What is spoofing and how to ensure GPS security? (2024)

What is spoofing and how to ensure GPS security? (1)

Why GPS spoofing?

Imagine a combat situation. Clearly, the side which uses GPS/GNSS technology would have an advantage over the side which does not. But what if one side could manipulate GPS receivers of their adversary? This could mean taking over control of autonomous vehicles and robotic devices which rely on GPS positioning. For example, in October 2018, Russia accused the US of spoofing a drone and redirecting it to attack a Russian air base in Syria(2).

In the last 3 years over 600 incidents of spoofing have been recorded in the seas near the Russian border. These ships appeared to be “transported” to nearby airports (3). This type of spoofing might have been introduced as a defense mechanism to ground spy drones. Most semi-professional drones on the market have a built-in geo-fencing mechanism which lands them automatically if they come close to airports or other restricted areas (4).

Some of the most enthusiastic spoofers are Pokémon GO fans who use cheap SDRs (Software Defined Radios) to spoof their GPS position and catch elusive pokémon without having to leave their room.

Types of Spoofing

Spoofers overpower relatively weak GNSS signals with radio signals carrying false positioning information. There are two ways of spoofing:

    1. Rebroadcasting GNSS signals recorded at another place or time (so-called meaconing)
    2. Generating and transmitting modified satellite signals

Spoof-proof: how to protect your receiver against spoofing?

In order to combat spoofing, GNSS receivers need to detect spoofed signals out of a mix of authentic and spoofed signals. Once a satellite signal is flagged as spoofed, it can be excluded from positioning calculation.

There are various levels of spoofing protection that a receiver can offer. Let’s compare it to a house intrusion detection system. You can have a simple entry alarm system or a more complex movement detection system. For added security you might install video image recognition, breaking-glass sound detection or a combination of the above.

Like a house with an open door, an unprotected GNSS receiver is vulnerable to even the simplest forms of spoofing. Secured receivers, on the other hand, can detect spoofing by looking for signal anomalies, or by using signals designed to prevent spoofing such as Galileo OS-NMA and E6 or the GPS military code.

Advanced interference mitigation technologies, such as the Septentrio AIM+, use signal-processing algorithms to flag spoofing by detecting various anomalies in the signal. For example, a spoofed signal is usually more powerful than an authentic GNSS signal.

AIM+ won’t even be fooled by an advanced GNSS signal generator: Spirent GSS9000. With realistic power levels and with actual navigation data within the signal, AIM+ can identify it as a “non-authentic” signal.

Other advanced anti-spoofing techniques such as using a dual-polarized antenna are being researched today, read more about this method here.

Satellite navigation data authentication

Various countries invest in spoofing resilience by building security directly into their GNSS satellites. With OS-NMA (Open Service Navigation Message Authentication), Galileo is the first satellite system to introduce an anti-spoofing service directly on a civil GNSS signal.

OS-NMA is a free service on the Galileo E1 frequency. It enables authentication of the navigation data on Galileo and even GPS satellites. Such navigation data carries information about satellite location and if altered will result in wrong receiver positioning computation. While currently in development, OS-NMA is planned to become publicly available in the near future. Also GPS is experimenting with satellite based anti-spoofing for civil users with their recent Chimera authentication system.

What is spoofing and how to ensure GPS security? (3)

Recently, within the scope of the FANTASTIC project led by GSA, OS-NMA anti-spoofing protection was implemented on a Septentrio receiver.

The strongest shield: signal-level GNSS authentication

The Galileo system will be offering Commercial Authentication Service (CAS) on the E6 signal with the highest level of security for safety-critical applications such as autonomous vehicles. The signal level encryption will be based on similar techniques as the military GPS signals. Only the receivers who have the secret key are able to track such encrypted signals. The secret key is also needed to generate the signal making it impossible to fake. CAS authentication techniques are currently being prototyped at Septentrio in collaboration with the European Space Agency.

*Spoof-resilient GNSS means reliable precise positioning and timing, and a peace of mind for everyone touched by this indispensable technology.

Footnote:

[1]GNSS refers to theconstellations of satellites broadcasting signals from space that transmit positioning and timing information to GNSS receivers on Earth. The receivers then use this information to determine their location. These systems include the American GPS, European Galileo, Russian GLONASS, Chinese BeiDou, Japanese QZSS (Michibiki) and the Indian NAVIC system.

