• Title/Summary/Keyword: spoofing environment

Search Result 50, Processing Time 0.047 seconds

Implementation of GPS Spoofing Test Environment using Multiple GPS Simulators

  • So, Hyoungmin
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.4
    • /
    • pp.165-172
    • /
    • 2016
  • A Global Navigation Satellite System (GNSS), which is typically exemplified by the Global Positioning System (GPS), employs a open signal structure so it is vulnerable to spoofing electronic attack using a similar malicious signal with that used in the GPS. It is necessary to require a spoofing test evaluation environment to check the risk of spoofing attack and evaluate the performance of a newly developed anti-spoofing technique against spoofing attacks. The present paper proposed a simulation method of spoofing environment based on simulator that can be implementable in a test room and analyzed the spoofing simulation performance using commercial GPS receivers. The implemented spoofing simulation system ran synchronized two GPS simulator modules in a single scenario to generate both of spoofing and GPS signals simultaneously. Because the signals are generated in radio frequency, a commercial GPS receiver can be tested using this system. Experimental test shows the availability of this system, and anti-spoofing performance of a commercial GPS receiver has been analyzed.

Design and Performance Evaluation of GPS Spoofing Signal Detection Algorithm at RF Spoofing Simulation Environment

  • Lim, Soon;Lim, Deok Won;Chun, Sebum;Heo, Moon Beom;Choi, Yun Sub;Lee, Ju Hyun;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.4
    • /
    • pp.173-180
    • /
    • 2015
  • In this study, an algorithm that detects a spoofing signal for a GPS L1 signal was proposed, and the performance was verified through RF spoofing signal simulation. The proposed algorithm determines the reception of a spoofing signal by detecting a correlation distortion of GPS L1 C/A code caused by the spoofing signal. To detect the correlation distortion, a detection criterion of a spoofing signal was derived from the relationship among the Early, Prompt, and Late tap correlation values of a receiver correlator; and a detection threshold was calculated from the false alarm probability of spoofing signal detection. In this study, an RF spoofing environment was built using the GSS 8000 simulator (Spirent). For the RF spoofing signal generated from the simulator, the RF spoofing environment was verified using the commercial receiver DL-V3 (Novatel Inc.). To verify the performance of the proposed algorithm, the RF signal was stored as IF band data using a USRP signal collector (NI) so that the data could be processed by a CNU software receiver (software defined radio). For the performance of the proposed algorithm, results were obtained using the correlation value of the software receiver, and the performance was verified through the detection of a spoofing signal and the detection time of a spoofing signal.

Analysis of GPS Spoofing Characteristics and Effects on GPS Receiver (GPS 신호기만의 특성 및 수신기에 미치는 영향 분석)

  • Shin, Mi-Young;Cho, Sung-Lyong;Kim, Jun-Oh;Song, Ki-Won;Lee, Sang-Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.296-303
    • /
    • 2010
  • The term "spoofing" refers to the transmission of counterfeit signals to provide undetectable falsification of GPS service. A spoofing can be accomplished using information from open literature which defines the signal format and the data structure. Spoofing is intended either to produce erroneous navigation solutions or saturate the processor of the victim receiver. The GPS receiver has no way to get rid of the effect of a spoofing because GPS receivers for civil service do not have an anti-spoofing scheme. This paper analyzes the spoofing characteristics, spoofing methods and environment conditions. And the spoofing effects on GPS receiver are analyzed in detail using the designed software-based spoofer and the Nordnav receiver.

A Spoofing Detection Scheme Based on Elevation Masked-Relative Received Power in GPS Receivers using Multi-band Array Antenna

