Research of Intermediate Spoofing Without Precise Target Information

Chenxi Peng,Hong Li,Jian Wen,Mingquan Lu
DOI: https://doi.org/10.1007/978-981-13-7759-4_54
2019-01-01
Abstract:Intermediate spoofing is capable of converting receiver's tracking loop from locking on genuine signal to spoofing signal without disturbing normal working state. This kind of attack requires precise target information, which is difficult to meet in actual attack scenario. In order to improve the feasibility of intermediate spoofing, factors affecting intermediate spoofing such as power, carrier frequency and code phase will be evaluated through theoretical analysis combined with experimental verification. Besides, we will analyze the reasons for loss of lock in intermediate spoofing. Based on the above analysis, we developed an intermediate spoofing attack device and successfully perform wireless spoofing attack against commercial u-blox receiver without knowing its accurate information.
What problem does this paper attempt to address?