PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The vulnerability of unmanned vehicles to terrorist attacks such as Global Navigation Satellite System spoofing

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Spoofing, anti-spoofing, jamming, and anti-jamming algorithms have become an important research topic within the Global Navigation Satellite System (GNSS) discipline. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. GNSS signal power on the earth’s surface is around 160 dBW. The goal of spoofing is to provide the receiver with a slightly more powerful misleading signal, stronger than the original GNSS signal, fooling the receiver into using fake signals for positioning calculations. The receiver will generate a misleading position of the navigator. Practical spoofing that provides misleading navigation results of the receiver is difficult to conduct due to the signal infrastructure. Using trivial anti-spoofing algorithms in GNSS receivers, spoofing attacks can be easily detected. The article discusses the vulnerability of unmanned vehicles and provides an approach to anti-spoofing based on measuring distance between two antennas.
Słowa kluczowe
Rocznik
Strony
181--188
Opis fizyczny
Bibliogr. 30 poz., rys.
Twórcy
  • West Pomeranian University of Technology Faculty of Computer Science and Information Technologies 49 Żołnierska St., 71-210 Szczecin, Poland
  • Maritime University of Szczecin, Faculty of Navigation 1–2 Wały Chrobrego St., 70-500 Szczecin, Poland
autor
  • Maritime University of Szczecin, Faculty of Navigation 1–2 Wały Chrobrego St., 70-500 Szczecin, Poland
Bibliografia
  • 1. AUVSI (2015). Association for Unmanned Vehicles Systems International [Online] Available from: http://www.auvsi.org [Accessed: August 20, 2015]
  • 2. BBC (2012) [Online] Available from: http://www.bbc.com/ russian/science/2012/06/120629_drone_spoof_hack.shtml
  • 3. BLN GPS (2007) Basic Land Navigation, Global Positioning System, page 5.1. National Interagency Incident Management System, 2007. [Online] Available from: http:// www.nwcg.gov/sites/default/files/products/pms475.pdf [Accessed: August 20, 2015]
  • 4. Chao, H.Y., Cao, Y.C. & Chen, Y.Q. (2010) Autopilots for Small Unmanned Aerial Vehicles: A Survey. International Journal of Control, Automation, and Systems 8(1), pp. 36–44.
  • 5. Dobryakova, L. & Ochin, E. (2014) On the application of GNSS signal repeater as a spoofer. Scientific Journals of the Maritime University of Szczecin 40 (112). pp. 53–57.
  • 6. Dobryakova, L., Lemieszewski, Ł. & Ochin, E. (2013) GNSS: povyšenie točnosti pozicionirovaniâ s ispol’zovaniem modeli WCS-84. Modelûvannâ ta informacijni tehnologij. Zbirnik naukovyh prac’. Vypusk 68, Kijev 2013, UKD 621.396+681.511.
  • 7. Dobryakova, L., Lemieszewski, Ł. & Ochin, E. (2014a) Design and analysis of spoofing detection algorithms for GNSS signals. Scientific Journals of the Maritime University of Szczecin 40 (112). pp. 47–52.
  • 8. Dobryakova, L., Lemieszewski, Ł. & Ochin, E. (2014b) Transport safety: the GNSS spoofing detecting using two navigators. Logistyka 3. pp. 1328–1331.
  • 9. Dobryakova, L., Lemieszewski, Ł. & Ochin, E. (2014c) The main scenarios of GNSS spoofing and corresponding spoofing detection algorithms. Logistyka 4. pp. 2751–2761.
  • 10. Dobryakova, L., Lemieszewski, Ł., Lusznikov, E. & Ochin, E. (2014) The application of satellite compass for GNSS-spoofing detecting. Scientific Journals of the Maritime University of Szczecin 37 (109). pp. 28–33.
  • 11. e-Navigation FAQ (2015) e-Navigation Frequently Asked Questions. [Online] Available from: http://www.iala-aism. org/about/faqs/enav.html [Accessed: August 20, 2015]
  • 12. EW (2007) Electronic Warfare. Joint Publication 3-13.1. 25 January 2007. [Online] Available from: http://fas.org/irp/ doddir/dod/jp3-13-1.pdf [Accessed: August 20, 2015]
  • 13. GNSS (2015) Global Navigation Satellite System. [Online] Available from: https://www.princeton.edu/~alaink/ Orf467F07/GNSS.pdf [Accessed: August 20, 2015]
  • 14. Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J. & Lachapelle, G. (2012) GPS Vulnerability to Spoofing Threats and a Review of Anti-spoofing Techniques. International Journal of Navigation and Observation 2012, Article ID 127072, doi:10.1155/2012/127072.
  • 15. NavLab (2015) Introduction to inertial navigation. [Online] Available from: http://www.navlab.net/ Publications/Introduction_to_Inertial_Navigation.pdf [Accessed: August 20, 2015]
  • 16. New factoria (2014) Kompleks “Avtobaza” zasek i posadil amerikanskiy BPLA MQ-5B v Krymu. [Online] Marz 2014. Available from: http://rbase.new-factoria.ru/news/ kompleks-avtobaza-zasek-i-posadil-amerikanskiy-bpla-mq-5b-v-krymu [Accessed: August 20, 2015]
  • 17. NS (2015) Navigation satellite. [Online] Available from: http://www.infoplease.com/encyclopedia/science/navigation-satellite.html [Accessed: August 20, 2015]
  • 18. Ochin, E. (2012a) Anty-spoofingowa architektura GPS do systemów nawigacji bezzałogowej. [Online] Available from: https://youtu.be/TLUD26xfEfQ?list=PL0C885EF8A- 83CA824 [Accessed: August 20, 2015]
  • 19. Ochin, E. (2012b) Antyterroryzm – projektowanie i analiza algorytmów antyspoofingu dla GNSS. [Online] May. Available from: https://youtu.be/mQpY9R-pIPo [Accessed: August 20, 2015]
  • 20. Ochin, E. (2014) Spoofing detection and anti-spoofing for GNSS controlled drones, bombs and artillery shells (in English and Russian languages). [Online] Available from: https://youtu.be/0PlQoAynIQo [Accessed: August 20, 2015]
  • 21. Ochin, E., Dobryakova, L. & Lemieszewski, Ł. (2012) Antiterrorism – design and analysis of GNSS anti-spoofing algorithm. Scientific Journals of the Maritime University of Szczecin 30 (102). pp. 93–101.
  • 22. Ochin, E., Dobryakova, L. & Lemieszewski, Ł. (2013) The analysis of the detecting algorithms of GNSS-spoofing. Scientific Journals of the Maritime University of Szczecin 36 (108) z. 2. pp. 30–36.
  • 23. Ochin, E., Lemieszewski, Ł., Lusznikov, E. & Dobryakova, L. (2013) The study of the spoofer’s some properties with help of GNSS signal repeater. Scientific Journals of the Maritime University of Szczecin 36 (108) z. 2. pp. 159–165.
  • 24. Peterson, S. (2011) Exclusive: Iran hijacked US drone, says Iranian engineer (Video). [Online] December 15. Available from: http://www.csmonitor.com/World/Middle-East /2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video [Accessed: August 20, 2015]
  • 25. Petovello, M. & Jee, G.I. (2009) GNSS Solutions: What is GNSS repeater-based positioning and how is it different from using pseudolites? Inside GNSS. Global Navigation Satellite Systems. Engineering, Policy and Design. pp. 18– 21. [Online] July/August 2009. Available from: http://www. insidegnss.com/auto/julyaug09-GNSS-Sol.pdf [Accessed: August 20, 2015]
  • 26. Pullen, S. & Gao, G.X. (2012) GNSS Jamming in the Name of Privacy. Potential Threat to GPS Aviation. Inside GNSS. Global Navigation Satellite Systems. Engineering, Policy and Design. pp. 34–43. [Online] March/April 2012. Available from: http://www.insidegnss.com/auto/marapr12-Pullen.pdf [Accessed: August 20, 2015]
  • 27. RT (2012) Texas college hacks drone in front of DHS. [Online] June 2012. Available from: http://rt.com/usa/texas-1000-us-government-906 [Accessed: August 20, 2015]
  • 28. Scott, L. (2012) Spoofs, Proofs & Jamming. Towards a Sound National Policy for Civil Location and Time Assurance. Inside GNSS. Global Navigation Satellite Systems. Engineering, Policy and Design. pp. 42, 44–53. [Online] September/October 2012. Available from: http://www.insidegnss.com/auto/2012-sepoct-Scott.pdf [Accessed: August 20, 2015]
  • 29. Scott, L. (2013) Spoofing: Upping the Anti. Inside GNSS. Global Navigation Satellite Systems. Engineering, Policy and Design. pp. 18–19. [Online] July/August 2013. Available from: http://www.insidegnss.com/auto/IGM_TLS07_13.pdf [Accessed: August 20, 2015]
  • 30. UT News (2013) UT Austin Researchers Successfully Spoof an $80 million Yacht at Sea. [Online] July 2013. Available from: http://news.utexas.edu/2013/07/29/ut-austin-researchers-successfully-spoof-an-80-million-yacht-at-sea [Accessed: August 20, 2015]
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniajacą naukę.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-f7ef601a-880d-4f28-9582-a473c10b0233
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.