kth.sePublikationer KTH
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Data verification for GNSS systems and protection of GNSS services
KTH, Skolan för elektroteknik och datavetenskap (EECS), Datavetenskap, Programvaruteknik och datorsystem, SCS. (Networked Systems Security (NSS) Group)ORCID-id: 0000-0001-8919-0098
2025 (Engelska)Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
Abstract [en]

 Global Navigation Satellite Systems (GNSS) provide ubiquitous precise localization and synchronization for a wide gamut of applications, spanning from location-based service to core industrial functionalities in communications and large infrastructure. Civilian use of GNSS relies on publicly available signals and infrastructure designed to operate at a high level of interoperability. Nevertheless, such systems proved to be vulnerable to voluntary and involuntary interference aiming to deny, modify, and falsify the GNSS-provided solution. This poses a significant threat to the robustness of satellite-based timing and localization. A decreasing entry threshold from the knowledge and tools accessibility perspective makes mounting such attacks feasible and effective even against low-value targets. In this work, this issue is targeted, with a practical approach, from three directions, by cross-checking the navigation solution with alternative providers of time, by localizing the interference source and characterizing it, and by relying on specific receiver dynamics to eliminate falsified signals. We discuss protection mechanisms targeting the consumer market based on available infrastructure or on sensing supported by sensors embedded in the GNSS-enabled platform itself. These efforts collectively aim to improve the robustness of consumer GNSS solutions, without modifying the GNSS receiver or the signal structure, to provide secure and reliable navigation and timing in an increasingly adversarial environment.

Abstract [sv]

Globala system för satellitnavigering (eng. global navigation satellite systems, GNSS) tillhandahåller allestädes närvarande precis platsbestämning och synkronisering för ett brett spann av tillämpningar, från platsbaserade tjänster till industriella kärnfunktioner i kommunikation och stora infrastrukturer. Civil användning av GNSS förlitar sig på allmänt tillgängliga signaler och infrastruktur som är designad att användas på en hög nivå av interoperabilitet. Dessa system har visat sig sårbara för störningar som söker att neka, modifiera och falsifiera GNSS-lösningar. Detta utgör ett allvarligt hot mot tillförlitligheten av satellitbaserad tids- och platsbestämning. En sänkning av tröskeln för tillgängligheten av kunskap och verktyg gör det möjligt och effektivt att inleda sådana attacker, även mot lågvärdesmål. I detta verk angrips problemet praktiskt via tre tillvägagångssätt: genom dubbelkontroll av navigationslösningen med alternativa internettidsleverantörer, genom lokalisering av störningskällan och karaktärisera den, och genom att förlita sig på specifik mottagardynamik för att eliminera falsifierade signaler. Vi diskuterar skyddsmekanismer ämnade för konsumentmarknaden baserat på tillgänglig infrastruktur eller m.h.a. mätningar från inbyggda sensorer i GNSS-plattformen i sig. Dessa ansträngningar söker att gemensamt förbättra tillförlitligheten hos konsument GNSS-lösningar, utan att modifiera GNSS-mottagaren eller signalstrukturen, för att erbjuda säker ochpålitlig navigation och tid i en alltmer fientlig miljö

Ort, förlag, år, upplaga, sidor
Stockholm: KTH Royal Institute of Technology, 2025. , s. xxvi, 62
Serie
TRITA-EECS-AVL ; 2025:36
Nationell ämneskategori
Annan elektroteknik och elektronik
Forskningsämne
Informations- och kommunikationsteknik
Identifikatorer
URN: urn:nbn:se:kth:diva-361272ISBN: 978-91-8106-231-1 (tryckt)OAI: oai:DiVA.org:kth-361272DiVA, id: diva2:1944833
Disputation
2025-04-15, https://kth-se.zoom.us/j/62121217840, Sal C, Kistagången 16, Stockholm, 14:00 (Engelska)
Opponent
Handledare
Anmärkning

