Abstract

Spoofing can seriously threaten the use of the Global Positioning System (GPS) in critical applications such as positioning and navigation of autonomous vehicles. Research into spoofing generation will contribute to assessment of the threat of possible spoofing attacks and help in the development of anti-spoofing methods. However, the recent commercial off-the-shelf (COTS) spoofing generators are expensive and the technology implementation is complicated. To address the above problem and promote the GPS safety-critical applications, a spoofing generator using a vector tracking-based software-defined receiver is proposed in this contribution. The spoofing generator aims to modify the raw signals by cancelling the actual signal component and adding the spoofing signal component. The connections between the spreading code and carrier, and the states of the victim receiver are established through vector tracking. The actual signal can be predicted effectively, and the spoofing signal will be generated with the spoofing trajectory at the same time. The experimental test results show that the spoofing attack signal can effectively mislead the victim receiver to the designed trajectory. Neither the tracking channels nor the positioning observations have abnormal changes during this processing period. The recent anti-spoofing methods cannot detect this internal spoofing easily. The proposed spoofing generator can cover all open-sky satellites with a high quality of concealment. With the superiority of programmability and diversity, it is believed that the proposed method based on an open source software-defined receiver has a great value for anti-spoofing research of different GNSS signals.

Highlights

  • Autonomous vehicles require an extremely accurate, robust, and reliable navigation system [1,2].Global Navigation Satellite Systems (GNSSs), such as Global Positioning System (GPS) receivers are heavily relied upon in current autonomous vehicular navigation solutions

  • A GPS spoofing generator using vector tracking-based software-defined receiver (SDR) is proposed in this paper

  • The modified signal still maintains the actual amplitude, satellite be ignored is its reliance on the vector tracking receiver

Read more

Summary

Introduction

Autonomous vehicles require an extremely accurate, robust, and reliable navigation system [1,2]. Extending from the above spoofing attack on autonomous vehicles, hacker cyberattacks are hazardous and should not be neglected [19], where the non-overlapped scenario still can be created even after the raw signal has been collected by the antenna. Many methods have been proposed for spoofing detection, for example, the cryptographic signal method [20,21,22], the multi-sensor aided method [23,24,25], the antenna aided method [26,27,28], and the signal features method [29,30,31] All these spoofing detection methods show limitations to detection of the non-overlapped spoofing attack, where it can be concealed as it does not need to change the signal power or C/N0 to suppress the actual signal. The second consistency criterion is that the proposed method is based on a vector tracking receiver It can take advantage of the relationship between loop information and receiver states to attack visible satellites to preserve observation consistency.

Spoofing
Actual Signal Prediction and Spoofing Signal Generation
Experimental Test and Analysis
Trajectory Design
Performance in Positioning
12. Pseudo-range residuals in in every tracking
Discussion
Conclusions
Results

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.