File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Distributed Multi-Antenna GPS Spoofing Attack using Off-The-Shelf Devices

TitleDistributed Multi-Antenna GPS Spoofing Attack using Off-The-Shelf Devices
Authors
Keywordsgnss security
gps spoofing
multi-Antenna systems
software-defined radio
Issue Date2025
Citation
Wisec 2025 Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, p. 28-39 How to Cite?
AbstractGlobal Positioning System (GPS) signals, though critical to numerous civilian and industrial applications, remain susceptible to spoofing due to their unencrypted nature. While many existing defenses focus on single-Antenna spoofing, multi-Antenna spoofing has been theorized as a significantly more potent threat. However, practical realizations of multi-Antenna spoofing have been limited by the stringent requirement of nanosecond-level synchronization. In this paper, we present the first low-cost, end-To-end implementation of a distributed multi-Antenna GPS spoofing attack using off-The-shelf devices. We systematically examine the technical prerequisites, establishing sub-50 ns alignment among spoofing signals as the requirement for successfully spoofing standard GPS receivers. Building on this analysis, we design a multi-Antenna spoofing system that continuously monitors and adaptively adjusts relative signal timing, mitigating hardware imperfections and oscillator drift in real time. Our prototype, built using HackRFs and Raspberry Pis, demonstrates that it can successfully spoof devices such as Android phones and commercial GPS receivers. Through controlled experiments in an anechoic chamber, we show that our attack can steer these receivers to falsified locations with an average error of 30∼m, while also evading detection by robust angle-of-Arrival-based systems. Finally, we discuss practical considerations for wide-Area deployments, along with countermeasures that may mitigate this emerging threat.
Persistent Identifierhttp://hdl.handle.net/10722/363051

 

DC FieldValueLanguage
dc.contributor.authorCheng, Xiang-
dc.contributor.authorYang, Hanchao-
dc.contributor.authorLiu, Shinan-
dc.contributor.authorYang, Yaling-
dc.date.accessioned2025-10-10T07:44:17Z-
dc.date.available2025-10-10T07:44:17Z-
dc.date.issued2025-
dc.identifier.citationWisec 2025 Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2025, p. 28-39-
dc.identifier.urihttp://hdl.handle.net/10722/363051-
dc.description.abstractGlobal Positioning System (GPS) signals, though critical to numerous civilian and industrial applications, remain susceptible to spoofing due to their unencrypted nature. While many existing defenses focus on single-Antenna spoofing, multi-Antenna spoofing has been theorized as a significantly more potent threat. However, practical realizations of multi-Antenna spoofing have been limited by the stringent requirement of nanosecond-level synchronization. In this paper, we present the first low-cost, end-To-end implementation of a distributed multi-Antenna GPS spoofing attack using off-The-shelf devices. We systematically examine the technical prerequisites, establishing sub-50 ns alignment among spoofing signals as the requirement for successfully spoofing standard GPS receivers. Building on this analysis, we design a multi-Antenna spoofing system that continuously monitors and adaptively adjusts relative signal timing, mitigating hardware imperfections and oscillator drift in real time. Our prototype, built using HackRFs and Raspberry Pis, demonstrates that it can successfully spoof devices such as Android phones and commercial GPS receivers. Through controlled experiments in an anechoic chamber, we show that our attack can steer these receivers to falsified locations with an average error of 30∼m, while also evading detection by robust angle-of-Arrival-based systems. Finally, we discuss practical considerations for wide-Area deployments, along with countermeasures that may mitigate this emerging threat.-
dc.languageeng-
dc.relation.ispartofWisec 2025 Proceedings of the 18th ACM Conference on Security and Privacy in Wireless and Mobile Networks-
dc.subjectgnss security-
dc.subjectgps spoofing-
dc.subjectmulti-Antenna systems-
dc.subjectsoftware-defined radio-
dc.titleDistributed Multi-Antenna GPS Spoofing Attack using Off-The-Shelf Devices-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/3734477.3734706-
dc.identifier.scopuseid_2-s2.0-105012090838-
dc.identifier.spage28-
dc.identifier.epage39-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats