In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.
Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices / Rustamov, Akmal; Gogoi, Neil; Minetto, Alex; Dovis, Fabio. - ELETTRONICO. - (2020). (Intervento presentato al convegno 2020 International Conference on Localization and GNSS (ICL-GNSS) tenutosi a Tampere, Finland, Finland nel 2-4 June 2020) [10.1109/ICL-GNSS49876.2020.9115489].
Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices
Akmal Rustamov;Neil Gogoi;Alex Minetto;Fabio Dovis
2020
Abstract
In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.| File | Dimensione | Formato | |
|---|---|---|---|
| 09115489.pdf accesso riservato 
											Descrizione: Final version published on IEEE explore
										 
											Tipologia:
											2a Post-print versione editoriale / Version of Record
										 
											Licenza:
											
											
												Non Pubblico - Accesso privato/ristretto
												
												
												
											
										 
										Dimensione
										1.85 MB
									 
										Formato
										Adobe PDF
									 | 1.85 MB | Adobe PDF | Visualizza/Apri Richiedi una copia | 
| ICL_GNSS_Spoofing_attack_on_smart_devices.pdf accesso aperto 
											Tipologia:
											2. Post-print / Author's Accepted Manuscript
										 
											Licenza:
											
											
												Pubblico - Tutti i diritti riservati
												
												
												
											
										 
										Dimensione
										914.32 kB
									 
										Formato
										Adobe PDF
									 | 914.32 kB | Adobe PDF | Visualizza/Apri | 
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2839032
			
		
	
	
	
			      	