Modeling and simulation of receiver-spoofer attacking process in tracking stage

Meng Zhou,Hong Li,Peng Liu,Mingquan Lu
DOI: https://doi.org/10.1007/978-981-10-4588-2_64
2017-01-01
Abstract:Since the Global Navigation Satellite System (GNSS) has been constructed and normally operated, it has been widely applied in aviation, aerospace, navigation, power grid monitoring and communication. However, two factors determine its inherent vulnerability: (1) the navigation signal is prone to be jammed due to the very weak signal strength; (2) The fake signal could be easily generated because the navigation system Interface Control Documents (ICD) is open for the world. Therefore, GNSS receiver is often to be an important spoofing and jamming target for malicious attacks. Hence, when the receivers are once attacked, it can cause huge economic losses; moreover, it could also lead to serious safety problems for users. For the attacking of the receiver-spoofer in tracking stage (receiver-spoofer for short), it can take control of the target virtually without causing the target receiver unlocked, so it could make great hazards and destruction because of the high concealment. To analysis the technique of the receiver-spoofer, it discusses the principle when the attack takes over the control of receiver code loop in tracking stage in this paper. In order to model the spoofing process, the formulas of the key parameters in spoofing process were deduced and the simulation was achieved. Ultimately, the results, using a software receiver, verify the correctness of the simulation algorithm. Using the result in this paper, it cannot only provide a theoretical guide for the subsequent receiver-spoofer attack, but it can also provide a reference for the anti-attacking technique against the receiver-spoofer.
What problem does this paper attempt to address?