An Inherent Limitative Parameter in Spoofing GNSS-Based Navigation Clients
Main Article Content
Abstract
Deception of navigational subsystems of a client, ranging from a hunting GPS receiver to the military-class GNSS receiver onboard of a Cruise Missile, is one of the probable electronic attacks. One of the simplest and practical way too deceive these receivers is to re-broadcast the delayed navigational signals. The authors were studied the feasibility of this method in the “Best” attainable conditions while the generality of study retained. The results from introduced geometrical and mathematical models were used to define the minimum and maximum operational range of Repeater Deception System parametrically. Then the parameters were substituted by information of various GNSS constellations. Investigation of reliability of selected EW scenario concluded the article.
Downloads
Article Details
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
References
Giles. Sun Tzu on the Art of War, Abingdon, Oxon: Routledge, 2013.
Homer, The Iliad, Edited by: R. Lattimore, R. A. Lattimore, ISNB: 0226469409, University of Chicago Press, 1961.
Ch. F. Bond, M. Robinson, The evolution of deception, Journal of Nonverbal Behavior 12(4):295-30, December 1988.
Y. Bassil, Steganography & the Art of Deception: A Comprehensive Survey, Int. Journal on Latest Trends Computing, Vol‐4 No. 3: 128-138, September 2013.
M. A. Peters, The History and Practice of Lying in Public Life, Review of Contemporary Philosophy, Vol. 14:47-61, 2015, ISSN 1841-5261.
T. E. Humphreys, et al. "Assessing the spoofing threat: Development of a portable GPS civilian spoofer." Proceedings of the ION GNSS international technical meeting of the satellite division. Vol. 55. 2008.
T. E. Humphreys, "Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing." University of Texas at Austin (July 18, 2012).
Kerns, Andrew J., et al. "Unmanned aircraft capture and control via GPS spoofing." Journal of Field Robotics 31.4 (2014): 617-636.
A. Jafarnia-Jahromi, et al., "GPS Vulnerability to Spoofing Threats and a Review of Anti spoofing Techniques," International Journal of Navigation and Observation, vol. 2012, Article ID 127072, 16 pages, 2012.
W.L. Garfield, TACAN: a navigation system for aircraft, Proceedings of the IEE - Part B: Radio and Electronic Engineering, Volume: 105, Issue: 9, March 1958.
W. Zhang, K Zhang, B. Wu and H. Suh, "Simulation and Analysis Acquisition of GPS C/A Code Signals in GPS System", International Symposium on Computer Network and Multimedia Technology,. CNMT 2009, ISBN: 978-1-4244-5272-9, Wuhan, China, 2009.
D. Hambling, "Ships fooled in GPS spoofing attack suggest Russian cyber weapon", New Scientists, vol. 3139, 19 August 2017.
J. Bao, Y. Tsui, "GPS C/A Code Signal Structure", Fundamentals of Global Positioning System Receivers: A Software Approach", Ch. 5, John Wiley & Sons, Inc. ISBN 0-471-38154-3, 2000.
G. Blewitt, "Basics of the GPS Technique: Observation Equations", Geodetic Applications of GPS, the Swedish Land Survey, 1997.
Y.B. LIU, et al. "Efficiency Analysis of Repeater Deception Jamming GPS Repeater [J]." Journal of Air Force Radar Academy 4 (2004): 001.
M. E. Johnson, et al. "Comparison of measured data with IF-77 propagation model predictions". National Telecommunications and Information Administration Boulder Co Institute for Telecommunication Sciences, 1979.
A. Esmaeilkhah and N. Lavasani, "Jamming Efficacy of Variable Altitude GPS Jammer against Airborne GPS Receiver, Theoretical Study and Parametric Simulation", AEM, vol. 7, no. 1, pp. 57-64, Feb. 2018.