Abstract
The Unmanned Aerial Vehicle often known as UAV plays a central role in providing multifarious services which can be encapsulated under following major categories namely military, research and civil. Various studies have revealed that unlike the military UAV the civil UAV uses unauthenticated, unencrypted and predictable signals and thus can be easily manipulated. With the burgeoning dependency on UAVs for time-critical response operations and many other, there is a need to secure the civil unmanned aerial system which lacks direct human interference. The goal of this paper is to focus on how Global Positioning System (GPS) signal spoofing allows the authentic ground control to change hands with threat actors. Spoofing forces erroneous location to be computed by target receiver by transmitting the counterfeit Global Navigation Satellite System like signals. The intention is to misinform the user about its location. In this paper, the UAVs vulnerability, resulting in complete command and control under the captor's influence, consequent to GPS spoofing, is analyzed and an analysis of the countermeasures to identify spoofing proposed by various researchers is done. While some countermeasures are computationally complex unsuitable for lightweight UAVs there are others that have been experimented on simulators. Very few have been established on real sensor data and have limitations of their own.
Similar content being viewed by others
References
Assessing the spoofing threat-GPS World. (2009, january 1). (GPS World Staff) Retrieved from https://www.gpsworld.com/defensesecurity-surveillanceassessing-spoofing-threat-3171/
Bardout, Y. (2011). Authentication of GNSS position: An assessment of spoofing detection methods. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011) (pp. 436-446).
Broumandan, A., Jafarnia-Jahromi, A., & Lachapelle, G. (2015). Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solutions, 19(3), 475–487.
Broumandan, A., Jafarnia-Jahromi, A., Dehghanian, V., Nielsen, J., & Lachapelle, G. (2012, April). GNSS spoofing detection in handheld receivers based on signal spatial correlation. In Proceedings of the 2012 IEEE/ION Position, Location and Navigation Symposium (pp. 479-487). IEEE.
Dehghanian, V., Nielsen, J., & Lachapelle, G. (2012). GNSS spoofing detection based on receiver C/No estimates. In Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012) (pp. 2878-2884).
Dovis, F. C. (2011). Detection of Spoofing Threats by Means of Signal Parameters Estimation. Portland: ION GNSS.
He, L., Li, W., Guo, C., & Niu, R. (2014, December). Civilian unmanned aerial vehicle vulnerability to gps spoofing attacks. In 2014 Seventh International Symposium on Computational Intelligence and Design (Vol. 2, pp. 212-215). IEEE.
He, L., Li, W., Guo, C., & Niu, R. (n.d.). Civilian Unmanned aerial vehicle Vulnerability to GPS Spoofing Attacks. IEEE.
Humphreys, T. E. (2008). September). Assessing the spoofing threat: Development of a portable GPS civilian spoofer.
Humphreys, T. E., Bhatti, J. A., Shepard, D., & Wesson, K. (2012). The Texas spoofing test battery: Toward a standard for evaluating GPS signal authentication techniques. In Radionavigation Laboratory Conference Proceedings..
Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O'Hanlon, B. W., & Kintner, P. M. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. In Radionavigation laboratory conference proceedings.
Hwang, P. Y., & McGraw, G. A. (2014, May). Receiver Autonomous Signal Authentication (RASA) based on clock stability analysis. In 2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014 (pp. 270-281). IEEE..
Jafarnia-Jahromi, A., Lin, T., Broumandan, A., Nielsen, J., & Lachapelle, G. (2012). Detection and mitigation of spoofing attacks on a vector-based tracking GPS receiver. Newport Beach, CA: ION ITM.
Javaid, A. Y., Sun, W., Devabhaktuni, V. K., & Alam, M. (2012, November). Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In 2012 IEEE Conference on Technologies for Homeland Security (HST) (pp. 585-590). IEEE.
Jovanovic, A., Botteron, C., & Fariné, P. A. (2014, May). Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. In 2014 IEEE/ION Position, Location and Navigation Symposium-PLANS 2014 (pp. 1258-1271). IEEE.
Kerns, A. J., Shepard, D. P., Bhatti, J. A., & Humphreys, T. E. (2014). Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 617–636.
Khanafseh, S., et al. (2014). GPS spoofing detection using RAIM with INS coupling. IEEE/ION Position, Location and Navigation Symposium. https://doi.org/10.1109/PLANS.2014.6851498
Konovaltsev, A., Cuntz, M., Haettich, C., & Meurer, M. (2013). Performance analysis of joint multi-antenna spoofing detection and attitude estimation. In Proceedings of ION International Technical Meeting 2013 (ION ITM 2013).
