Skip to main content

A Novel GPS Spoofing Algorithm Based on Modifying Navigation Message

  • Conference paper
  • First Online:
Book cover Communications and Networking (ChinaCom 2017)

Abstract

Satellite navigation spoofing technology induces the victim receivers to capture and track the forged navigation signal, so that the receivers work out the spoofed position and time. This paper presents a novel GPS spoofing method based on modifying navigation message, modify the handover word, spoof the calculated pseudo ranges and the satellite positions, then spoof the positioning result of receiver. The influence of the spoofing method on GPS receiver have been simulated, the results show that the proposed method has the approximate linear relationship with the eastern and northern spoofed distance, but has nonlinear relationship with the up spoofed distance. It has great significance to airspace supervision and defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mark, L.P., Todd, E.H.: Attackers can spoof navigation signals without our knowledge. here’s how to fight back GPS lies. IEEE Spectr. 53, 26–32 (2016)

    Google Scholar 

  2. Huang, L., Gong, H., Zhu, X.W., Wang, F.X.: Research of re-radiating spoofing technique to GNSS timing receiver. J. Natl. Univ. Defense Technol. 35, 93–96 (2013)

    Google Scholar 

  3. Zhang, H.S., Gao, G.G., Kou, L.: Deceptive jamming technology of GPS based on the track induction method. J. Projectiles Rockets Missiles Guidance 33, 149–152 (2013)

    Google Scholar 

  4. Tippenhauer, N.O., Popper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: 18th ACM Conference on Computer and Communications Security, Chicago, pp. 75–79 (2011)

    Google Scholar 

  5. Hu, Y.F., Cao, K.J., Bian, S.F.: GNSS spoofing detection algorithm based on clock frequency drift monitoring. Syst. Eng. Electron. 37, 1629–1632 (2015)

    Google Scholar 

  6. Todd, E.H.: Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans. Aerosp. Electron. Syst. 49, 1073–1090 (2013)

    Article  Google Scholar 

  7. Mosavi, M.R., Nasrpooya, Z., Moazedi, M.: Advanced anti-spoofing methods in tracking loop. J. Navig. 69, 883–904 (2016)

    Article  Google Scholar 

  8. Magiera, J., Katulski, R.: Applicability of null-steering for spoofing mitigation in civilian GPS. In: Vehicular Technology Conference, pp. 1–5 (2014)

    Google Scholar 

  9. Magiera, J., Katulski, R.: Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 13, 45–57 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

This work was supported in part by the National Natural Science Foundation of China under Grants 61202394.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiong Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, Q., Zhang, Y., Tang, C. (2018). A Novel GPS Spoofing Algorithm Based on Modifying Navigation Message. In: Li, B., Shu, L., Zeng, D. (eds) Communications and Networking. ChinaCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 236. Springer, Cham. https://doi.org/10.1007/978-3-319-78130-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78130-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78129-7

  • Online ISBN: 978-3-319-78130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics