Saiful Islam, M. Z. H. Bhuiyan, Into Pääkkönen, Mika Saajasto, M. Mäkelä, S. Kaasalainen
{"title":"Impact analysis of spoofing on different-grade GNSS receivers","authors":"Saiful Islam, M. Z. H. Bhuiyan, Into Pääkkönen, Mika Saajasto, M. Mäkelä, S. Kaasalainen","doi":"10.1109/PLANS53410.2023.10139934","DOIUrl":null,"url":null,"abstract":"Man-made threats to Global Navigation Satellite System (GNSS)-dependent infrastructures are constantly evolving as malicious actors strive to stay one step ahead of security safeguards. A GNSS receiver that satisfies a certain standard of resilience in 2023 may not be sufficient by the end of the decade if a brand-new or previously unknown type of interference emerges in the meantime. GNSS spoofing is a significant concern as it is an intentional form of interference that aims to deceive a receiver into accepting counterfeit signals as genuine. The technical challenges of spoofing GNSS receivers are higher compared to jamming, and the consequences can be more severe, as the receiver may use tampered signals for Positioning, Navigation, and Timing (PNT), resulting in misleading position and time information. This paper analyzes the potential impact of spoofing on commercial- and mass-market-grade GNSS receivers. The impact analysis is also be supported by an in-house open-source software-defined research receiver named ‘FGI-GSRx’. Additionally, findings from the real-world spoofing test conducted during Jammer test campaign 2022 in Norway, are also be presented.","PeriodicalId":344794,"journal":{"name":"2023 IEEE/ION Position, Location and Navigation Symposium (PLANS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ION Position, Location and Navigation Symposium (PLANS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PLANS53410.2023.10139934","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Man-made threats to Global Navigation Satellite System (GNSS)-dependent infrastructures are constantly evolving as malicious actors strive to stay one step ahead of security safeguards. A GNSS receiver that satisfies a certain standard of resilience in 2023 may not be sufficient by the end of the decade if a brand-new or previously unknown type of interference emerges in the meantime. GNSS spoofing is a significant concern as it is an intentional form of interference that aims to deceive a receiver into accepting counterfeit signals as genuine. The technical challenges of spoofing GNSS receivers are higher compared to jamming, and the consequences can be more severe, as the receiver may use tampered signals for Positioning, Navigation, and Timing (PNT), resulting in misleading position and time information. This paper analyzes the potential impact of spoofing on commercial- and mass-market-grade GNSS receivers. The impact analysis is also be supported by an in-house open-source software-defined research receiver named ‘FGI-GSRx’. Additionally, findings from the real-world spoofing test conducted during Jammer test campaign 2022 in Norway, are also be presented.