TAG: spoofing

Innovation: GNSS Spoofing Detection

June 1, 2013By
In-opener

It's a hostile (electronic) world out there, people. Our wired and radio-based communication systems are constantly under attack from evil doers. We are all familiar with computer viruses and worms hiding in malicious software or malware distributed over the Internet or by infected USB flash drives. Trojan horses are particularly insidious. These are programs concealing harmful code that can lead to many undesirable effects such as deleting a user’s files or installing additional harmful software. Such programs pass themselves off as benign, just like the “gift” the Greeks delivered to the Trojans as reported in Virgil’s Aeneid. This was a very early example of spoofing. read more

This article is tagged with , and posted in From the Magazine, GNSS, Innovation

ITT Exelis Completes Signal Sentry 1000 Product Integration

May 17, 2013By
SignalSentry1000

An ITT Exelis product that detects and locates GPS interference sources in 3-D by using longitude, latitude and altitude has successfully completed a significant integration milestone. Signal Sentry 1000, formerly known as GPS Interference, Detection and Geolocation, may now be deployed to collect actionable intelligence for law enforcement, such as tracking high-value targets and protecting critical infrastructure. Signal Sentry 1000... read more

Drone Hack: Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle

August 1, 2012By
drone_toc-650

By Daniel Shepard, Jahshan A. Bhatti, and Todd E. Humphreys  Unmanned aerial vehicle (uav) used in the spoofing tests; owned by the University of Texas.  A radio signal sent from a half-mile away deceived the GPS receiver of a UAV into thinking that it was rising straight up. In this way, the UAV’s dependence on civil GPS allowed the... read more

Going Up Against Time: The Power Grid’s Vulnerability to GPS Spoofing Attacks

August 1, 2012By
Figure 7. Oscilloscope and Synchrowave screen at about 870 seconds, point 4 in Figure 3.

Spoofing tests against phasor measurement units demonstrate their vulnerability to attack. A generator trip in an automatic control scheme could be falsely activated by the GPS spoofing, possibly leading to cascading faults and a large-scale power blackout. read more

This article is tagged with , , and posted in Timing, Wireless Infrastructure

Letter to the Editor: Automatic Gain Control, Spoofing

July 1, 2012By

Just for the record: what is reported in “Detecting False Signals With Automatic Gain Control” (April GPS World) is what we introduced a long time ago and is reflected in one of our videos, and implemented in all of our GNSS receivers. AGC information is one of the four ways, and the least significant way, that we show interferences. There is a big difference between showing something in the laboratory and in some receivers, compared with having technology in mass production that everyone can understand and use. — Javad Ashjaee read more

This article is tagged with , , , and posted in Opinions, Simulators & Tools

Detecting False Signals with Automatic Gain Control

April 1, 2012By
FIGURE 6. Google Earth view of testing environment.

A component of most GPS receiver front-ends, the automatic gain control (AGC) can flag potential jamming and spoofing attacks. The detection method is simple to implement and accessible to most GPS receivers. It may be used alone or as a complement other anti-spoofing architectures. This article presents results from a baseline AGC characterization, develos a simple spoofing detection method, and demonstrate the results of that method on receiver data gathered in the presence of a live spoofing attack. read more

Innovation: Know Your Enemy

January 1, 2012By
Inno-Opener

Signal Characteristics of Civil GPS Jammers
GPS jamming is a continuing threat. A detailed understanding of how the available jammers work is necessary to judge their effectiveness and limitations. A team of researchers from Cornell University and the University of Texas at Austin reports on their analyses of the signal properties of 18 commercially available GPS jammers. read more

Straight Talk on Anti-Spoofing: Securing the Future of PNT

January 1, 2012By
Spoofing

Disruption created by intentional generation of fake GPS signals could have serious economic consequences. This article discusses how typical civil GPS receivers respond to an advanced civil GPS spoofing attack, and four techniques to counter such attacks: spread-spectrum security codes, navigation message authentication, dual-receiver correlation of military signals, and vestigial signal defense. Unfortunately, any kind of anti-spoofing, however necessary, is a tough sell. read more