Skip to main content
Log in

Unmanned Aerial Vehicle’s Vulnerability to GPS Spoofing a Review

  • Review Article
  • Published:
Journal of the Indian Society of Remote Sensing Aims and scope Submit manuscript

Abstract

The Unmanned Aerial Vehicle often known as UAV plays a central role in providing multifarious services which can be encapsulated under following major categories namely military, research and civil. Various studies have revealed that unlike the military UAV the civil UAV uses unauthenticated, unencrypted and predictable signals and thus can be easily manipulated. With the burgeoning dependency on UAVs for time-critical response operations and many other, there is a need to secure the civil unmanned aerial system which lacks direct human interference. The goal of this paper is to focus on how Global Positioning System (GPS) signal spoofing allows the authentic ground control to change hands with threat actors. Spoofing forces erroneous location to be computed by target receiver by transmitting the counterfeit Global Navigation Satellite System like signals. The intention is to misinform the user about its location. In this paper, the UAVs vulnerability, resulting in complete command and control under the captor's influence, consequent to GPS spoofing, is analyzed and an analysis of the countermeasures to identify spoofing proposed by various researchers is done. While some countermeasures are computationally complex unsuitable for lightweight UAVs there are others that have been experimented on simulators. Very few have been established on real sensor data and have limitations of their own.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Source: Jon S. Warner et al., GPS Spoofing Countermeasures

Fig. 2

Source: Jon S. Warner et al.,

Fig. 3

Source: Jon S. Warner et al., GPS Spoofing Countermeasures

Similar content being viewed by others

References

  • Assessing the spoofing threat-GPS World. (2009, january 1). (GPS World Staff) Retrieved from https://www.gpsworld.com/defensesecurity-surveillanceassessing-spoofing-threat-3171/

  • Bardout, Y. (2011). Authentication of GNSS position: An assessment of spoofing detection methods. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011) (pp. 436-446).

  • Broumandan, A., Jafarnia-Jahromi, A., & Lachapelle, G. (2015). Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solutions, 19(3), 475–487.

    Article  Google Scholar 

  • Broumandan, A., Jafarnia-Jahromi, A., Dehghanian, V., Nielsen, J., & Lachapelle, G. (2012, April). GNSS spoofing detection in handheld receivers based on signal spatial correlation. In Proceedings of the 2012 IEEE/ION Position, Location and Navigation Symposium (pp. 479-487). IEEE.

  • Dehghanian, V., Nielsen, J., & Lachapelle, G. (2012). GNSS spoofing detection based on receiver C/No estimates. In Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012) (pp. 2878-2884).

  • Dovis, F. C. (2011). Detection of Spoofing Threats by Means of Signal Parameters Estimation. Portland: ION GNSS.

    Google Scholar 

  • He, L., Li, W., Guo, C., & Niu, R. (2014, December). Civilian unmanned aerial vehicle vulnerability to gps spoofing attacks. In 2014 Seventh International Symposium on Computational Intelligence and Design (Vol. 2, pp. 212-215). IEEE.

  • He, L., Li, W., Guo, C., & Niu, R. (n.d.). Civilian Unmanned aerial vehicle Vulnerability to GPS Spoofing Attacks. IEEE.

  • Humphreys, T. E. (2008). September). Assessing the spoofing threat: Development of a portable GPS civilian spoofer.

    Google Scholar 

  • Humphreys, T. E., Bhatti, J. A., Shepard, D., & Wesson, K. (2012). The Texas spoofing test battery: Toward a standard for evaluating GPS signal authentication techniques. In Radionavigation Laboratory Conference Proceedings..

  • Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O'Hanlon, B. W., & Kintner, P. M. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings.

  • Hwang, P. Y., & McGraw, G. A. (2014, May). Receiver Autonomous Signal Authentication (RASA) based on clock stability analysis. In 2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014 (pp. 270-281). IEEE..

  • Jafarnia-Jahromi, A., Lin, T., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). Detection and mitigation of spoofing attacks on a vector-based tracking GPS receiver. Newport Beach, CA: ION ITM.

    Google Scholar 

  • Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In 2012 IEEE Conference on Technologies for Homeland Security (HST) (pp. 585-590). IEEE.

  • Jovanovic, A., Botteron, C., & Fariné, P. A. (2014, May). Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. In 2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014 (pp. 1258-1271). IEEE.

  • Kerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 617–636.

    Article  Google Scholar 

  • Khanafseh, S., et al. (2014). GPS spoofing detection using RAIM with INS coupling. IEEE/ION Position, Location and Navigation Symposium. https://doi.org/10.1109/PLANS.2014.6851498

    Article  Google Scholar 

  • Konovaltsev, A., Cuntz, M., Haettich, C., & Meurer, M. (2013). Performance analysis of joint multi-antenna spoofing detection and attitude estimation. In Proceedings of ION International Technical Meeting 2013 (ION ITM 2013).

