GNSS spoofing and anti-spoofing

GNSS (Global Navigation Satellite System) has been developed for several decades and becomes essential for a wide range of technologies in recent years. GNSS provides positioning, navigation, and timing services, which can be used in various aspects. However, civilian GNSS signal is vulnerable. Many...

Full description

Saved in:
Bibliographic Details
Main Author: Liu, Haoxin
Other Authors: Tan Soon Yim
Format: Thesis-Master by Coursework
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/164860
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:GNSS (Global Navigation Satellite System) has been developed for several decades and becomes essential for a wide range of technologies in recent years. GNSS provides positioning, navigation, and timing services, which can be used in various aspects. However, civilian GNSS signal is vulnerable. Many spoofing incidents happens in recent years Thus, GNSS spoofing and anti-spoofing techniques have been studied by more and more researchers. The target of GNSS spoofing is to let the GNSS receiver get fake information about its position. Anti-spoofing is the method that counters the spoofing attack. This thesis content is based on GPS. Since GPS is the earliest GNSS, the conclusion based on GPS can be applied to other GNSS. Firstly, this thesis briefly reviews the spoofing and anti-spoofing techniques. Secondly, a GPS positioning process model with a spoofing attack is built, which contains the necessary parts of signal transmission and signal reception. Thirdly, a simulation program is developed based on the model, and a series of simulation spoofing experiments in which spoofing signals have different power levels were conducted. Finally, field spoofing and anti-spoofing experiments were conducted to verify the results of the simulation. The simulation of this thesis finds that the receiver decode less number of satellites when there is a spoofing signal, which may impact the receiver’s capability to calculate its location. More satellites can be decoded as the spoofing signal power increases, which may spoof the receiver to a wrong location. The field experiment shows that a spoofer with higher power succeeds using less time. This thesis also proves that the GPS authentication scheme based on the Chameleon Hash is able to detect spoofing attacks. Keywords: GNSS, GNSS spoofing, GNSS anti-spoofing, Simulation.