GPS-dependent positioning, navigation, and timing synchronization procedures have a significant impact on everyday life. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers for various motives. As such, spoofing and antispoofing algorithms have become an important research topic within the GPS discipline. This paper will provide a review of recent research in the field of GPS spoofing/anti-spoofing. The vulnerability of GPS to a spoofing attack will be investigated and then different spoofing generation techniques will be discussed. After introducing spoofing signal model, a brief review of recently proposed anti-spoofing techniques and their performance in terms of spoofing detection and spoofing mitigation will be provided. Limitations of anti-spoofing algorithms will be discussed and some methods will be introduced to ameliorate these limitations. In addition, testing the spoofing/anti-spoofing methods is a challenging topic that encounters some limitations due to stringent emission regulations. This paper will also provide a review of different test scenarios that have been adopted for testing anti-spoofing techniques. 1. Introduction GPS-dependent systems are ubiquitous in current positioning and navigation applications. There is an ever-increasing attention to safe and secure GPS applications such as air, marine, and ground transportations, police and rescue services, telecommunication systems, mobile phone location, and tracking the criminal offenders. Nowadays, most mobile phones as well as vehicles are equipped with positioning and navigation systems utilizing GPS. In addition, countless time tagging and synchronization systems in the telecom and electrical power grid industries rely primarily on GPS. As a consequence, such a widely used system is becoming an increasingly attractive target for illicit disruption by terrorists and hackers. GPS signals are vulnerable to in-band interferences because of being extremely weak broadcasted signals over wireless channels. Therefore, even a low-power interference can easily jam or spoof GPS receivers within a radius of several kilometres. In addition, GPS is a backward compatible technology whose signal structure is in the public domain [1]. This makes GPS technology more susceptible to disruptive interfering methods. For example, spoofing attack could effectively mislead an activity monitoring GPS receiver mounted on a cargo transport or fishing vessel. Therefore, the GPS receiver will be logging a counterfeit trajectory with
References
[1]
X. J. Cheng, K. J. Cao, J. N. Xu, and B. Li, “Analysis on forgery patterns for GPS civil spoofing signals,” in Proceedings of the 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT '09), pp. 353–356, Seoul, Korea, November 2009.
[2]
P. Y. Montgomery, T. E. Humphreys, and B. M. Ledvina, “Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer,” in Proceedings of the Institute of Navigation—International Technical Meeting (ITM '09), pp. 124–130, Anaheim, Calif, USA, January 2009.
[3]
T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O'Hanlon, and P. M. Kintner, “Assessing the spoofing threat: development of a portable gps civilian spoofer,” in Proceedings of the 21st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS '08), pp. 2314–2325, Savannah, Ga, USA, September 2008.
[4]
A. Cavaleri, B. Motella, M. Pini, and M. Fantino, “Detection of spoofed GPS signals at code and carrier tracking level,” in Proceedings of the 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC '10), pp. 1–6, December 2010.
[5]
A. Cavaleri, M. Pini, L. Lo Presti, and M. Fantino, “Signal quality monitoring applied to spoofing detection,” in Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS '11), Portland, Ore, USA, September 2011.
[6]
J. Nielsen, A. Broumandan, and G. Lachapelle, “Spoofing detection and mitigation with a moving handheld receiver,” GPS World, vol. 21, no. 9, pp. 27–33, 2010.
[7]
B. M. Ledvina, W. J. Bencze, B. Galusha, and I. Miller, “An in-line anti-spoofing device for legacy civil GPS receivers,” in Proceedings of the Institute of Navigation—International Technical Meeting (ITM '10), pp. 698–712, San Diego, Calif, USA, January 2010.
[8]
H. Wen, P. Y. R. Huang, J. Dyer, A. Archinal, and J. Fagan, “Countermeasures for GPS signal spoofing,” in Proceedings of the 18th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS '05), pp. 1285–1290, Long Beach, Calif, USA, September 2005.
[9]
S. Savasta, L. Lo Presti, F. Dovis, and D. Margaria, “Trustworthiness GNSS signal validation by a time-frequency approach,” in Proceedings of the 22nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS '09), pp. 66–75, Savannah, Ga, USA, September 2009.