  • Levin, P., De Lorenzo, D., Enge, P., & Lo, S. (2011). Authenticating a Signal Based on an Unknown Component Thereof. US Patent 7,969,354 B2.

  • Li, Z., & Gebre-Egziabher, D. (2013). Performance analysis of a civilian gps position authentication system. Navigation, 60(4), 249–265.

    Article  Google Scholar 

  • Li, Z. a.-E. (Winter 2013). Performance Analysis of a Civilian GPS Position Authentication System. Navigation, Vol. 60, No. 4.

  • Lo, S., De Lorenzo, D., Enge, P., Akos, D., & Bradley, P. (2009). Signal authentication: A secure civil GNSS for today. inside GNSS, 4(5), 30-39.

  • Mead, J., Bobda, C., & Whitaker, T. J. (2016, December). Defeating drone jamming with hardware sandboxing. In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) (pp. 1-6). IEEE.

  • Nielsen, J., Broumandan, A., & Lachapelle, G. (2011). GNSS spoofing detection for single antenna handheld receivers. Navigation, 58(4), 335–344.

    Article  Google Scholar 

  • Nielsen et al. (2011). Method and System for Detecting GNSS Spoofing Signals. US Patent 7,952,519 B1, filed Apr 16, 2010, and issued May 31, 2011.

  • O’Hanlon, B. W., Psiaki, M. L., Bhatti, J. A., Shepard, D. P., & Humphreys, T. E. (2013). Real-time GPS spoofing detection via correlation of encrypted signals. Navigation, 60(4), 267–278.

    Article  Google Scholar 

  • Pini, M., et al. (2011). Signal quality monitoring applied to spoofing detection. In Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2011) (pp. 1888-1896)..

  • Psiaki, M. L., & Humphreys, T. E. (2016). GNSS Spoofing and Detection. Proceedings of the IEEE, 104(6), 1258–1270.

    Article  Google Scholar 

  • Psiaki, M. L., Powell, S. P., & O’Hanlon, B. W. (2013). GNSS spoofing detection: Correlating carrier phase with rapid antenna motion. GPS World, 24(6), 53–58.

    Google Scholar 

  • Psiaki, M.  et al. (2014).GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase. US Patent 8,712,051 B2, issued Apr 2014.

  • Psiaki, M.L., B.W. O'Hanlon, J.A. Bhatti, D.P. Shepard, & Humphreys, T.E. (2011). Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals. In Proceedings of ION GNSS. Portland, Oregon.

  • Ranganathan, A., Ólafsdóttir, H., & Capkun, S. (2016, October). Spree: A spoofing resistant gps receiver. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (pp. 348-360).

  • Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B., & Capkun, S. (2011). On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 75-86)..

  • Turner et al., (2013, September). PROSPA: Open service authentication. In Proceedings of the 26th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2013) (pp. 2992-2996)..

  • US Air Force, GPS Support Center. (2003). Retrieved from https://www.peterson.af.mil/GPS_Support/

  • Wallischeck, E. (2016). Volpe, John A. National Transportation Systems Center, Vulnerability ment Of The Transportation Infrastructure Relying On The Global Positioning System, Final Report., Department of Transportation. Retrieved from https://www.navcen.uscg.gov/archive/2001/Oct/FinalRep

  • Warner, J. S., & Johnston, R. G. (2003). GPS spoofing countermeasures, vulnerability assessment team, los alamos national laboratory research paper LAUR-03-6163. New Mexico, USA: Los Alamos.

    Google Scholar 

  • Wesson, K. R. (2012). Practical cryptographic civil gps signal authentication navigation. Journal of the Institute of Navigation, 59(3), 177–193.

    Article  Google Scholar 

  • Wesson, K. R. (2011) A Proposed Navigation Message Authentication Implementation for Civil GPS Anti-Spoofing,. Proc. ION GNSS, Portland.

  • Wesson, K. S. (2011). An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing. Proc. ION GNSS 2011. Portland.

  • Wilbur L Myrick, M. P. (2015). Multistage anti-spoof GPS interference correlator (MAGIC). IEEE Military Communications Conference. IEEE, 1497–1502

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eshta Ranyal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ranyal, E., Jain, K. Unmanned Aerial Vehicle’s Vulnerability to GPS Spoofing a Review. J Indian Soc Remote Sens 49, 585–591 (2021). https://doi.org/10.1007/s12524-020-01225-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12524-020-01225-1

Keywords

Navigation