In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.

Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices / Rustamov, Akmal; Gogoi, Neil; Minetto, Alex; Dovis, Fabio. - ELETTRONICO. - (2020). (Intervento presentato al convegno 2020 International Conference on Localization and GNSS (ICL-GNSS) tenutosi a Tampere, Finland, Finland nel 2-4 June 2020) [10.1109/ICL-GNSS49876.2020.9115489].

Assessment of the Vulnerability to Spoofing Attacks of GNSS Receivers Integrated in Consumer Devices

Akmal Rustamov;Neil Gogoi;Alex Minetto;Fabio Dovis
2020

Abstract

In this paper, we investigate the effects of spoofing attacks on the mass-market positioning and navigation units integrated in modern day Android™ smartphones. In order to operate spoofing in a real environment, we signed and implemented a portable, configurable, low-cost GPS spoofer exploiting a software-defined radio (SDR) implementation and a low-cost front-end. Such a tool has been exploited to set up a test campaign trying to mislead the Position, Velocity and Time computation of different Android™ smartphones. The effects of such simplistic spoofing attack on the smartphone GNSS has been assessed observing raw measurements and the evaluated positions and time. The main findings of this work showed that modern Android™ devices have a remarkable resilience to simplistic spoofing attacks, highlighting in parallel further potential weaknesses to be protected by means of practical defence mechanisms and countermeasures to spoofing.
2020
978-1-7281-6455-7
978-1-7281-6456-4
File in questo prodotto:
File Dimensione Formato  
09115489.pdf

non disponibili

Descrizione: Final version published on IEEE explore
Tipologia: 2a Post-print versione editoriale / Version of Record
Licenza: Non Pubblico - Accesso privato/ristretto
Dimensione 1.85 MB
Formato Adobe PDF
1.85 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
ICL_GNSS_Spoofing_attack_on_smart_devices.pdf

accesso aperto

Tipologia: 2. Post-print / Author's Accepted Manuscript
Licenza: PUBBLICO - Tutti i diritti riservati
Dimensione 914.32 kB
Formato Adobe PDF
914.32 kB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2839032