Levin, P., De Lorenzo, D., Enge, P., & Lo, S. (2011). Authenticating a Signal Based on an Unknown Component Thereof. US Patent 7,969,354 B2.
Li, Z., & Gebre-Egziabher, D. (2013). Performance analysis of a civilian gps position authentication system. Navigation, 60(4), 249–265.
Li, Z. a.-E. (Winter 2013). Performance Analysis of a Civilian GPS Position Authentication System. Navigation, Vol. 60, No. 4.
Lo, S., De Lorenzo, D., Enge, P., Akos, D., & Bradley, P. (2009). Signal authentication: A secure civil GNSS for today. inside GNSS, 4(5), 30-39.
Mead, J., Bobda, C., & Whitaker, T. J. (2016, December). Defeating drone jamming with hardware sandboxing. In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST) (pp. 1-6). IEEE.
Nielsen, J., Broumandan, A., & Lachapelle, G. (2011). GNSS spoofing detection for single antenna handheld receivers. Navigation, 58(4), 335–344.
Nielsen et al. (2011). Method and System for Detecting GNSS Spoofing Signals. US Patent 7,952,519 B1, filed Apr 16, 2010, and issued May 31, 2011.
O’Hanlon, B. W., Psiaki, M. L., Bhatti, J. A., Shepard, D. P., & Humphreys, T. E. (2013). Real-time GPS spoofing detection via correlation of encrypted signals. Navigation, 60(4), 267–278.
Pini, M., et al. (2011). Signal quality monitoring applied to spoofing detection. In Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2011) (pp. 1888-1896)..
Psiaki, M. L., & Humphreys, T. E. (2016). GNSS Spoofing and Detection. Proceedings of the IEEE, 104(6), 1258–1270.
Psiaki, M. L., Powell, S. P., & O’Hanlon, B. W. (2013). GNSS spoofing detection: Correlating carrier phase with rapid antenna motion. GPS World, 24(6), 53–58.
Psiaki, M. et al. (2014).GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase. US Patent 8,712,051 B2, issued Apr 2014.
Psiaki, M.L., B.W. O'Hanlon, J.A. Bhatti, D.P. Shepard, & Humphreys, T.E. (2011). Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals. In Proceedings of ION GNSS. Portland, Oregon.
Ranganathan, A., Ólafsdóttir, H., & Capkun, S. (2016, October). Spree: A spoofing resistant gps receiver. In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (pp. 348-360).
Tippenhauer, N. O., Pöpper, C., Rasmussen, K. B., & Capkun, S. (2011). On the requirements for successful GPS spoofing attacks. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 75-86)..
Turner et al., (2013, September). PROSPA: Open service authentication. In Proceedings of the 26th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2013) (pp. 2992-2996)..
US Air Force, GPS Support Center. (2003). Retrieved from https://www.peterson.af.mil/GPS_Support/
Wallischeck, E. (2016). Volpe, John A. National Transportation Systems Center, Vulnerability ment Of The Transportation Infrastructure Relying On The Global Positioning System, Final Report., Department of Transportation. Retrieved from https://www.navcen.uscg.gov/archive/2001/Oct/FinalRep
Warner, J. S., & Johnston, R. G. (2003). GPS spoofing countermeasures, vulnerability assessment team, los alamos national laboratory research paper LAUR-03-6163. New Mexico, USA: Los Alamos.
Wesson, K. R. (2012). Practical cryptographic civil gps signal authentication navigation. Journal of the Institute of Navigation, 59(3), 177–193.
Wesson, K. R. (2011) A Proposed Navigation Message Authentication Implementation for Civil GPS Anti-Spoofing,. Proc. ION GNSS, Portland.
Wesson, K. S. (2011). An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing. Proc. ION GNSS 2011. Portland.
Wilbur L Myrick, M. P. (2015). Multistage anti-spoof GPS interference correlator (MAGIC). IEEE Military Communications Conference. IEEE, 1497–1502
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Ranyal, E., Jain, K. Unmanned Aerial Vehicle’s Vulnerability to GPS Spoofing a Review. J Indian Soc Remote Sens 49, 585–591 (2021). https://doi.org/10.1007/s12524-020-01225-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12524-020-01225-1