Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional radio frequency interferences, posing significant risks to their performance and reliability. Among these threats, it has been widely argued that modern GNSS-equipped Android™ smartphones are resilient to non-coherent spoofing attacks. This study challenges such a perception by highlighting the vulnerability of GNSS-equipped Android™ smartphones to single-antenna, non-coherent spoofing attacks and proposing a novel, application-level detection technique solely based on raw GNSS observables, i.e., carrier-to-noise-density time series. The analysis demonstrated the capability of successfully detecting such attacks by observing the cross-correlation among Global Navigation Satellite System (GNSS) measurements time series. Cross-correlation quantified by Pearson’s correlation coefficients shows a relevant increment during harmful spoofing attacks. Under these conditions, the proposed methodology allows to rise a spoofing alarm in about 5 seconds with a false alarm probability of 1.5%. Furthermore, the proposed technique does not require low-level signal access, making it suitable for implementation at the application layer in a large number of smart devices with limited knowledge of their low-level system architecture. A validation campaign has been performed by testing 18 different Android™ devices and chipsets, thus demonstrating the applicability of the proposed method independently from the device under test.
Detecting Single-antenna Spoofing Attacks by Correlation in Time Series of Raw Measurements / Minetto, Alex; Rustamov, Akmal; Dovis, Fabio. - ELETTRONICO. - (2023), pp. 73-84. (Intervento presentato al convegno 36th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2023) tenutosi a Denver, Colorado (USA) nel September 11 - 15, 2023) [10.33012/2023.19205].
Detecting Single-antenna Spoofing Attacks by Correlation in Time Series of Raw Measurements
Alex Minetto;Akmal Rustamov;Fabio Dovis
2023
Abstract
Global Navigation Satellite System (GNSS) receivers are vulnerable to intentional radio frequency interferences, posing significant risks to their performance and reliability. Among these threats, it has been widely argued that modern GNSS-equipped Android™ smartphones are resilient to non-coherent spoofing attacks. This study challenges such a perception by highlighting the vulnerability of GNSS-equipped Android™ smartphones to single-antenna, non-coherent spoofing attacks and proposing a novel, application-level detection technique solely based on raw GNSS observables, i.e., carrier-to-noise-density time series. The analysis demonstrated the capability of successfully detecting such attacks by observing the cross-correlation among Global Navigation Satellite System (GNSS) measurements time series. Cross-correlation quantified by Pearson’s correlation coefficients shows a relevant increment during harmful spoofing attacks. Under these conditions, the proposed methodology allows to rise a spoofing alarm in about 5 seconds with a false alarm probability of 1.5%. Furthermore, the proposed technique does not require low-level signal access, making it suitable for implementation at the application layer in a large number of smart devices with limited knowledge of their low-level system architecture. A validation campaign has been performed by testing 18 different Android™ devices and chipsets, thus demonstrating the applicability of the proposed method independently from the device under test.File | Dimensione | Formato | |
---|---|---|---|
GNSS23-0016_final.pdf
non disponibili
Descrizione: Post-print (versione inclusa nei proceedings del convegno)
Tipologia:
2a Post-print versione editoriale / Version of Record
Licenza:
Non Pubblico - Accesso privato/ristretto
Dimensione
1.16 MB
Formato
Adobe PDF
|
1.16 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
_2023_ION_GNSS__Detecting_Single_Antenna_Spoofing_Attack.pdf
accesso aperto
Descrizione: Versione autore accettata
Tipologia:
2. Post-print / Author's Accepted Manuscript
Licenza:
PUBBLICO - Tutti i diritti riservati
Dimensione
1.03 MB
Formato
Adobe PDF
|
1.03 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2983005