TAG: spoofing

GPS Source Receives USAF GPS Directorate Approval for GLI-FLO

July 29, 2013By
GPS Source's GLI-FLO.

GPS Source announced today that GLI-FLO has been granted security approval by the U.S. Air Force Global Positioning Systems Directorate. The GPS Directorate security approval provides GPS Source with the opportunity to supply military end-users and prime contractors with a DAGR Distributed Device (D3) that meets the mandate for reliability and security, GPS Source said. GLI-FLO is a secure (ICD-GPS-153... read more

This article is tagged with , , , , and posted in Defense News, GNSS News, Government News, Latest News, Warfighter

Innovation: GNSS Spoofing Detection

June 1, 2013By
In-opener

It's a hostile (electronic) world out there, people. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing. read more

This article is tagged with , and posted in From the Magazine, GNSS, Innovation

ITT Exelis Completes Signal Sentry 1000 Product Integration

May 17, 2013By
SignalSentry1000

An ITT Exelis product that detects and locates GPS interference sources in 3-D by using longitude, latitude and altitude has successfully completed a significant integration milestone. Signal Sentry 1000, formerly known as GPS Interference, Detection and Geolocation, may now be deployed to collect actionable intelligence for law enforcement, such as tracking high-value targets and protecting critical infrastructure. Signal Sentry 1000... read more

Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle

August 1, 2012By
drone_toc-650

By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys  Unmanned aerial vehicle (uav) used in the spoofing tests; owned by the University of Texas.  A radio signal sent from a half-mile away deceived the GPS receiver of a UAV into thinking that it was rising straight up. In this way, the UAV’s dependence on civil GPS allowed the... read more

Going Up Against Time: The Power Grid’s Vulnerability to GPS Spoofing Attacks

August 1, 2012By
Figure 7. Oscilloscope and Synchrowave screen at about 870 seconds, point 4 in Figure 3.

Spoofing tests against phasor measurement units demonstrate their vulnerability to attack. A generator trip in an automatic control scheme could be falsely activated by the GPS spoofing, possibly leading to cascading faults and a large-scale power blackout. read more

This article is tagged with , , and posted in Timing, Wireless Infrastructure

Letter to the Editor: Automatic Gain Control, Spoofing

July 1, 2012By

Just for the record: what is reported in “Detecting False Signals With Automatic Gain Control” (April GPS World) is what we introduced a long time ago and is reflected in one of our videos, and implemented in all of our GNSS receivers. AGC information is one of the four ways, and the least significant way, that we show interferences. There is a big difference between showing something in the laboratory and in some receivers, compared with having technology in mass production that everyone can understand and use. — Javad Ashjaee read more

This article is tagged with , , , and posted in Opinions, Simulators & Tools

Detecting False Signals with Automatic Gain Control

April 1, 2012By
FIGURE 6. Google Earth view of testing environment.

A component of most GPS receiver front-ends, the automatic gain control (AGC) can flag potential jamming and spoofing attacks. The detection method is simple to implement and accessible to most GPS receivers. It may be used alone or as a complement other anti-spoofing architectures. This article presents results from a baseline AGC characterization, develos a simple spoofing detection method, and demonstrate the results of that method on receiver data gathered in the presence of a live spoofing attack. read more

Innovation: Know Your Enemy

January 1, 2012By
Inno-Opener

Signal Characteristics of Civil GPS Jammers
GPS jamming is a continuing threat. A detailed understanding of how the available jammers work is necessary to judge their effectiveness and limitations. A team of researchers from Cornell University and the University of Texas at Austin reports on their analyses of the signal properties of 18 commercially available GPS jammers. read more