Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Global Navigation Satellite Systems (GNSS) - Attacks and Countermeasures
 
conference paper

Global Navigation Satellite Systems (GNSS) - Attacks and Countermeasures

Papadimitatos, Panos  
•
Jovanovic, Aleksandar
2008
IEEE Military Communications Conference (IEEE MILCOM)
IEEE Military Communications Conference (IEEE MILCOM)

Increasing numbers of mobile computing devices, user-portable, or embedded in vehicles, cargo containers, or the physical space, need to be aware of their location in order to provide a wide range of commercial services. Most often, mobile devices obtain their own location with the help of global navigation satellite systems (GNSS), integrating, for example, a global positioning system (GPS) receiver. Nonetheless, an adversary can compromise location-aware applications by attacking the GNSS-based positioning: It can forge navigation messages and mislead the receiver into calculating a fake location. In this paper, we analyze this vulnerability and propose and evaluate the effectiveness of countermeasures. First, we consider replay attacks, which can be effective even in the presence of future cryptographic GNSS protection mechanisms. Then, we propose and analyze methods that allow GNSS receivers to detect the reception of signals generated by an adversary, and then reject fake locations calculated because of the attack. We consider three diverse defense mechanisms, all based on knowledge, in particular, own location, time, and Doppler shift, receivers can obtain prior to the onset of an attack. We find that inertial mechanisms that estimate location can be defeated relatively easy. This is equally true for the mechanism that relies on clock readings from off-the-shelf devices; as a result, highly stable clocks could be needed. On the other hand, our Doppler Shift Test can be effective without any specialized hardware, and it can be applied to existing devices.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1109/MILCOM.2008.4753512
Web of Science ID

WOS:000266709302018

Author(s)
Papadimitatos, Panos  
Jovanovic, Aleksandar
Date Issued

2008

Published in
IEEE Military Communications Conference (IEEE MILCOM)
Start page

3168

End page

3174

Subjects

security

•

positioning

•

navigation systems

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LCA  
LDS  
ESPLAB  
Event nameEvent placeEvent date
IEEE Military Communications Conference (IEEE MILCOM)

San Diego, CA, USA

November 16-19, 2008

Available on Infoscience
March 7, 2009
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/35800
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés