and civil-
Transport Security World (2003). ian GPS. The attacker selects a target location L , a target time
[10] K UHN , M., L UECKEN , H., AND T IPPENHAUER , N. O. offset 1 , and any arbitrary attacker location PiA . Given this, Equa-
UWB impulse radio based distance bounding. In tion 8 yields A i . Using one transmission antenna (i. e. P1 =
A
Proceedings of the Workshop on Positioning, Navigation and PjA j)5 , the attacker transmits all signals sAi with the delay A
i =
A
Communication (WPNC) (2010). i /c.
[11] K UHN , M. G. An asymmetric security mechanism for While this will successfully spoof the location and time of one
navigation signals. In Proceedings of the Information Hiding victim, other victims in the vicinity will receive the same signals
Workshop (2004). with slight time delay or advancement. We now consider a set of
[12] L EDVINA , B. M., B ENCZE , W. J., G ALUSHA , B., AND receivers V = {V1 , . . . , Vn } that are positioned at different physi-
M ILLER , I. An in-line anti-spoofing device for legacy civil cal locations P = {P1 , . . . , Pn }.
GPS receivers. In Proceedings of the ION International Since the attacker sends all signals sA i from the same position
Technical Meeting (2010). P1 = P2A = . . . , we can follow that b1jk = b2jk = . . . for all
A
[13] M ONTGOMERY, P. Y., H UMPHREYS , T. E., AND L EDVINA , signals sA i . To compute the effect of the offset on the pseudoranges
B. M. Receiver-autonomous spoofing detection: on each victim, we can express each victims pseudorange relative
Experimental results of a multi-antenna receiver defense to the pseudorange of the first victim: Rij = Ri1 + b1j1 . Each
against a portable civil GPS spoofer. In Proceedings of the victim will measure pseudoranges based on their physical distances
A
ION International Technical Meeting (2009). to the attacker: Rij = Rij . We can now substitute (11) into (7) and
[14] M OTELLA , B., P INI , M., FANTINO , M., M ULASSANO , P., get the following equation for each signal sA i and Vj :
11
Result 1 shows that an attacker can make a group of victims be- satellites are enlarged (i. e., if |L1 LS S
i | > |P1 Li | Si ), the
lieve to be at a specific location by sending one set of satellite sig- time offset of the victim can be made negative (causing the victim
nals from the same antenna. All victims will believe to be at the to advance its clock). The minimal value of 1 is determined by
same location L , but with different time offsets. The additional
time offset j k between victim Vj and Vk introduced by the at- j max(|P1 LS S
i | |L1 Li |). (16)
i
|L L |
tacker is bounded by their mutual distance |j k | j c k and As the attacker can always delay the signals, he can arbitrarily delay
is typically on the order of nanoseconds for victims a few meters the victims clock also in military GPS.
apart. One direct conclusion for military GPS is that it is not possible
In attacks on military GPS, Equation 10 shows an interesting to advance the victims clock while retaining the original location
relation between the resulting time offset of the main victim 1 and L1 = L1 . The clock offsets of other victims V2 , . . . , Vn relative
the distance between the spoofed location and each satellite: If L1 to the first victim as expressed in Equation 15 remain the same
is chosen such that |L1 LS S
i | |P1 Li | for any Si , then the time for attacks on military GPS if all signals are sent from the same
offset 1 at the victim must be positive. On the other hand, since location P1A = P2A = . . . .
1 is the same for all satellites, only if the distances from L1 to all
12