[10]
X. J. Cheng, J. N. Xu, K. J. Cao, and W. Jie, “An authenticity verification scheme based on hidden messages for current civilian GPS signals,” in Proceedings of the 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT '09), pp. 345–352, Seoul, Korea, November 2009.
[11]
J. C. Juang, “GNSS spoofing analysis by VIAS,” in Coordinates Magazine, 2011.
[12]
A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle, “GPS spoofer countermeasure effectiveness based on signal strength, noise power and C/N0 observables,” International Journal of Satellite Communications and Networking, vol. 30, no. 4, pp. 181–191, 2012.
[13]
E. D. Kaplan and C. J. Hegarty, Understanding GPS Principles and Applications, Artech House, Boston, Mass, USA, 2nd edition, 2006.
[14]
C. E. McDowell, “GPS Spoofer and Repeater Mitigation System using Digital Spatial Nulling—US Patent 7250903 B1,” 2007.
[15]
S. C. Lo and P. K. Enge, “Authenticating aviation augmentation system broadcasts,” in Proceedings of the IEEE/ION Position, Location and Navigation Symposium (PLANS '10), pp. 708–717, Indian Wells, Calif, USA, May 2010.
[16]
S. Lo, D. De Lorenzo, P. Enge, D. Akos, and P. Bradley, “Signal Authentication, a secure civil GNSS for today,” GNSS magazine, pp. 30–39, 2009.
[17]
R. E. Phelts, Multicorrelator techniques for robust mitigation of threats to GPS signal quality [Ph.D. thesis], Standford University, Palo Alto, Calif, USA, 2001.
[18]
D. Shepard and T. Humphreys, “Characterization of receiver response to a spoofing attack,” in Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS '11), p. 2608, Portland, Ore, USA, September 2011.
[19]
N. A. White, P. S. Maybeck, and S. L. DeVilbiss, “Detection of interference/jamming and spoofing in a DCPS-aided inertial system,” IEEE Transactions on Aerospace and Electronic Systems, vol. 34, no. 4, pp. 1208–1217, 1998.
[20]
A. Jafarnia-Jahromi, T. Lin, A. Broumandan, J. Nielsen, and G. Lachapelle, “Detection and mitigation of spoofing attack on a vector based tracking GPS receiver,” in Proceedings of the International Technical Meeting of The Institute of Navigation, Newport Beach, Calif, USA, January 2012.
[21]
M. G. Petovello, Real-time integration of a tactical-grade IMU and GPS for high-accuracy positioning and navigation [Ph.D. thesis], Department of Geomatics Engineering, University of Calgary, Alberta, Canada.
[22]
L. Scott, “Anti-Spoofing and Authenticated Signal Architectures for Civil Navigation Systems,” in Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS/GNSS '03), Portland, Ore, USA, September 2003.
[23]
G. W. Hein, F. Kneissl, J. A. Avila-Rodriguez, and S. Wallner, “Authenticating GNSS: Proofs Against Spoofs Part 2,” GNSS magazine, pp. 58–63, 2007.
[24]
S. Moshavi, “Multi-user detection for DS-CDMA communications,” IEEE Communications Magazine, vol. 34, no. 10, pp. 124–135, 1996.
[25]
S. Daneshmand, A. Jafarnia-Jahromi, A. Broumandan, and G. Lachapelle, “A low complexity gnss spoofing mitigation technique using a double antenna array,” GPS World Magazine, vol. 22, no. 12, pp. 44–46, 2011.
[26]
H. L. V. Trees, Optimum Array Processing, Detection, Estimation, and Modulation Theory Part IV, John Wiley & Sons, New York, NY, USA, 2002.
[27]
H. Kuusniemi, A. Wieser, G. Lachapelle, and J. Takala, “User-level reliability monitoring in urban personal satellite-navigation,” IEEE Transactions on Aerospace and Electronic Systems, vol. 43, no. 4, pp. 1305–1318, 2007.