QC 20250317

Tillgänglig från: 2025-03-17 Skapad: 2025-03-17 Senast uppdaterad: 2025-10-30Bibliografiskt granskad
Delarbeten
1. Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals
Öppna denna publikation i ny flik eller fönster >>Distributed and Mobile Message Level Relaying/Replaying of GNSS Signals
2022 (Engelska)Ingår i: The International Technical Meeting of the The Institute of Navigation, Institute of Navigation , 2022Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

With the introduction of Navigation Message Authentication (NMA), future Global Navigation Satellite Systems (GNSSs) prevent spoofing by simulation, i.e., the generation of forged satellite signals based on publicly known information. However, authentication does not prevent record-and-replay attacks, commonly termed as meaconing. Meaconing attacks are less powerful in terms of adversarial control over the victim receiver location and time, but by acting at the signal level, they are not thwarted by NMA. This makes replaying/relaying attacks a significant threat for current and future GNSS. While there are numerous investigations on meaconing attacks, the vast majority does not rely on actual implementation and experimental evaluation in real-world settings. In this work, we contribute to the improvement of the experimental understanding of meaconing attacks. We design and implement a system capable of real-time, distributed, and mobile meaconing, built with off-the-shelf hardware. We extend from basic distributed meaconing attacks, with signals from different locations relayed over the Internet and replayed within range of the victim receiver(s). This basic attack form has high bandwidth requirements and thus depends on the quality of service of the available network to work. To overcome this limitation, we propose to replay on message level, i.e., to demodulate and re-generate signals before and after the transmission respectively (including the authentication part of the payload). The resultant reduced bandwidth enables the attacker to operate in mobile scenarios, as well as to replay signals from multiple GNSS constellations and/or bands simultaneously. Additionally, the attacker can delay individually selected satellite signals to potentially influence the victim position and time solution in a more fine-grained manner. Our versatile test-bench, enabling different types of replaying/relaying attacks, facilitates testing realistic scenarios towards new and improved replaying/relaying-focused countermeasures in GNSS receivers.

Ort, förlag, år, upplaga, sidor
Institute of Navigation, 2022
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-323284 (URN)10.33012/2022.18227 (DOI)2-s2.0-85147930155 (Scopus ID)
Konferens
International technical Meeting of the Institute of Navigation
Anmärkning

QC 20250317

Tillgänglig från: 2023-01-24 Skapad: 2023-01-24 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
2. Protecting GNSS-based Services using Time Offset Validation
Öppna denna publikation i ny flik eller fönster >>Protecting GNSS-based Services using Time Offset Validation
2020 (Engelska)Ingår i: 2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, 2020, s. 575-583Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Global navigation satellite systems (GNSS) provide pervasive accurate positioning and timing services for a large gamut of applications, from Time based One-Time Passwords (TOPT), to power grid and cellular systems. However, there can be security concerns for the applications due to the vulnerability of GNSS. It is important to observe that GNSS receivers are components of platforms, in principle having rich connectivity to different network infrastructures. Of particular interest is the access to a variety of timing sources, as those can be used to validate GNSS-provided location and time. Therefore, we consider off-the-shelf platforms and how to detect if the GNSS receiver is attacked or not, by cross-checking the GNSS time and time from other available sources. First, we survey different technologies to analyze their availability, accuracy and trustworthiness for time synchronization. Then, we propose a validation approach for absolute and relative time. Moreover, we design a framework and experimental setup for the evaluation of the results. Attacks can be detected based on WiFi supplied time when the adversary shifts the GNSS provided time, more than 23.942 μs; with Network Time Protocol (NTP) supplied time when the adversary-induced shift is more than 2.046 ms. Consequently, the proposal significantly limits the capability of an adversary to manipulate the victim GNSS receiver.

Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-280850 (URN)10.1109/PLANS46316.2020.9110224 (DOI)000839298400066 ()2-s2.0-85087051578 (Scopus ID)
Konferens
2020 IEEE/ION Position, Location and Navigation Symposium, PLANS 2020, Portland, OR, United States of America, 20 April - 23 April 2020
Anmärkning

Part of ISBN 978-172810244-3

QC 20230921

Tillgänglig från: 2020-09-14 Skapad: 2020-09-14 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
3. Authenticated time for detecting GNSS attacks
Öppna denna publikation i ny flik eller fönster >>Authenticated time for detecting GNSS attacks
2020 (Engelska)Ingår i: Proceedings of the 33rd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2020, Institute of Navigation , 2020, s. 3826-3834Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Information cross-validation can be a powerful tool to detect manipulated, dubious GNSS data. A promising approach is to leverage time obtained over networks a mobile device can connect to, and detect discrepancies between the GNSS-provided time and the network time. The challenge lies in having reliably both accurate and trustworthy network time as the basis for the GNSS attack detection. Here, we provide a concrete proposal that leverages, together with the network time servers, the nearly ubiquitous IEEE 802.11 (Wi-Fi) infrastructure. Our framework supports application-layer, secure and robust real time broadcasting by Wi-Fi Access Points (APs), based on hash chains and infrequent digital signatures verification to minimize computational and communication overhead, allowing mobile nodes to efficiently obtain authenticated and rich time information as they roam. We pair this method with Network Time Security (NTS), for enhanced resilience through multiple sources, available, ideally, simultaneously. We analyze the performance of our scheme in a dedicated setup, gauging the overhead for authenticated time data (Wi-Fi timestamped beacons and NTS). The results show that it is possible to provide security for the external to GNSS time sources, with minimal overhead for authentication and integrity, even when the GNSS-equipped nodes are mobile, and thus have short interactions with the WiFi infrastructure and possibly intermittent Internet connectivity, as well as limited resources.

Ort, förlag, år, upplaga, sidor
Institute of Navigation, 2020
Nyckelord
Authentication, Global positioning system, IEEE Standards, Mobile security, Wi-Fi, Wireless local area networks (WLAN), Attack detection, Communication overheads, Cross validation, Internet connectivity, Real time broadcasting, Time information, Trustworthy networks, Wi-fi access points, Network security
Nationell ämneskategori
Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-290831 (URN)10.33012/2020.17719 (DOI)000632603503061 ()2-s2.0-85097798417 (Scopus ID)
Konferens
33rd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2020, 22 September 2020 through 25 September 2020
Anmärkning

QC 20210323

Tillgänglig från: 2021-03-23 Skapad: 2021-03-23 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
4. Detecting GNSS misbehaviour with high-precision clocks
Öppna denna publikation i ny flik eller fönster >>Detecting GNSS misbehaviour with high-precision clocks
2021 (Engelska)Ingår i: Proceedings WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery (ACM) , 2021, s. 389-391Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

To mitigate spoofing attacks targeting global navigation satellite systems (GNSS) receivers, one promising method is to rely on alternative time sources, such as network-based synchronization, in order to detect clock offset discrepancies caused by GNSS attacks. However, in case of no network connectivity, such validation references would not be available. A viable option is to rely on a local time reference; in particular, precision hardware clock ensembles of chip-scale thermally stable oscillators with extended holdover capabilities. We present a preliminary design and results towards a custom device capable of providing a stable reference, with smaller footprint and cost compared to traditional precision clocks. The system is fully compatible with existing receiver architecture, making this solution feasible for most industrial scenarios. Further integration with network-based synchronization can provide a complete time assurance system, with high short- and long-term stability. 

