Assessment of The Vulnerability To Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices
Assessment of The Vulnerability To Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices
Assessment of The Vulnerability To Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices
Abstract—In this paper, we investigate the effects of spoofing unit which is typically interfaced to an application layer, the
attacks on the mass-market positioning and navigation units position information is exchanged to other services or stored
integrated in modern day Android™ smartphones. In order in remote databases. Such an architecture is prone to a wide
to operate spoofing in a real environment, we designed and
implemented a portable, configurable, low-cost GPS spoofer range of spoofing attacks, especially if it is based on products
exploiting a software-defined radio (SDR) implementation and which are low-cost, Commercially available and Off-The-
a low-cost front-end. Such a tool has been exploited to set up a Shelf (COTS). These use the aforementioned satellite-based
test campaign trying to mislead the Position, Velocity and Time positioning services and standard unencrypted communication
computation of different Android™ smartphones. The effects of services. As a consequence, it is worth examining the potential
such simplistic spoofing attack on the smartphone GNSS has
been assessed observing raw measurements and the evaluated effects of intentional interference on the low-cost GNSS units
positions and time. The main findings of this work showed embedded in mass market receivers as well as assessing the
that modern Android™ devices have a remarkable resilience resilience of the receiver itself. Many studies are available on
to simplistic spoofing attacks, highlighting in parallel further defence against civil GNSS spoofing attacks. In [5], Unicorn
potential weaknesses to be protected by means of practical Team showed the spoofing technology using MATLAB® to
defence mechanisms and countermeasures to spoofing.
Record GPS signal by a USRP™ B210 and Replay the signal
Index Terms—Global navigation satellite system, Global Position- by a SDR BladeRF™ to spoof PVT of a smartphone. The
ing System, Smart devices, Radiofrequency interference team presented the vulnerability of smartphones even if the
trial regarded a limited number of devices. In addition, work
developed in [6] showed how easy it is to spoof the navigation
I. I NTRODUCTION
solution in the phone using software radios and additional
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.
2
The experimental work presented hereafter provides one of the power which is increased slowly till the receiver has acquired
first investigations on the use of a portable spoofer to threaten and started to track the spoofed signals. In [22], research
Android™ smartphones. The portable low-cost spoofer has conducted sophisticated spoofing scenarios in a multi-layered
been developed, based on open source signal generator and processing architecture. However, this type of spoofing uses
low-cost electronics and radio-frequency equipment and then multiple antennas to broadcast GNSS signals to overcome
used to carry out spoofing attacks on different Android™ standard anti-spoofing techniques. Thus, it is rarely used due
smartphones. The rest of the paper is organised as follows: to its high cost and complexity.
In Section II, background of a spoofing attack, spoofing tech-
niques and the state of vulnerability of receivers are explained.
Section III provides a methodology of the experimental setup B. Spoofing attacks to integrated GNSS receivers in smart-
and test. Results and analysis on the performance of the phones
smartphones under the spoofing attack is discussed in Section Some demonstrations of spoofing against Google Android™
IV. Conclusions and further research are then drawn in Section OS are presented in [23] with realistic spoofing and fake
V. Google Maps™ integration. This work demonstrated that
spoofing might impact the device’s navigation unit affecting
II. BACKGROUND in turn a popular Location Based Service (LBS). Since the
version 7 onwards of Android™ OS gives access to raw GNSS
A. Spoofing attacks measurements, it can be exploited to study and detect the effect
Spoofing methodologies are typically classified on the basis of spoofed signals in applicable smartphones. The raw GNSS
of the difficulty in inducing the attack and on the possibility measurements may include internal clock measurements like
to detect it from a receiver point of view. Compared to a the time of signal reception, clock drift, clock discontinuities,
jamming disturbance to a GNSS receiver, which could signif- etc. and the GNSS receiver measurements such as received
icantly impair the receiver at a signal processing stage, thus, GNSS satellite time, Doppler frequency, carrier phase mea-
allowing easy detection, a spoofing disturbance challenges surements, constellation status, navigation messages, etc. [24]
potential detection as the receiver operation is not interrupted. . More recently, the Google Service Framework™ also provides
Depending on the features of the spoofing and the complexity Automatic Gain Control (AGC) measurements in its Android™
of the attack, it is possible to classify these disturbances location modules with the release of Android™ Android Ap-
into three categories: simplistic, intermediate and sophisticated plication Program Interface (API) 9.0. However, not all the
[19], [20]. GNSS chipsets or software of the different Android™ devices
a) Simplistic spoofing: It is characterised as a transmission are compatible with such measurements and the quality of the
of locally generated RF signals forcing receivers to compute a raw GNSS measurements vary between device to device [25],
fake PVT solution. A lack of synchronisation between spoofers [26].
and GNSS timescale can be often used to detect occurring
attacks. This type of spoofer can be also built by using a
III. M ETHODOLOGY
signal simulator which re-transmit fake signal or SDR low-
cost components. A. A low-cost, portable spoofer
b) Intermediate spoofing: the spoofer has a built-in receiver In our experiment we used a low-cost spoofer based on a Great
that collects and tracks the satellite signal parameters in order Scott Gadgets™ HackRF One™ platform and a Raspberry™ PI
to generate a new signal that is consistent with real GNSS 4B. The HackRF One™ is a low-cost, open-source Software-
signals. It receives real time GNSS signals, changes the signal Defined Radio allowing fast and accurate RF signal transmis-
properties based on its need and transmits GNSS signals sion from binary files. This front-end can receive and transmit
synchronised with real GNSS time to the targeted victim signals from 1 MHz to 6 GHz with adjustable power and
receiver. An intermediate spoofing hardware might have GNSS channel capacity. The software used to numerically generate
receiver integrated with front-end or conventionally designed the spoofed GPS signal is GPS-SDR-SIM [27], an open GPS
for spoofing purposes. A drawback of Intermediate spoofing L1 C/A signal generator toolbox distributed with a MIT
attack, is that it require certain target information which is licence [28]. A scheme of the device is provided in Figure
difficult to implement. For successfully misleading the target, 1.
different factors must be theoretically evaluated and combine
with experimental verification. Some implementations of in-
termediate spoofing scenario is made of civilian GPS with
L1 Stick
modified software defined receiver integrated with front-end Battery Pack Antenna
[4].
Raspberry Py 4B HackRF One RF Coaxial
c) Sophisticated spoofing: also referred to as ’nulling’ trans- Cable
mits a destructive interference signal along with fake spoofed GPS-SDR-SIM RF SMA Interface
USB Cable
signals. Sophisticated spoofing is the most dangerous because Data/Power
USB 3.0 Interface USB 3.0 Interface
it takes control of the target receiver without being detected.
As described in [21], the attack principle is soft-take-over or
time-synchronised transmission. It starts with a low level of Fig. 1. High-level schematic of the low-cost portable spoofer.
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.
3
TABLE I
D EVICES UNDER TEST.
The attack was planned simulating a static position and all the
visible satellites belonging to GNSS constellations and their
signals were transmitted to the SDR equipment. An optional
reference clock can be used to discipline the signal generation
at an increased cost of the overall equipment. For the scope of
the paper, reference oscillator was not connected to the front-
end. Power supply can be provided through a mass-market,
10000 mAh battery pack according to the supply specification
of the Raspberry Pi 4B. The HackRF One can be then supplied
by the Raspberry Pi itself through the USB 3.0 interface. The
spoofing attack can be performed through the portable spoofer
according to the following steps:
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.
4
UTC time of February 11, 2020, 14.21.41 and for the first 2.4 SPOOFING TIMESPAN
5 minutes, they received live GNSS signals without any 2.3 SV ID 24
SV ID 25
other interference. Then the portable spoofer was switched 2.2
2.1
on, broadcasting spoofing signals over GPS L1 band with
2
coordinates 45.470111 N, 9.179874 E (Milan, Italy) and UTC 0 100 200 300 400 500 600 700 800 900
time February 10, 2020, 12.00.00 which was 144 km away
from the test location. The spoofing signals were broadcasted Fig. 4. Effect on real satellites (SV ID 24 and 25) during the test
for 5 minutes after which the spoofer was switched off. For the duration.
remaining duration, the smartphones received only live GNSS
signals. The u-blox™ Neo-M8N GNSS receiver was used for B. Fake and Real satellites comparison
cross validation of the test measurements. 14 GPS satellites Figure 5 plots the AGC dB values of the S3 GNSS receiver
were considered in the overall scenario. As seen in Table II, during the test period. It is observed that the effect of turning
the satellites could be divided into three different subsets. The on the spoofer is similar to what in-band jamming or inter-
first subset (Real) consists of the real in-view Satellite Vehicle ference would do. Due to the presence of powerful spoofing
Identifiers (SV IDs) which were received by each device and signals, the receiver reduces the amplification of the incoming
not part of the satellites transmitted by the spoofer. The second sign which, while disturbing real signals, allows fake signals
subset (Fake) consists of the SV IDs which were transmitted to be easily acquired. This is clear when comparing the C/N0
by the spoofer and visible to all the smartphones, but their real of a fake (SV ID 16) and real signal (SV ID 24) in Figure
counterparts were not in view during the test period [8, 16, 6. An important difference captured between the two satellite
27]. The third subset (Common) consists of the overlapping signals is the tT X , whose values in a real signal was within
Satellite Vehicle (SV) IDs which were both in-view real time the standard 100 ms of the tRX throughout the test, while fake
and transmitted by the spoofer as well [10, 20, 32]. The overall signals had tT X and tRX difference values over 105 seconds.
satellite skyplot during the test is shown in Figure 3. This naturally gives a hugely and unrealistic pseudorange
value for the fake satellite. Nevertheless, it has to be remarked
IV. R ESULTS AND A NALYSIS that no effect is experienced on the time provided, since the
This section is roughly divided based on the effect of the connected device is kept synchronised to the communication
spoofing described in Section III-C on GPS L1 GNSS raw network infrastructure (cellular or Wi-FI).
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.
5
55
be speculated that the smartphones maintain their true position
SPOOFING TIMESPAN
with the help of multi-constellation, multi-frequency GNSS
50
capabilities along with network positioning and other sensors.
45 It is interesting to notice that S1 carries the Broadcom™ BCM
40 4774 chipset without dual frequency GNSS capabilities and it
35 is affected the most, comparatively.
30
0 100 200 300 400 500 600 700 800 900
Error in ECEF X coordinate
SPOOFING TIMELAPSE
Fig. 5. Effect of Spoofing on AGC.
50
Error in ECEF Y coordinate
40 SPOOFING TIMESPAN
30 SPOOFING TIMELAPSE
20
SV ID 16 Error in ECEF Z coordinate
SV ID 24
10 S3
SPOOFING TIMELAPSE
0 100 200 300 400 500 600 700 800 900 S2
S1
Fig. 6. Comparison of Fake (SV ID 16) and Real (SV ID 24) satellite’s
C/N0 .
Fig. 8. Effect on Smartphone GNSS Position.
C. Effect on Common satellites
Figure 7 plots the effect of spoofing on the C/N0 , Pseudorange V. C ONCLUSION AND FURTHER RESEARCH
and Carrier phase measurements of a Common satellite (SV ID In this work, a portable GPS L1 spoofer was implemented
10) present among the live satellites and in the set of spoofed and a spoofing strategy was proposed for the calculation of
signals. It can be seen that the receiver does not acquire the intentionally misleading PVT solution on a GNSS receiver.
fake satellite signal with the same SV ID during the spoofing Comparative analysis is addressed on the performance of
timespan and only looses acquisition of the real signal. It modern commercial smartphones and it is comprehensively
reacquires the real satellite after spoofing stops as also seen seen that a simplistic spoofing attack is not fully successful on
by the carrier phase measurement. such smartphones in ope -sky conditions. Spoofer transmitted
satellites though acquired, are not used by the smartphone
40 GNSS receivers except in the case of overlapping satellites
30
20
SPOOFING TIMESPAN where they are not present in the set of already acquired
10 signals. The spoofer acted more as an interference agent to
0 100 200 300 400 500 600 700 800 900
the smartphones in the L1 band and their GNSS receiver
clocks are not affected by it. The effect of a longer duration
SPOOFING TIMESPAN
of spoofing than presented in this paper and multi-frequency
(L1 and L5) spoofer implementation are to be seen. This
suggests that a proper attack should implement as well an
initial jamming phase before presenting the fake signals to the
30
receiver for acquisition. An important follow up of this work
20 SPOOFING TIMESPAN
is the development of an intermediate portable spoofer to gain
10
0 100 200 300 400 500 600 700 800 900
success in spoofing modern day smartphones and then develop
proper counter measures since such spoofers are already a
reality today.
Fig. 7. Common Satellite (SV ID 10) analysis.
R EFERENCES
D. Effect on smartphone GNSS position estimation.
[1] European Space Agency (ESA), “Galileo open service, Signal-In-Space
Figure 8 shows the error in position of the ECEF coordinates Interface Control Document (OS SIS ICD),” 2008.
of the three different smartphones during the test. The spoofing [2] Coordination Scientific Information Center, “Global Navigation Satellite
time span is delayed compared to the previous plots as NMEA System GLONASS Interface Control Document (ICD),” 2002.
Tools app was initialised before GNSS Logger app. It can be [3] K. Linux, “Penetration testing and ethical hacking linux distribution,”
seen that spoofing achieves only a few metres of deviation 2018.
in the position output of the GNSS receiver which can be at- [4] F. Dovis, GNSS interference threats and countermeasures. Artech
tributed to the loss of some satellites due to interference. It can House, 2015.
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.
6
[5] L. Huang and Q. Yang, “Low-cost GPS simulator GPS spoofing by [25] N. Gogoi, A. Minetto, N. Linty, and F. Dovis, “A controlled-
SDR,” in Proceedings of DEFCON, 2015. environment quality assessment of android GNSS raw measurements,”
Electronics, vol. 8, no. 1, p. 5, Dec 2018. [Online]. Available:
[6] S. Lo, Y. H. Chen, T. Reid, A. Perkins, T. Walter, and P. Enge, http://dx.doi.org/10.3390/electronics8010005
“The benefit of low cost accelerometers for GNSS anti-spoofing,” in
Proceedings of the ION 2017 Pacific PNT Meeting, 2017, pp. 775–796. [26] G. Galluzzo, M. Navarro-Gallardo, and M. Sunkevic, “Using GNSS raw
measurements on android devices-tutorial part i,” 2017.
[7] K. Wang, S. Chen, and A. Pan, “Time and position spoofing with open
source projects,” black hat Europe, vol. 148, 2015. [27] “Software-defined GPS signal simulator,” https://github.com/osqzss/gps-
sdr-sim, accessed: 2020-02-10.
[8] J. Nielsen, V. Dehghanian, and G. Lachapelle, “Effectiveness of GNSS
spoofing countermeasure based on receiver CNR measurements,” Inter- [28] “MIT licence,” https://opensource.org/licenses/mit-license.php,
national Journal of Navigation and Observation, vol. 2012, 2012. accessed: 2020-02-10.
[9] J. T. Curran and A. Broumendan, “On the use of low-cost IMUs for [29] “Google GNSS logger,” https://github.com/google/gps-measurement-
GNSS spoofing detection in vehicular applications,” in Proceedings of tools/, accessed: 2020-02-10.
ITSNT, 2017.
[30] F. Bastide, D. Akos, C. Macabiau, and B. Roturier, “Automatic gain
[10] S. Daneshmand, A. Jafarnia-Jahromi, A. Broumandan, and control (AGC) as an interference assessment tool,” 2003.
G. Lachapelle, “A low-complexity GPS anti-spoofing method using a
multi-antenna array,” a a, vol. 2, p. 2, 2012.
[11] S. Han, L. Chen, W. Meng, and C. Li, “Improve the security of GNSS
receivers through spoofing mitigation,” IEEE Access, vol. 5, pp. 21 057–
21 069, 2017.
[12] A. Broumandan, A. Jafarnia-Jahromi, V. Dehghanian, J. Nielsen, and Akmal Rustamov is a PhD candidate at the Department of Electronics
G. Lachapelle, “GNSS spoofing detection in handheld receivers based and Telecommunications of Politecnico di Torino. His research is focused
on signal spatial correlation,” in Proceedings of the 2012 IEEE/ION on implementation and resilience test of a GNSS positioning systems for
Position, Location and Navigation Symposium, April 2012, pp. 479– road applications. He received his MSc degree in the field of Mechanical
487. Engineering in 2016 at Turin Polytechnic University in Tashkent. He involved
[13] D. Miralles, N. Levigne, D. M. Akos, J. Blanch, and S. Lo, “Android in teaching assistant part of the course ”Electrical Machines and Circuit
raw GNSS measurements as a new anti-spoofing and anti-jamming theory” at Polytechnic University of Turin in Tashkent.
solution,” in Proceedings of the 31st International Technical Meeting
of The Satellite Division of the Institute of Navigation (ION GNSS+
2018), Miami, Florida, 2018, pp. 334–344.
