Vulnerability analysis of GPS receiver software

Show simple item record

dc.contributor.author Gonzalez, G. Mori
dc.contributor.author Petrunin, Ivan
dc.contributor.author Zbikowski, Rafal
dc.contributor.author Voutsis, K.
dc.contributor.author Verdeguer Moreno, Ricardo
dc.date.accessioned 2019-10-10T09:23:28Z
dc.date.available 2019-10-10T09:23:28Z
dc.date.issued 2019-07-04
dc.identifier.citation Mori GG, Petrunin I, Zbikowski R, et al., (2019) Vulnerability analysis of GPS receiver software. In: 2019 International Conference on Localization and GNSS (ICL-GNSS), 4-6 June 2019, Nuremberg, Germany en_UK
dc.identifier.isbn 978-1-7281-2445-2
dc.identifier.issn 2325-0771
dc.identifier.uri https://doi.org/10.1109/ICL-GNSS.2019.8752862
dc.identifier.uri https://dspace.lib.cranfield.ac.uk/handle/1826/14603
dc.description.abstract Satellite navigation systems such as the Global Positioning System (GPS)makes it possible for users to find their relative or absolute position. Thanks to its mobility and reliability, the GPS is used in many civil and military applications. However, the GPS does not provide an advanced level of security. Therefore, it could be potentially a target of attacks. With the development of new GPS attacks, the security knowledge has to grow at the same rate, so existing attacks can be detected by updated versions of receiver software or hardware. In this paper, a comparative analysis of GPS receiver resilience to software attacks is performed with the help of GNSS simulator from Spirent. The main objective of this work is to perform a sensitivity analysis of variables involved in calculation of position of the GPS receivers from different price bands that might be targeted by existing or future GPS attack. Variables making the biggest impact on calculated position are determined using the model. Experimentation validation of their influence is performed using selected receivers and corrupted signals generated by GNSS simulator. The testing is based on tuning the selected variables in order to simulate the theoretical error obtained from the sensitivity analysis. The results obtained from testing are discussed in order to analyse the behaviour of the considered GNSS receivers (including the premium class ones)and establish whether they provide a protection from existing or potential GPS attacks. en_UK
dc.language.iso en en_UK
dc.publisher IEEE en_UK
dc.rights Attribution-NonCommercial 4.0 International *
dc.rights.uri http://creativecommons.org/licenses/by-nc/4.0/ *
dc.subject GPS en_UK
dc.subject Security en_UK
dc.subject GNSS en_UK
dc.subject RF Attacks en_UK
dc.subject Spoofing en_UK
dc.subject GSS 7000 en_UK
dc.subject Spirent en_UK
dc.title Vulnerability analysis of GPS receiver software en_UK
dc.type Conference paper en_UK


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial 4.0 International Except where otherwise noted, this item's license is described as Attribution-NonCommercial 4.0 International

Search CERES


Browse

My Account

Statistics