Ort, förlag, år, upplaga, sidor
Association for Computing Machinery (ACM), 2021
Nyckelord
Cellular radio systems, Clocks, Mobile telecommunication systems, Privacy by design, Wireless networks, Fully compatible, Global Navigation Satellite Systems, Industrial scenarios, Long term stability, Network connectivity, Preliminary design, Receiver architecture, Spoofing attacks, Global positioning system
Nationell ämneskategori
Signalbehandling Kommunikationssystem
Identifikatorer
urn:nbn:se:kth:diva-310386 (URN)10.1145/3448300.3468254 (DOI)2-s2.0-85110070732 (Scopus ID)
Konferens
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021
Anmärkning

Part of proceedings ISBN 9781450383493

QC 20220404

Tillgänglig från: 2022-04-04 Skapad: 2022-04-04 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
5. High-precision Hardware Oscillators Ensemble for GNSS Attack Detection
Öppna denna publikation i ny flik eller fönster >>High-precision Hardware Oscillators Ensemble for GNSS Attack Detection
2022 (Engelska)Ingår i: IEEE Aerospace Conference Proceedings, Institute of Electrical and Electronics Engineers (IEEE) , 2022Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

A wide gamut of important applications rely on global navigation satellite systems (GNSS) for precise time and positioning. Attackers dictating the GNSS receiver position and time solution are a significant risk, especially due to the inherent vulnerability of GNSS systems. A first line of defense, for a large number of receivers, is to rely on additional information obtained through the rich connectivity of GNSS enabled platforms. Network time can be used for direct validation of the GNSS receiver time; but this depends on network availability. To allow attack detection even when there are prolonged network disconnections, we present a method based on on-board ensemble of reference clocks. This allows the receiver to detect sophisticated attacks affecting the GNSS time solution, independently of the specific attack methodology. Results obtained with Chip-Scale Oven Compensated Oscillators (CS-OCXO) are promising and demonstrate the potential of embedded ensembles of reference clocks, detecting attacks causing modifications of the receiver time offset as low as 0.3 mus, with half the detection latency compared to related literature. 

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2022
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
urn:nbn:se:kth:diva-323283 (URN)10.1109/AERO53065.2022.9843381 (DOI)2-s2.0-85137569700 (Scopus ID)
Konferens
IEEE Aerospace
Anmärkning

QC 20230214

Tillgänglig från: 2023-01-24 Skapad: 2023-01-24 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
6. Detecting GNSS misbehavior leveraging secure heterogeneous time sources
Öppna denna publikation i ny flik eller fönster >>Detecting GNSS misbehavior leveraging secure heterogeneous time sources
2023 (Engelska)Ingår i: IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023, Institute of Electrical and Electronics Engineers (IEEE), 2023Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Civilian Global Navigation Satellite Systems (GNSS)vulnerabilities are a threat to a wide gamut of critical systems.GNSS receivers, as part of the encompassing platform, can leverage external information to detect GNSS attacks. Specifically, cross-checking the time produced by the GNSS receiver against multiple trusted time sources can provide robust and assuredPNT. In this work, we explore the combination of secure remote,network-based time providers and local precision oscillators. This multi-layered defense mechanism detects GNSS attacks that induce even small time offsets, including attacks mounted in cold start. Our system does not require any modification to the current structure of the GNSS receiver, it is agnostic to the satellite constellation and the attacker type. This makes time-based data validation of GNSS information compatible with existing receivers and readily deployable.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2023
Nationell ämneskategori
Signalbehandling Kommunikationssystem Elektroteknik och elektronik
Identifikatorer
urn:nbn:se:kth:diva-326762 (URN)10.1109/PLANS53410.2023.10140008 (DOI)001022344800114 ()2-s2.0-85162923832 (Scopus ID)
Konferens
IEEE/ION Position, Location and Navigation Symposium (PLANS), Monterey, California, April 24-27, 2023
Forskningsfinansiär
Stiftelsen för strategisk forskning (SSF)
Anmärkning

QC 20230517

Tillgänglig från: 2023-05-10 Skapad: 2023-05-10 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
7. Time-Based GNSS Attack Detection
Öppna denna publikation i ny flik eller fönster >>Time-Based GNSS Attack Detection
2024 (Engelska)Ingår i: IEEE Transactions on Aerospace and Electronic Systems, ISSN 0018-9251, E-ISSN 1557-9603, s. 1-18Artikel i tidskrift (Refereegranskat) Epub ahead of print
Abstract [en]

To safeguard Civilian Global Navigation Satellite Systems (GNSS) external information available to the platform encompassing the GNSS receiver can be used to detect attacks. Cross-checking the GNSS-provided time against alternative multiple trusted time sources can lead to attack detection aiming at controlling the GNSS receiver time. Leveraging external, network-connected secure time providers and onboard clock references, we achieve detection even under fine-grained time attacks. We provide an extensive evaluation of our multi-layered defense against adversaries mounting attacks against the GNSS receiver along with controlling the network link. We implement adversaries spanning from simplistic spoofers to advanced ones synchronized with the GNSS constellation. We demonstrate attack detection is possible in all tested cases (sharp discontinuity, smooth take-over, and coordinated network manipulation) without changes to the structure of the GNSS receiver. Leveraging the diversity of the reference time sources, detection of take-over time push as low as 150 μs is possible. Smooth take-overs forcing variations as low as 30 ns/s are also detected based on on-board precision oscillators. The method (and thus the evaluation) is largely agnostic to the satellite constellation and the attacker type, making time-based data validation of GNSS information compatible with existing receivers and readily deployable.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Telekommunikation
Identifikatorer
urn:nbn:se:kth:diva-359741 (URN)10.1109/taes.2024.3516708 (DOI)001506819200019 ()2-s2.0-85212530491 (Scopus ID)
Anmärkning

QC 20250211

Tillgänglig från: 2025-02-10 Skapad: 2025-02-10 Senast uppdaterad: 2025-08-15Bibliografiskt granskad
8. Uncovering GNSS Interference with Aerial Mapping UAV
Öppna denna publikation i ny flik eller fönster >>Uncovering GNSS Interference with Aerial Mapping UAV
2024 (Engelska)Ingår i: Uncovering GNSS Interference with Aerial Mapping UAV, Institute of Electrical and Electronics Engineers (IEEE) , 2024Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Global Navigation Satellite System (GNSS) receivers provide ubiquitous and precise position, navigation, and time (PNT) to a wide gamut of civilian and tactical infrastructures and devices. Due to the low GNSS received signal power, even low-power radiofrequency interference (RFI) sources are a serious threat to the GNSS integrity and availability. Nonetheless, RFI source localization is paramount yet hard, especially over large areas. Methods based on multi-rotor unmanned aerial vehicles (UAV) exist but are often limited by hovering time, and require specific antenna and detectors. In comparison, fixed-wing planes allow longer missions but are more complex to operate and deploy. A vertical take-off and landing (VTOL) UAV combines the positive aspects of both platforms: high maneuverability, and long mission time and, jointly with highly integrated control systems, simple operation and deployment. Building upon the flexibility allowed by such a platform, we propose a method that combines advanced flight dynamics with high-performance consumer receivers to detect interference over large areas, with minimal interaction with the operator. The proposed system can detect multiple interference sources and map their area of influence, gaining situational awareness of poor GNSS quality or denied environments. Furthermore, it can estimate the relative heading and position of the interference source within tens of meters. The proposed method is validated with real-life measurements, successfully mapping two interference-affected areas and exposing radio equipment causing involuntary in-band interference.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Nationell ämneskategori
Telekommunikation Signalbehandling
Forskningsämne
Flyg- och rymdteknik
Identifikatorer
urn:nbn:se:kth:diva-346348 (URN)10.1109/AERO58975.2024.10521434 (DOI)001229648405021 ()2-s2.0-85193856727 (Scopus ID)
Konferens
IEEE Aerospace Conference (AeroConf), Yellowstone Conference Center in Big Sky, Montana March 2-9, 2024
Forskningsfinansiär
Stiftelsen för strategisk forskning (SSF), RIT17-0005
Anmärkning

Part of ISBN 979-8-3503-0462-6

QC 20240515

Tillgänglig från: 2024-05-13 Skapad: 2024-05-13 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
9. GNSS jammer localization and identification with airborne commercial GNSS receivers
Öppna denna publikation i ny flik eller fönster >>GNSS jammer localization and identification with airborne commercial GNSS receivers
2025 (Engelska)Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 20, s. 3550-3565Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

Global Navigation Satellite Systems (GNSS) are fundamental in ubiquitously providing position and time to a wide gamut of systems. Jamming remains a realistic threat in many deployment settings, civilian and tactical. Specifically, in Unmanned Aerial Vehicles (UAVs) sustained denial raises safety critical concerns. This work presents a strategy that allows detection, localization, and classification both in the frequency and time domain of interference signals harmful to navigation. A high-performance Vertical Take Off and Landing (VTOL) UAV with a single antenna and a commercial GNSS receiver is used to geolocate and characterize RF emitters at long range, to infer the navigation impairment. Raw IQ baseband snapshots from the GNSS receiver make the application of spectral correlation methods possible without extra software-defined radio payload, paving the way to spectrum identification and monitoring in airborne platforms, aiming at RF situational awareness. Live testing at Jammertest, in Norway, with portable, commercially available GNSS multi-band jammers demonstrates the ability to detect, localize, and characterize harmful interference. Our system pinpointed the position with an error of a few meters of the transmitter and the extent of the affected area at long range, without entering the denied zone. Additionally, further spectral content extraction is used to accurately identify the jammer frequency, bandwidth, and modulation scheme based on spectral correlation techniques.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2025
Nationell ämneskategori
Signalbehandling Reglerteknik
Identifikatorer
urn:nbn:se:kth:diva-361264 (URN)10.1109/tifs.2025.3550050 (DOI)001457502700002 ()2-s2.0-105002263966 (Scopus ID)
Forskningsfinansiär
Vetenskapsrådet, 2020-04621
Anmärkning

QC 20250520

Tillgänglig från: 2025-03-14 Skapad: 2025-03-14 Senast uppdaterad: 2025-05-20Bibliografiskt granskad
10. Consumer INS coupled with carrier phase measurements for GNSS spoofing detection
Öppna denna publikation i ny flik eller fönster >>Consumer INS coupled with carrier phase measurements for GNSS spoofing detection
2025 (Engelska)Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Global Navigation Satellite Systems enable precise localization and timing even for highly mobile devices, but legacy implementations provide only limited support for the new generation of security-enhanced signals. Inertial Measurement Units have proved successful in augmenting the accuracy and robustness of the GNSS-provided navigation solution, but effective navigation based on inertial techniques in denied contexts requires high-end sensors. However, commercially available mobile devices usually embed a much lower-grade inertial system. To counteract an attacker transmitting all the adversarial signals from a single antenna, we exploit carrier phase-based observations coupled with a low-end inertial sensor to identify spoofing and meaconing. By short-time integration with an inertial platform, which tracks the displacement of the GNSS antenna, the high-frequency movement at the receiver is correlated with the variation in the carrier phase. In this way, we identify legitimate transmitters, based on their geometrical diversity with respect to the antenna system movement. We introduce a platform designed to effectively compare different tiers of commercial INS platforms with a GNSS receiver. By characterizing different inertial sensors, we show that simple MEMS INS perform as well as high-end industrial-grade sensors. Sensors traditionally considered unsuited for navigation purposes offer great performance at the short integration times used to evaluate the carrier phase information consistency against the high-frequency movement. Results from laboratory evaluation and through field tests at Jammertest 2024 show that the detector is up to 90% accurate in correctly identifying spoofing (or the lack of it), without any modification to the receiver structure, and with mass-production grade INS typical for mobile phones.

Ort, förlag, år, upplaga, sidor
Long Beach, CA, USA: Institute of Navigation, 2025
Nationell ämneskategori
Signalbehandling
Identifikatorer
urn:nbn:se:kth:diva-359742 (URN)
Konferens
ION ITM/PTTI, International Technical Meeting January 27 - 30, 2025 Long Beach, CA
Forskningsfinansiär
Myndigheten för samhällsskydd och beredskap, MSB , RIT17-0005
Anmärkning

QC 20250213

Tillgänglig från: 2025-02-11 Skapad: 2025-02-11 Senast uppdaterad: 2025-03-17Bibliografiskt granskad
11. UnReference: analysis of the effect of spoofing on RTK reference stations for connected rovers
Öppna denna publikation i ny flik eller fönster >>UnReference: analysis of the effect of spoofing on RTK reference stations for connected rovers
2025 (Engelska)Ingår i: Proceedings of the 2025 IEEE/ION Position, Localization and Navigation Symposium (PLANS), Salt Lake City, UT, USA, 2025, s. 1-12Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Global Navigation Satellite Systems (GNSS) provide standalone precise navigation for a wide gamut of applications. Nevertheless, applications or systems such as unmanned vehicles (aerial or ground vehicles and surface vessels) generally require a much higher level of accuracy than those provided by standalone receivers. The most effective and economical way of achieving centimeter-level accuracy is to rely on corrections provided by fixed reference station receivers to improve the satellite ranging measurements. Differential GNSS (DGNSS) and Real Time Kinematics (RTK) provide centimeter-level accuracy by distributing online correction streams to connected nearby mobile receivers typically termed rovers. However, due to their static nature, reference stations are prime targets for GNSS attacks, both simplistic jamming and advanced spoofing, with different levels of adversarial control and complexity. Jamming the reference station would deny corrections and thus accuracy to the rovers. Spoofing the reference station would force it to distribute misleading corrections. As a result, all connected rovers using those corrections will be equally influenced by the adversary independently of their actual trajectory. We evaluate a battery of tests generated with an RF simulator to test the robustness of a common DGNSS/RTK processing library and receivers. We test both jamming and synchronized spoofing to demonstrate that adversarial action on the rover using reference spoofing is both effective and convenient from an adversarial perspective. Additionally, we discuss possible strategies based on existing countermeasures (self-validation of the PNT solution and monitoring of own clock drift) that the rover and the reference station can adopt to avoid using or distributing bogus corrections.

Nationell ämneskategori
Säkerhet, integritet och kryptologi Elektroteknik och elektronik Signalbehandling
Identifikatorer
urn:nbn:se:kth:diva-361268 (URN)10.1109/PLANS61210.2025.11028546 (DOI)2-s2.0-105009210051 (Scopus ID)
Konferens
IEEE/ION Position, Localization and Navigation Symposium (PLANS), Salt Lake City, Utah, US, April 28 - May 1, 2025
Forskningsfinansiär
Vetenskapsrådet, 2020-04621
Anmärkning

QC 20250317

Tillgänglig från: 2025-03-15 Skapad: 2025-03-15 Senast uppdaterad: 2025-09-02Bibliografiskt granskad

Open Access i DiVA

summary(13585 kB)375 nedladdningar
Filinformation
Filnamn SUMMARY01.pdfFilstorlek 13585 kBChecksumma SHA-512
a66b6f76699ef5afda2c684de386dfa068fdfe55afa1b333a891406102ab8626de4442ffc1903675a4b93df4dd254f394a5a866c5a613946e0767a21f1d53ad1
Typ fulltextMimetyp application/pdf

Person

Spanghero, Marco

Sök vidare i DiVA

Av författaren/redaktören
Spanghero, Marco
Av organisationen
Programvaruteknik och datorsystem, SCS
Annan elektroteknik och elektronik

Sök vidare utanför DiVA

GoogleGoogle Scholar
Totalt: 0 nedladdningar
Antalet nedladdningar är summan av nedladdningar för alla fulltexter. Det kan inkludera t.ex tidigare versioner som nu inte längre är tillgängliga.

isbn
urn-nbn

Altmetricpoäng

isbn
urn-nbn
Totalt: 2720 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf