Papers
Topics
Authors
Recent
Search
2000 character limit reached

A real/fast-time simulator for impact assessment of spoofing & jamming attacks on GNSS receivers

Published 28 May 2024 in eess.SP, cs.SY, and eess.SY | (2405.17925v2)

Abstract: In aviation, the impact of threats is becoming increasingly significant, particularly for global navigation satellite system (GNSS). Two relevant GNSS threats are represented by jamming and spoofing. In order to evaluate the technological solutions to counter GNSS attacks, such attacks should be assessed by means of a proper GNSS threat simulator. This work shows the implementation and the testing results of a GNSS security impact simulator which injects the desired threat scenarios as a deviations on the GNSS actual measurements. The proposed simulator can be integrated in both real- and fast-time simulation environments. The provided results confirm the effectiveness of the simulator, and include in-flight demonstrations by means of a flight experimental vehicle.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (13)
  1. M. Le Fevre, B. Gölz, R. Flohr, T. Stelkens-Kobsch, and T. S. Verhoogt, “2.0 security risk assessment methodology for SESAR 2020; 02.00. 00,” SESAR Joint Undertaking: Brussels, Belgium, vol. 25, 2017.
  2. W. Wang and J. Wang, “GNSS induced spoofing simulation based on path planning,” IET Radar, Sonar & Navigation, vol. 16, no. 1, pp. 103–112, 2022. [Online]. Available: https://ietresearch.onlinelibrary.wiley.com/doi/abs/10.1049/rsn2.12167
  3. J. W. Betz, “Effect of narrowband interference on GPS code tracking accuracy,” in Proceedings of the 2000 National Technical Meeting of The Institute of Navigation, 2000, pp. 16–27.
  4. B. M. Titus, J. Betz, C. Hegarty, and R. Owen, “Intersystem and intrasystem interference analysis methodology,” in Proceedings of the 16th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS/GNSS 2003), 2003, pp. 2061–2069.
  5. W. Liu, S. Li, L. Liu, M. Niu, and X. Zhan, “A comprehensive methodology for assessing radio frequency compatibility for GPS, galileo and compass,” in Proceedings of the 23rd International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2010), 2010, pp. 943–954.
  6. R. H. Mitch, M. L. Psiaki, B. W. O’Hanlon, S. P. Powell, and J. A. Bhatti, “Civilian GPS jammer signal tracking and geolocation,” in Proceedings of the 25th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2012), 2012, pp. 2901–2920.
  7. D. Borio, C. O’Driscoll, and J. Fortuny, “Jammer impact on galileo and GPS receivers,” in 2013 International Conference on Localization and GNSS (ICL-GNSS).   IEEE, 2013, pp. 1–6.
  8. R. M. Geister, J.-P. Buch, D. Niedermeier, G. Gamba, L. Canzian, and O. Pozzobon, “Impact study on cyber threats to GNSS and FMS systems,” 2018.
  9. M. Coulon, A. Chabory, A. Garcia-Pena, J. Vezinet, C. Macabiau, P. Estival, P. Ladoux, and B. Roturier, “Characterization of meaconing and its impact on GNSS receivers,” in Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020), 2020, pp. 3713–3737.
  10. Y. Liu, S. Li, Q. Fu, and Z. Liu, “Impact assessment of GNSS spoofing attacks on INS/GNSS integrated navigation system,” Sensors, vol. 18, no. 5, 2018. [Online]. Available: https://www.mdpi.com/1424-8220/18/5/1433
  11. X. Zhao, X. Zhan, and K. Yan, “GNSS vulnerabilities: simulation, verification, and mitigation platform design,” Geo-spatial Information Science, vol. 16, no. 3, pp. 149–154, 2013.
  12. E. I. Adegoke, M. S. Bradbury, E. Kampert, M. D. Higgins, T. Watson, P. A. Jennings, C. R. Ford, G. Buesnel, and S. Hickling, “PNT cyber resilience : a lab2live observer based approach, report 1 : GNSS resilience and identified vulnerabilities. technical report 1,” March 2020. [Online]. Available: https://wrap.warwick.ac.uk/139519/
  13. D. Schmidt, K. Radke, S. Camtepe, E. Foo, and M. Ren, “A survey and analysis of the GNSS spoofing threat and countermeasures,” ACM Comput. Surv., vol. 48, no. 4, may 2016. [Online]. Available: https://doi.org/10.1145/2897166
Citations (1)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 0 likes about this paper.