GNSS spoofing and anti-spoofing
GNSS (Global Navigation Satellite System) has been developed for several decades and becomes essential for a wide range of technologies in recent years. GNSS provides positioning, navigation, and timing services, which can be used in various aspects. However, civilian GNSS signal is vulnerable. Many...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis-Master by Coursework |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/164860 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | GNSS (Global Navigation Satellite System) has been developed for several decades and becomes essential for a wide range of technologies in recent years. GNSS provides positioning, navigation, and timing services, which can be used in various aspects. However, civilian GNSS signal is vulnerable. Many spoofing incidents happens in recent years Thus, GNSS spoofing and anti-spoofing techniques have been studied by more and more researchers. The target of GNSS spoofing is to let the GNSS receiver get fake information about its position.
Anti-spoofing is the method that counters the spoofing attack. This thesis content is based on GPS. Since GPS is the earliest GNSS, the conclusion based on GPS can be applied to other GNSS. Firstly, this thesis briefly reviews the spoofing and anti-spoofing techniques. Secondly, a GPS positioning process model with a spoofing attack is built, which contains the necessary parts of signal transmission and signal reception. Thirdly, a simulation program is developed based on the model, and a series of simulation spoofing experiments in which spoofing signals have different power levels were conducted. Finally, field spoofing and anti-spoofing experiments were conducted to verify
the results of the simulation. The simulation of this thesis finds that the receiver decode less number of satellites when there is a spoofing signal, which may impact the receiver’s capability to calculate its location. More satellites can be decoded as the spoofing signal power increases, which may spoof the receiver to a wrong location. The field experiment shows that a spoofer with higher power succeeds using less time. This thesis also proves that the GPS authentication scheme based on the Chameleon Hash is able to detect spoofing attacks.
Keywords: GNSS, GNSS spoofing, GNSS anti-spoofing, Simulation. |
---|