What is spoofing and how to ensure GPS security? (2024)

What is spoofing and how to ensure GPS security? (1)

Why GPS spoofing?

Imagine a combat situation. Clearly, the side which uses GPS/GNSS technology would have an advantage over the side which does not. But what if one side could manipulate GPS receivers of their adversary? This could mean taking over control of autonomous vehicles and robotic devices which rely on GPS positioning. For example, in October 2018, Russia accused the US of spoofing a drone and redirecting it to attack a Russian air base in Syria(2).

In the last 3 years over 600 incidents of spoofing have been recorded in the seas near the Russian border. These ships appeared to be “transported” to nearby airports (3). This type of spoofing might have been introduced as a defense mechanism to ground spy drones. Most semi-professional drones on the market have a built-in geo-fencing mechanism which lands them automatically if they come close to airports or other restricted areas (4).

Some of the most enthusiastic spoofers are Pokémon GO fans who use cheap SDRs (Software Defined Radios) to spoof their GPS position and catch elusive pokémon without having to leave their room.

Types of Spoofing

Spoofers overpower relatively weak GNSS signals with radio signals carrying false positioning information. There are two ways of spoofing:

    1. Rebroadcasting GNSS signals recorded at another place or time (so-called meaconing)
    2. Generating and transmitting modified satellite signals

Spoof-proof: how to protect your receiver against spoofing?

In order to combat spoofing, GNSS receivers need to detect spoofed signals out of a mix of authentic and spoofed signals. Once a satellite signal is flagged as spoofed, it can be excluded from positioning calculation.

There are various levels of spoofing protection that a receiver can offer. Let’s compare it to a house intrusion detection system. You can have a simple entry alarm system or a more complex movement detection system. For added security you might install video image recognition, breaking-glass sound detection or a combination of the above.

Like a house with an open door, an unprotected GNSS receiver is vulnerable to even the simplest forms of spoofing. Secured receivers, on the other hand, can detect spoofing by looking for signal anomalies, or by using signals designed to prevent spoofing such as Galileo OS-NMA and E6 or the GPS military code.

Advanced interference mitigation technologies, such as the Septentrio AIM+, use signal-processing algorithms to flag spoofing by detecting various anomalies in the signal. For example, a spoofed signal is usually more powerful than an authentic GNSS signal.

AIM+ won’t even be fooled by an advanced GNSS signal generator: Spirent GSS9000. With realistic power levels and with actual navigation data within the signal, AIM+ can identify it as a “non-authentic” signal.

Other advanced anti-spoofing techniques such as using a dual-polarized antenna are being researched today, read more about this method here.

Satellite navigation data authentication

Various countries invest in spoofing resilience by building security directly into their GNSS satellites. With OS-NMA (Open Service Navigation Message Authentication), Galileo is the first satellite system to introduce an anti-spoofing service directly on a civil GNSS signal.

OS-NMA is a free service on the Galileo E1 frequency. It enables authentication of the navigation data on Galileo and even GPS satellites. Such navigation data carries information about satellite location and if altered will result in wrong receiver positioning computation. While currently in development, OS-NMA is planned to become publicly available in the near future. Also GPS is experimenting with satellite based anti-spoofing for civil users with their recent Chimera authentication system.

What is spoofing and how to ensure GPS security? (3)

Recently, within the scope of the FANTASTIC project led by GSA, OS-NMA anti-spoofing protection was implemented on a Septentrio receiver.

The strongest shield: signal-level GNSS authentication

The Galileo system will be offering Commercial Authentication Service (CAS) on the E6 signal with the highest level of security for safety-critical applications such as autonomous vehicles. The signal level encryption will be based on similar techniques as the military GPS signals. Only the receivers who have the secret key are able to track such encrypted signals. The secret key is also needed to generate the signal making it impossible to fake. CAS authentication techniques are currently being prototyped at Septentrio in collaboration with the European Space Agency.

*Spoof-resilient GNSS means reliable precise positioning and timing, and a peace of mind for everyone touched by this indispensable technology.

Footnote:

[1]GNSS refers to theconstellations of satellites broadcasting signals from space that transmit positioning and timing information to GNSS receivers on Earth. The receivers then use this information to determine their location. These systems include the American GPS, European Galileo, Russian GLONASS, Chinese BeiDou, Japanese QZSS (Michibiki) and the Indian NAVIC system.