  • Junwoo Jung;Hyunhee Won;Sungyeol Park;Haengik Kang;Seungbok Kwon;Byeongjin Yu;Seungwoo Seo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.2
    • /
    • pp.101-111
    • /
    • 2023
  • Many spoofing detection studies have been conducted to cope with the most difficult types of deception among various disturbances of GPS, such as jamming, spoofing, and meaconing. In this paper, we propose a spoofing detection scheme based on elevation masked-relative received power between GPS L1 and L2 signals in a system using a multi-band array antenna. The proposed scheme focuses on enabling spoofing to be normally detected and minimizes the possibility of false detection in an environment where false alarms may occur due to pattern distortion among elements of an array antenna. The pattern distortion weakens the GPS signal strength at low elevation. It becomes confusing to detect a spoofing signal based on the relative power difference between GPS L1 and L2, especially when GPS L2 has weak signal strength. We propose design parameters for the relative power threshold including beamforming gain, the minimum received power difference between L1 and L2, and the patch antenna gain difference between L1 and L2. In addition, in order to eliminate the weak signal strength of GPS L2 in the spoofing detection process, we propose a rotation matrix that sets the elevation mask based on platform coordinates. Array antennas generally do not have high usefulness in commercial areas where receivers are operated alone, but are considered essential in military areas where GPS receivers are used together with signal processing for beamforming in the direction of GPS satellites. Through laboratory and live sky tests using the device under test, the proposed scheme with an elevation mask detects spoofing signals well and reduces the probability of false detection relative to that without the elevation mask.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

The Performance Analysis of Beamforming Algorithm for Anti-Spoofing

  • Choi, Yun Sub;Lee, Sun Yong;Park, Chansik;Ahn, Byoung Sun;Won, Hyun Hee;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.5 no.3
    • /
    • pp.131-136
    • /
    • 2016
  • The present paper shows that beamforming algorithm such as Minimum Variance Distortionless Response (MVDR) based on array antenna signal processing can have not only anti-jamming but also anti-spoofing characteristics. A beam pattern due to the beamforming algorithm strengthens received signal power as it is formed in the incident direction of desired signal. During the process, the effect of unnecessary signals such as spoofing signals can be reduced because the beam pattern reduces received signal power in the incident directions excluding the beam pattern-directed direction. In order to analyze the anti-spoofing effect due to the beamforming algorithm, a software-based simulation environment was configured. An arbitrary error was applied between incident direction of Global Positioning System (GPS) satellite signal and steering vector direction of the beamforming algorithm to analyze the received signal power and required conditions were provided to see the anti-spoofing effect due to the beamforming algorithm. The used antenna was 7-element planar circular array and beam patterns were formed through the MVDR algorithm.

A Study to Efficiently Overcome GPS Jamming and GPS Spoofing by using Data Link System (데이터링크를 사용하는 체계에서 GPS 재밍(Jamming)과 GPS 기만(Spoofing)을 효과적으로 극복하기 위한 방안 연구)

  • Jee, Seungbae;Kim, Sangjun;Lee, Jungsik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.1
    • /
    • pp.37-45
    • /
    • 2015
  • These days many systems use the gps signal to get their own position. Because it's cheap and accurate and convenient. But, the strength of gps signal is very weak and can be easily interrupted by GPS jamming and GPS spoofing. Normally, fighter can use DME, TACAN, etc to correct their position error when GPS is not working. But, many aircraft which does not have those kinds of hardware need to pay additional cost to get it. In this paper, we propose how to overcome GPS jamming and GPS spoofing by only using data link system. The main purpose of this paper is to make the data link protocol to get an exact position information of own unit at gps error environment.

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Designing Mutual Cooperation Security Model for IP Spoofing Attacks about Medical Cluster Basis Big Data Environment (의료클러스터 기반의 빅 데이터 환경에 대한 IP Spoofing 공격 발생시 상호협력 보안 모델 설계)

  • An, Chang Ho;Baek, Hyun Chul;Seo, Yeong Geon;Jeong, Won Chang;Park, Jae Heung
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.21-29
    • /
    • 2016
  • Our society is currently exposed to environment of various information that is exchanged real time through networks. Especially regarding medical policy, the government rushes to practice remote medical treatment to improve the quality of medical services for citizens. The remote medical practice requires establishment of medical information based on big data for customized treatment regardless of where patients are. This study suggests establishment of regional medical cluster along with defense and protection cooperation models that in case service availability is harmed, and attacks occur, the attacks can be detected, and proper measures can be taken. For this, the study suggested forming networks with nationwide local government hospitals as regional virtual medical cluster bases by the same medical information system. The study also designed a mutual cooperation security model that can real time cope with IP Spoofing attack that can occur in the medical cluster and DDoS attacks accordingly, so that the limit that sole system and sole security policy have can be overcome.

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF