Vulnerability analysis of GPS receiver software

dc.contributor.authorGonzalez, G. Mori
dc.contributor.authorPetrunin, Ivan
dc.contributor.authorZbikowski, Rafal
dc.contributor.authorVoutsis, K.
dc.contributor.authorVerdeguer Moreno, Ricardo
dc.date.accessioned2019-10-10T09:23:28Z
dc.date.available2019-10-10T09:23:28Z
dc.date.issued2019-07-04
dc.description.abstractSatellite navigation systems such as the Global Positioning System (GPS)makes it possible for users to find their relative or absolute position. Thanks to its mobility and reliability, the GPS is used in many civil and military applications. However, the GPS does not provide an advanced level of security. Therefore, it could be potentially a target of attacks. With the development of new GPS attacks, the security knowledge has to grow at the same rate, so existing attacks can be detected by updated versions of receiver software or hardware. In this paper, a comparative analysis of GPS receiver resilience to software attacks is performed with the help of GNSS simulator from Spirent. The main objective of this work is to perform a sensitivity analysis of variables involved in calculation of position of the GPS receivers from different price bands that might be targeted by existing or future GPS attack. Variables making the biggest impact on calculated position are determined using the model. Experimentation validation of their influence is performed using selected receivers and corrupted signals generated by GNSS simulator. The testing is based on tuning the selected variables in order to simulate the theoretical error obtained from the sensitivity analysis. The results obtained from testing are discussed in order to analyse the behaviour of the considered GNSS receivers (including the premium class ones)and establish whether they provide a protection from existing or potential GPS attacks.en_UK
dc.identifier.citationMori GG, Petrunin I, Zbikowski R, et al., (2019) Vulnerability analysis of GPS receiver software. In: 2019 International Conference on Localization and GNSS (ICL-GNSS), 4-6 June 2019, Nuremberg, Germanyen_UK
dc.identifier.isbn978-1-7281-2445-2
dc.identifier.issn2325-0771
dc.identifier.urihttps://doi.org/10.1109/ICL-GNSS.2019.8752862
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/14603
dc.language.isoenen_UK
dc.publisherIEEEen_UK
dc.rightsAttribution-NonCommercial 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc/4.0/*
dc.subjectGPSen_UK
dc.subjectSecurityen_UK
dc.subjectGNSSen_UK
dc.subjectRF Attacksen_UK
dc.subjectSpoofingen_UK
dc.subjectGSS 7000en_UK
dc.subjectSpirenten_UK
dc.titleVulnerability analysis of GPS receiver softwareen_UK
dc.typeConference paperen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Vunerability_analysis_of_GPS_receiver_software-2019.pdf
Size:
730.21 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: