655
7 CONCLUSION
GNSS spoofing has been recognised a particularly
harmful and serious form of threat to GNSS
performance and operation. Numerous research
groups have worked extensively on the problem.
GNSSspoofingoperationhasbeendemonstratedina
number of research projects, justifying a significant
effortincounter‐measuresdevelopment.
Curiously
enough, only the unconfirmed
allegations of GNSS spoofing inoperation have
beenrecordedsofar.However,thethreatmustnotbe
treatedlightly,butjustasanopportunitytocounter‐
measure the cyber‐attack of potential serious effects
on the economy, safety and security, and society in
general.
Here the
foundations of a novel approach in
combating GNSS spoofing threats are presented.
After a brief outline of GNSS position estimation
process and its shortcomings and vulnerabilities, a
thoroughexaminationoftheGNSSspoofingproblem
isgiven.PotentialsofvariousGNSSspoofingcounter‐
measures development were assessed. The GNSS
Spoofing Detection and
Mitigation (GNSS SDM)
method was developed and outlined, within the
establishedframeworkarchitectureandrequirements
for GNSS anti‐spoofing. The proposed method does
notrequire modificationof either the existing GNSS
coresystems,ortheprevailingmajorityoftheexisting
user equipments (smartphones, in particular). The
proposed concept is validated
in simulation‐based
scenario developed within the R framework for
statistical computing, demonstrating GNSS spoofing
detectionand statistical learning‐basedclassification.
GNSS spoofing mitigation was conducted using the
verynatureoftheproposedconcept.
GNSS spoofing is a serious information security
threat that should be mitigated efficiently and
completely.Potentialdamage
andliabilitiesresulting
fromGNSSspoofingareenormous.Itisbelievedthat
the proposed method, based on statistical learning,
and potentially enhanced further with cryptography
methods,mayprovideasuccessfultoolincombating
GNSSspoofing.
REFERENCE
Alvarez, G, and Li, S.(2006). Some Basic Cryptographic
Requirements for Chaos‐Based Cryptosystems. Int J of
BifurcandChaos,16(8),2129‐2151.
Babu,AM,andSingh,KJ.(2013).PerformanceEvaluation
of Chaotic Encryption Technique. Amer J of Appl Sci,
10(1),35‐41.
Bhatti, J, and Humphreys, T E.
(2017). Hostile Control of
Ships via False GPS Signals: Demonstration and
Detection. NAVIGATION: Journal of the Institute of
Navigation,64(1),51‐66.doi:10.1002/navi.183
Capparra, G et al. (2016). Navigation Message
AuthenticationSchemes.InsideGNSS,Sep‐Oct2016,64‐
73.
Filić,M,and Filjar,R. (2018a). Forecasting model
of space
weather‐drivenGNSSpositioningperformance.Lambert
AcademicPublishing.Riga,Latvia.
Filić, M, Filjar, R. (2018b). Smartphone GNSS positioning
performance improvements through utilisation of
Google Location API. Proc of 41 st International
ConventionMIPRO/CTI,507‐510.Opatija,Croatia.doi:
10.23919/MIPRO.2018.8400087
Filić,M, Grubišić,L,and Filjar, R.
(2018). Improvement of
standard GPS position estimation algorithm through
utilization of Weighted Least‐Square approach. Proc of
11th Annual Baška GNSS Conference, 7‐19. Baška, Krk
Island, Croatia. Available at:
https://www.pfri.uniri.hr/web/hr/dokumenti/zbornici‐
gnss/2018‐GNSS‐11.pdf
Filić,M.(2017).Analysisofthepositionestimationprocedure
based on the given GNSS pseudoranges in the
Software‐Defined Radio satellite navigation receiver
(Mscthesis,inCroatian).Universityof Zagreb,Faculty
of Science, Dept for Mathematics. Zagreb, Croatia.
Availableat:https://bit.ly/2DlX9O6
Gallier,J,andQuaintance,J.(2018).FundamentalsofLinear
Algebra and Optimization. Dept of Computer and
Information Science, University of Pennsylvania.
Philadelphia, PA. Avaialble at:
https://www.seas.upenn.edu/~cis515/linalg.pdf
Gustafsson, F. (2010). Statistical Sensor Fusion.
Studentlitteratur.Linkoepping,Sweden.
Humphreys,Tetal.(2008).AssessingtheSpoofingThreat:
DevelopmentofaPortableGPSCivilianSpoofer.Procof
IONGNSS2008,3584‐3590.Savannah,GA.
Jafarnija‐Jahromi, A et al. (2012). GPS Vulnerability to
Spoofing Threats and a Review of Antispoofing
Techniques.IntJofNavandObs,2012,ArticleID127072,
16pages.doi:10.1155/2012/127072
Kerns,AJ,Shepard,DP,Bhatti,JA, andHumphreys,TE.
(2014a). Unmanned Aircraft Capture and Control via
GPS Spoofing.Jof Field Robotics,July/Augist2014,617‐
636.doi:10.1002/rob.21513
Kerns,AJ,
Wesson,KD,andHumphreys,T E.(2014b).A
Blueprint for Civil GPS Navigation Message
Authentication.ProcofIEEE/IONPLANS2014(8pages).
Monterey,CA.
Kuhn, M G. (2010). Signal Authentication in Trusted
SatelliteNavigationReceivers.Chapterin:Sadegi,A‐R,
and Naccache, D (eds). (2010). Towards Hardware‐
Intrinsic Security: Foundations
and Practice. Springer
Verlag.NewYork,NY.
Landau,GM,andVishkin,U.(1988).FastStringMatching
withkDifferences.JCompandSystSci,37,63‐78.
Levenshtein, V I. (1966). Binary Codes Capable of
Correcting Deletions, Insertions, and Reversals
(translated from Russian version). Cybernetics and
ControlTheory,10(8),
707‐710.
Mitola, J. (1995). The Software Radio Architecture. IEEE
CommMag,May1995,26‐38.
Navarro,G.(2001).AGuidedTourToApproximateString
Matching.ACMCompSurveys,33(1),31‐88.
Nighswander,Tetal.(2012).GPSSoftwareAttacks.Procof
CCS2012Conference.Raleigh,NC.
O’Driscoll, C.
(2018). What is navigation message
authentication? Inside GNSS, Jan/Feb 2018, 26‐31.
Availableat:https://bit.ly/2SEM6UC
Pecora,Metal.(1997).Fundamentalsofsynchronisationin
chaotic systems, concepts, and applications. Chaos, 7,
520‐543.
Petrovski, I G, and Tsujii, T. (2012). Digital Satellite
Navigation and Geophysics: A Practical Guide with
GNSS
Signal Simulator and Receiver Laboratory.
CambridgeUniversityPress.Cambridge,UK.
Psiaki, M L, and Humphreys, T E. (2016). GNSS Spoofing
andDetection.ProcofIEEE,104(6),1258‐1270.
Schenewerk, M et al. (2016). Quality Controlling RINEX
Navigation Message Files. Proc IGS Workshop: GNSS
Futures. Sydney, NSW. Available at:
https://bit.ly/2RwUvIu
Stewart R W et al. (2015). Software Defined Radio using
MatLab & Simulink and the RTL‐SDR. Strathclyde
AcademiaMedia.Glasgow,UK.