References:

  1. arstechnica.com/science/2019/06/study-finds-that-a-gps-outage-would-cost-1-billion-per-day
  2. rntfnd.org/2018/10/26/russia-claims-us-spoofed-drones-to-attack-base/
  3. gps.gov/governance/advisory/meetings/2018-12/goward.pdf
  4. gpsworld.com/spoofing-in-the-black-sea-what-really-happened/
  5. Technical paper by Septentrio - Authentication by polarization: a powerful anti-spoofing method
  6. insidegnss.com/new-report-details-gnss-spoofing-including-denial-of-service-attacks/

Related Content

  • Insight article:Why secure GPS receivers are crucial for GNSS/INS systems?
  • Insight article:Spoofing: is your GPS attack proof?
  • Insight article:How to combat GPS jamming effectively with Advanced Interference Mitigation
  • Insight article:The €50 chirp jammer that brought a multi-million euro project to a standstill
  • Insight article:GNSS jamming and road tolling
  • Insight article:Set adrift by GPS jamming
  • Insight article:Jam proofing drones
  • Webinar:GNSS hacking, from satellite signals to hardware/software cybersecurity
  • Brochure:GPS / GNSS Spoofing - types, how to detect and mitigate
  • Brochure:GPS / GNSS Interference - counteracting jamming
What is spoofing and how to ensure GPS security? (2024)

FAQs

What is GPS spoofing? ›

GPS spoofing, also known as GPS simulation, refers to the practice of manipulating or tricking a GPS receiver by broadcasting false GPS signals. Essentially, it misleads the GPS receiver into believing it is located somewhere it is not, resulting in the device providing inaccurate location data.

How can we protect against GPS spoofing? ›

Ways to protect against GPS spoofing
  • Obscure or hide your real antennas. ...
  • Choose the location of your antennas carefully. ...
  • Install decoy antennas. ...
  • Add redundant antennas. ...
  • Use blocking antennas. ...
  • Use backups. ...
  • Practice good cyber hygiene.
Aug 16, 2023

How can we mitigate GPS spoofing? ›

As a response to the increasing prevalence of GPS spoofing, various countermeasures are being developed to secure GPS-based systems, including signal strength monitoring, time-of-arrival analysis, and cryptographic authentication.

Can you tell if someone is spoofing their location? ›

While detecting fake GPS locations can sometimes require specialized tools and technologies, the most effective way to detect if the holder of a mobile device is faking a GPS signal is by detecting the installation of a GPS spoofing app.

What is spoofing and how is it done? ›

Spoofing uses a fake email address, display name, phone number, or web address to trick people into believing that they are interacting with a known, trusted source. Phishing tricks you into providing personal data that can be used for identity theft.

Does aluminum foil block GPS signal? ›

Yes, the GPS signals can be blocked by wet trees, aluminum foil, plastic containers, or even a tin box filled with thick materials can block GPS signals.

Can you prevent spoofing? ›

Be wary of strange attachments: Don't open attachments that you don't expect to receive, especially if they have unusual file extensions. Hide your IP address: Get in the habit of hiding your IP address when surfing the web to prevent IP spoofing.

Is there a way to block GPS tracking? ›

How to Block Vehicle GPS Tracking
  1. 1 Use a plug-in GPS blocker.
  2. 2 Carry a handheld GPS blocker.
  3. 3 Wrap the GPS device in aluminum foil.
  4. 4 Remove the GPS tracker's battery.
  5. 5 Disable location tracking on your cell phone.
  6. 6 Search the exterior of your vehicle.
  7. 7 Examine the interior of your vehicle.

How do apps detect GPS spoofing? ›

Appdome scans for installed hooks utilizing a variety of common reverse engineering tools and frameworks associated with GPS APIs. This is done to prevent unauthorized modification or access to GPS data, thus ensuring that user's mobile apps remain safeguarded against GPS spoofing.

What is the defense against spoofing? ›

Businesses can use antivirus and firewall protection to defend against spoofing attacks. Antivirus software scans and eliminates malicious code, while firewalls monitor network traffic, blocking suspicious data packets and unprivileged access.

What is the difference between GPS jamming and spoofing? ›

Generally speaking, adversaries may attempt to disrupt position, navigation and time solutions derived from GPS in one of two ways: spoofing (making a GPS receiver calculate a false position); and jamming (overpowering GPS satellite signals locally so that a receiver can no longer operate).

What are the mitigation strategies for spoofing? ›

Packet filtering can prevent an IP spoofing attack since it is able to filter out and block packets that contain conflicting source address information. Using cryptographic network protocols such as HTTP Secure (HTTPS) and Secure Shell (SSH) can add another layer of protection to your environment.

Can you find out who spoofed you? ›

It may be possible to track down a spoofer by convincing a phone carrier and law enforcement to begin an investigation but this can be incredibly time consuming and still isn't guaranteed to get the result you require.

Is GPS spoofing illegal? ›

Spoofing somebody's device and changing its location without the owner's consent is illegal. A fake GPS location can disrupt public services, and law enforcement takes this type of offense seriously.

How serious is spoofing? ›

Spoofing attacks can take many forms, including email, caller ID, IP address, and GPS spoofing, each with its unique risks and implications. The consequences of spoofing can be severe, ranging from data breaches and financial loss to reputational damage and operational disruption.

Can spoofing be detected? ›

While there's no completely accurate way to detect a spoofed number, there are several techniques which can help you get a fairly good idea about what's going on and may help you catch a spoofer or scammer in their tracks. Google the phone number.

How illegal is spoofing? ›

When is spoofing illegal? Under the Truth in Caller ID Act, FCC rules prohibit anyone from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm or wrongly obtain anything of value. Anyone who is illegally spoofing can face penalties of up to $10,000 for each violation.

Top Articles
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 6368

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.