In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.
Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices / Rustamov, Akmal; Gogoi, Neil; Minetto, Alex; Dovis, Fabio. - ELETTRONICO. - (2020). (Intervento presentato al convegno 2020 International Conference on Localization and GNSS (ICL-GNSS) tenutosi a Tampere, Finland, Finland nel 2-4 June 2020) [10.1109/ICL-GNSS49876.2020.9115489].
Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices
Akmal Rustamov;Neil Gogoi;Alex Minetto;Fabio Dovis
2020
Abstract
In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.File | Dimensione | Formato | |
---|---|---|---|
09115489.pdf
non disponibili
Descrizione: Final version published on IEEE explore
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
1.85 MB
Formato
Adobe PDF
|
1.85 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
ICL_GNSS_Spoofing_attack_on_smart_devices.pdf
accesso aperto
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
914.32 kB
Formato
Adobe PDF
|
914.32 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2839032