References:

  1. arstechnica.com/science/2019/06/study-finds-that-a-gps-outage-would-cost-1-billion-per-day
  2. rntfnd.org/2018/10/26/russia-claims-us-spoofed-drones-to-attack-base/
  3. gps.gov/governance/advisory/meetings/2018-12/goward.pdf
  4. gpsworld.com/spoofing-in-the-black-sea-what-really-happened/
  5. Technical paper by Septentrio - Authentication by polarization: a powerful anti-spoofing method
  6. insidegnss.com/new-report-details-gnss-spoofing-including-denial-of-service-attacks/

Related Content

  • Insight article:Why secure GPS receivers are crucial for GNSS/INS systems?
  • Insight article:Spoofing: is your GPS attack proof?
  • Insight article:How to combat GPS jamming effectively with Advanced Interference Mitigation
  • Insight article:The €50 chirp jammer that brought a multi-million euro project to a standstill
  • Insight article:GNSS jamming and road tolling
  • Insight article:Set adrift by GPS jamming
  • Insight article:Jam proofing drones
  • Webinar:GNSS hacking, from satellite signals to hardware/software cybersecurity
  • Brochure:GPS / GNSS Spoofing - types, how to detect and mitigate
  • Brochure:GPS / GNSS Interference - counteracting jamming
What is spoofing and how to ensure GPS security? (2024)

FAQs

What is spoofing and how to ensure GPS security? ›

GPS spoofing involves a radio transmitter near a target that interferes with the actual GPS signals

GPS signals
GPS signals are broadcast by Global Positioning System satellites to enable satellite navigation. Receivers on or near the Earth's surface can determine location, time, and velocity using this information.
https://en.wikipedia.org › wiki › GPS_signals
being transmitted. GPS signals are often weak and transmitted through satellites. A stronger radio transmitter can be used to override the weaker signal and send illegitimate coordinates and information to the receiver.

What is GPS spoofing? ›

GPS spoofing is a malicious technique that manipulates the Global Positioning System (GPS) data, thereby misleading a GPS receiver about its actual location. This could potentially cause significant disruptions, as it can misdirect navigation systems, mislead delivery vehicles, or even trick smartphone apps.

What is spoofing and how it can be prevented? ›

The best way to prevent a spoofing attack, on the user education side of things, is to keep a lookout for signs that you are being spoofed. For example, a phishing attack that uses email spoofing may feature unusual grammar, poor spelling, or awkward language.

Why is spoofing a security risk? ›

A successful spoofing attack can have serious consequences – including stealing personal or company information, harvesting credentials for use in further attacks, spreading malware, gaining unauthorized network access, or bypassing access controls.

What is GPS jamming or spoofing? ›

Generally speaking, adversaries may attempt to disrupt position, navigation and time solutions derived from GPS in one of two ways: spoofing (making a GPS receiver calculate a false position); and jamming (overpowering GPS satellite signals locally so that a receiver can no longer operate).

How can we protect against GPS spoofing? ›

Ways to protect against GPS spoofing
  • Obscure or hide your real antennas. ...
  • Choose the location of your antennas carefully. ...
  • Install decoy antennas. ...
  • Add redundant antennas. ...
  • Use blocking antennas. ...
  • Use backups. ...
  • Practice good cyber hygiene.

What is spoofing and why is it illegal? ›

When is spoofing illegal? Under the Truth in Caller ID Act, FCC rules prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value. Anyone who is illegally spoofing can face penalties of up to $10,000 for each violation.

What is spoofing in simple words? ›

Spoofing is when someone or something pretends to be something else in an attempt to gain a victim's confidence, get access to a system, steal data, or spread malware.

How is spoofing done? ›

IP spoofing is a technique for gaining unauthorized access to a computer network by altering the source address in IP packet headers to a fake IP address. By doing so, hackers make it appear as if the network traffic is coming from a trusted source, often resembling an IP address from within the target's own network.

Can I stop spoofing? ›

Install a spam call blocking or spoofing protection app

You can also use a third-party call blocking app to help block robocalls, text spam, scam calls, and more. Popular options include: Nomorobo blocks robocalls, and also screens possible scammers. Truecaller blocks spam calls and can reveal spoofed numbers.

Is GPS spoofing illegal? ›

Is it illegal to spoof your location? Spoofing somebody's device and changing its location without the owner's consent is illegal. A fake GPS location can disrupt public services, and law enforcement takes this type of offense seriously.

What is an example of a spoof? ›

Parody examples can be found in Saturday Night Live's commercials and "Weird Al" Yankovic's songs. Though similar to parody, a spoof mocks a general genre rather than a specific work. Some examples of spoofs are the Scary Movie franchise and the novel Don Quixote.

What are the signs of spoofing? ›

Spoofed emails often come from addresses resembling, but not exactly the same as, legitimate ones. Spelling and Grammar Errors: Professional organizations typically have high standards for their communications. Poor spelling and grammar can be a warning sign.

How serious is spoofing? ›

Risks and Implications of Spoofing

It sneaks into private data like a thief, taking things like passwords, money details, or even personal secrets about customers. Financial Loss: Spoofing scams can trick people into sending money where it shouldn't go.

How do I mitigate GPS jamming? ›

One effective way to counter GPS jamming is to use Controlled Reception Pattern Antennas (CRPA) instead of standard GNSS antennas. CRPA are phased array antennas that shape their signal reception beams—minimizing the impact of jamming signals while optimizing the reception of GPS satellite signals.

What could happen if someone jammed or spoofed GPS? ›

Spoofing creates a false signal to suggest a receiver is somewhere it is not, whereas jamming emits signals that overpower the weaker satellite signals and stops location data reaching the receiver or renders it unintelligible.

How do you know if someone is spoofing? ›

If someone calls you and tells you that you called them but didn't, your number was likely being spoofed.

Can spoofing be detected? ›

Another method to detect email spoofing is to manually verify the email headers and IP addresses. By examining the email header information, you can track the path that the email took from the sender's server to your inbox.

What happens when you are spoofed? ›

Spoofing is when someone disguises an email address, sender name, phone number, or website URL—often just by changing one letter, symbol, or number—to convince you that you are interacting with a trusted source.

Top Articles
5 Red Flags to be Aware of Before Signing a Contract | Brothers Gutters
5 best ways to make money as a stay-at-home mom in 2024
Edina Omni Portal
Tlc Africa Deaths 2021
Amc Near My Location
Www.craigslist Augusta Ga
Smokeland West Warwick
B67 Bus Time
Iron Drop Cafe
Voyeuragency
Nier Automata Chapter Select Unlock
Walthampatch
Hair Love Salon Bradley Beach
Nj State Police Private Detective Unit
Best Nail Salon Rome Ga
Florida History: Jacksonville's role in the silent film industry
ZURU - XSHOT - Insanity Mad Mega Barrel - Speelgoedblaster - Met 72 pijltjes | bol
Kingdom Tattoo Ithaca Mi
Rapv Springfield Ma
Danielle Ranslow Obituary
3Movierulz
Giantbodybuilder.com
Craigslist Northern Minnesota
91 Octane Gas Prices Near Me
Ravens 24X7 Forum
Att U Verse Outage Map
Forager How-to Get Archaeology Items - Dino Egg, Anchor, Fossil, Frozen Relic, Frozen Squid, Kapala, Lava Eel, and More!
#scandalous stars | astrognossienne
Justin Mckenzie Phillip Bryant
Craigslist Lakeside Az
Whitehall Preparatory And Fitness Academy Calendar
Studentvue Columbia Heights
Deshuesadero El Pulpo
Final Fantasy 7 Remake Nexus
Tyler Perry Marriage Counselor Play 123Movies
Panorama Charter Portal
511Pa
VPN Free - Betternet Unlimited VPN Proxy - Chrome Web Store
Tricia Vacanti Obituary
Executive Lounge - Alle Informationen zu der Lounge | reisetopia Basics
Hovia reveals top 4 feel-good wallpaper trends for 2024
Luciane Buchanan Bio, Wiki, Age, Husband, Net Worth, Actress
Costco Gas Foster City
Cch Staffnet
Pickwick Electric Power Outage
855-539-4712
CPM Homework Help
Suppress Spell Damage Poe
Craigslist Sarasota Free Stuff
Lira Galore Age, Wikipedia, Height, Husband, Boyfriend, Family, Biography, Net Worth
Sleep Outfitters Springhurst
Latest Posts
Article information

Author: Pres. Lawanda Wiegand

Last Updated:

Views: 5687

Rating: 4 / 5 (71 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Pres. Lawanda Wiegand

Birthday: 1993-01-10

Address: Suite 391 6963 Ullrich Shore, Bellefort, WI 01350-7893

Phone: +6806610432415

Job: Dynamic Manufacturing Assistant

Hobby: amateur radio, Taekwondo, Wood carving, Parkour, Skateboarding, Running, Rafting

Introduction: My name is Pres. Lawanda Wiegand, I am a inquisitive, helpful, glamorous, cheerful, open, clever, innocent person who loves writing and wants to share my knowledge and understanding with you.