[14] S. Ceccato, F. Formaggio, G. Caparra, N. Laurenti, and S. Tomasin,
“Exploiting side-information for resilient GNSS positioning in mobile
phones,” in 2018 IEEE/ION Position, Location and Navigation Sympo-
sium (PLANS). IEEE, 2018, pp. 1515–1524. Neil Gogoi completed his 1st and 2nd Level Masters at the University of
Nottingham, U.K and Politecnico di Torino, Italy respectively in the field
[15] D. M. S. L. D. A. Dong-Kyeong Lee, Matthias Petit, “Analysis of raw of Navigation technology. His past work includes Multi-Constellation GNSS
gnss measurements derived navigation solutions from mobile devices performance investigation and GNSS deformation monitoring. Currently he is
with inertial sensors,” in Proceedings of the 32nd International Technical pursuing a PhD at Politecnico di Torino within the NavSAS group with the
Meeting of the Satellite Division of The Institute of Navigation (ION support of PIC4SeR. His aim is developing effective navigation systems for
GNSS+ 2019), Miami, Florida, 2019, pp. 3812 – 3831. robotic vehicles with current focus on the feasibility of Android smartphones
and cooperative algorithms towards it.
[16] L. Dobryakova and E. Ochin, “On the application of GNSS signal
repeater as a spoofer,” Zeszyty Naukowe/Akademia Morska w Szczecinie,
2014.
[17] European GNSS Agency. GSA GNSS market report issue 5. [Online].
Available: https://www.gsa.europa.eu/market/market-report
[18] GSA. Gsa gnss market report issue 6. [Online]. Available:
https://www.gsa.europa.eu/market/market-report Alex Minetto is a PhD candidate at the Department of Electronics and
Telecommunications of Politecnico di Torino within the Navigation Signal
[19] A. Broumandan, A. Jafarnia-Jahromi, and G. Lachapelle, “Spoofing Analysis and Simulation (NavSAS) group. His research is focused on GNSS-
detection, classification and cancelation (SDCC) receiver architecture based cooperative positioning algorithms. He developed his Master Thesis
for a moving GNSS receiver,” Gps Solutions, vol. 19, no. 3, pp. 475– at European Organization for the Exploitation of Meteorological Satellites
487, 2015. (EUMETSAT) in Darmstadt (Germany), addressing the development of a new
precise detection algorithm for radar pulses sent from Metop satellites during
[20] J. R. v. d. Merwe, X. Zubizarreta, I. Lukčin, A. Rügamer, and W. Felber, their calibration campaign.
“Classification of spoofing attack types,” in 2018 European Navigation
Conference (ENC), 2018, pp. 91–99.
[21] C. Gunther, in A Survey of Spoofing and Counter-Measures. Navigation,
2014, pp. 159–177.
[22] J. N. A. Jafarnia-Jahromi, A. Broumandan and G. Lachapelle, “GPS vul-
nerability to spoofing threats and a review of antispoofing techniques,”
in International Journal of Navigation and Observation, vol.2012, 2012, Fabio Dovis is an associate professor at the Department of Electronics and
pp. 1–16. Telecommunications of Politecnico di Torino as a member of the Navigation
Signal Analysis and Simulation (NavSAS) group. His research interests cover
[23] K. C. Zeng, Y. Shu, S. Liu, Y. Dou, and Y. Yang, “A practical GPS the design of GPS and Galileo receivers and advanced signal processing
location spoofing attack in road navigation scenario,” in Proceedings for interference and multipath detection and mitigation. He has a relevant
of the 18th International Workshop on Mobile Computing Systems and experience in European projects in satellite navigation as well as cooperation
Applications, 2017, pp. 85–90. with industries and research centers.
[24] Google Developers. GNSSmeasurement. [Online]. Available:
https://developer.android.com/reference/android/location/GnssMeasurement
Authorized licensed use limited to: Chaitanya Bharathi Institute of Tech - HYDERABAD. Downloaded on August 21,2020 at 11:15:22 UTC from IEEE Xplore. Restrictions apply.