UT researchers show how easy it is to spoof unencrypted GPS signals used by drones

Jun 27, 2012 by Bob Yirka report
Armed Predator drone firing Hellfire missile. Image: Wikipedia.

(Phys.org) -- Professor Todd Humphreys of the University of Texas is making a lot of people nervous. First he and his team demonstrated their ability to circumvent the signals a drone flying over the university stadium was using to plot its course, causing it to nearly crash into the ground, before suddenly saving it from certain destruction. And as if that wasn’t enough to make the point that drones flying using unencrypted GPS signals are vulnerable to spoofing, surely another demonstration he and his team gave for representatives of the Federal Aviation Administration and Department of Homeland Security drove the point home. They were very easily able to fool a drone in a test at White Sands Missile Range, with an inexpensively made device, into following the commands given by his team on multiple occasions.

Up till now, the main concern regarding drones, other than privacy or moral issues, has been the knowledge that practically anyone can obtain a jamming that prevents a drone from hearing GPS signals being sent by a satellite, thereby causing it to fly blind. Most such drones are programmed to land themselves if such an event occurs. Many believe this is exactly what happened last year when Iran claimed to have successfully brought down a US military drone flying over its airspace. Unfortunately, it appears, there is a far greater threat and it comes from spoofers, rather than jammers.

Spoofers are devices that fool other devices into believing that it’s the device they are supposed to be communicating with. In the case of drones, a spoofing device can send out a signal that is stronger than the signal the drone receives from a satellite. By matching the signal, the spoofer is able to fool the drone into thinking it’s still getting its data from the satellite and thus becomes a trusted source. Once that occurs, those running the spoofing device can send commands to the drone causing it to behave as they indicate, ignoring those that come from other sources, in essence, allowing the drone to be hijacked by anyone with such a device. It should be noted that this is only possible with drones that use unencrypted GPS signaling, e.g. most non-military drones.

Humphreys told the officials at the demo that all of his equipment together cost only about a thousand dollars to put together, meaning the technology is easily accessible by anyone wishing to take over a for purposes other than for demonstration. In such cases, drones could be made to crash into buildings, sporting stadiums, other planes or any other target they choose. Particularly troubling is the fact that the FAA has outlined a plan for allowing commercial drones to fly in the United States by 2015, most of which would be flying using unencrypted GPS signals.

Humphreys and his team are hoping the demonstrations convince government officials to make changes to requirements on signaling devices on drones before allowing them to fly in US air space.

Explore further: Sweeping air devices for greener planes

More information: radionavlab.ae.utexas.edu/

via Fox

Related Stories

RQ-170 drone's ambush facts spilled by Iranian engineer

Dec 17, 2011

(PhysOrg.com) -- In the aftermath of the Iran capture of a US military drone earlier this month now come arguments over how Iran managed to pull it off. An Iranian engineer’s exclusive interview with The Christian Science Monitor has been published, which details how the Iranians captured the drone through ...

Drone in action for the rainforest

Feb 28, 2012

Vast areas of Indonesia’s rainforests are being destroyed by logging and conversion to oil palm plantations. In this Southeast Asian country, deforestation has reached alarming levels.

Recommended for you

Sweeping air devices for greener planes

10 hours ago

The large amount of jet fuel required to fly an airplane from point A to point B can have negative impacts on the environment and—as higher fuel costs contribute to rising ticket prices—a traveler's wallet. ...

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

trekgeek1
not rated yet Jun 27, 2012
Looks like General Atomics isn't taking enough time to consider their designs. Nobody thought about that during the planning stages?
xsparc
not rated yet Jun 27, 2012
Looks like General Atomics isn't taking enough time to consider their designs. Nobody thought about that during the planning stages?


It should be noted that this is only possible with drones that use unencrypted GPS signaling, e.g. most non-military drones.

Looks like someone cant read. I'm sure all the UAVs have the capability. Now if the ground crew that launches them didn't key the GPS system, that's a totally different matter.
trekgeek1
not rated yet Jun 27, 2012
Looks like General Atomics isn't taking enough time to consider their designs. Nobody thought about that during the planning stages?


It should be noted that this is only possible with drones that use unencrypted GPS signaling, e.g. most non-military drones.

Looks like someone cant read. I'm sure all the UAVs have the capability. Now if the ground crew that launches them didn't key the GPS system, that's a totally different matter.


Yes, most non-military drones does NOT imply that all military drones use encoding. Pardon me for thinking the article may have been about the drone pictured on the article.