'Spoofed' GPS signals can be countered, researchers show

July 24, 2012 By Anne Ju, Cornell University

(Phys.org) -- From cars to commercial airplanes to military drones, global positioning system (GPS) technology is everywhere -- and Cornell researchers have known for years that it can be hacked, or as they call it, "spoofed." The best defense, they say, is to create countermeasures that unscrupulous GPS spoofers can't deceive.

Researchers led by Mark Psiaki, professor of mechanical and aerospace engineering, got to test their latest protections against GPS spoofing during a -sponsored demonstration last month in the New Mexico desert at the White Sands Missile Range.

The much-publicized June 19 demo of a mini helicopter's being spoofed was led by Todd Humphreys, Ph.D. '08, now an assistant professor at the University of Texas, Austin. Humphreys, who designed a sophisticated GPS spoofing system as an outgrowth of his Cornell Ph.D. and postdoctoral studies, also testified before Congress July 19 on the threat of GPS spoofing.

GPS is a navigation and timing system of satellites that circle Earth and transmit signals to receivers on land, sea and air to provide precise information on the receivers' locations and clock offsets. Lesser known is its ubiquitous presence in, for example, commercial and military aircraft navigation, control of the power grid, and even automated .

Spoofing is the transmission of false GPS signals that receivers accept as authentic ones, theoretically allowing hackers to gain control over planes, vehicles or other devices that rely on GPS for navigation or timing.

On June 19, Humphreys and colleagues set out to demonstrate how a spoofing attack works, using live "on-air" transmissions, with permission from the Department of Homeland Security, to confuse real GPS signals in a remote area in New Mexico. Using fake GPS transmissions from about half a kilometer (0.3 miles) away, they hijacked a mini drone, causing it to dip violently because it assumed it was inadvertently climbing when, in reality, it had been hovering at its desired altitude.

On the sidelines were Cornell researchers Psiaki, senior engineer Steve Powell and graduate students Brady O'Hanlon and Ryan Mitch. They were testing a receiver modification that can differentiate spoofed GPS signals from real ones.

"The idea is not just for us to make spoofers so we can show bad things can happen, but also to gain insight into countermeasures in typical GPS receivers so they can be less vulnerable to attack," Powell said.

Psiaki said their latest countermeasure allowed the Cornell group to correctly detect spoofing in three cases during the demo. "This is strong confirmation that our system can successfully detect spoofing in an autonomous mode using short segments of GPS receiver data. It is the first known detection of this type of attack from a live, on-air spoofer," Psiaki said.

An earlier, less sophisticated spoofing detector developed at Cornell is patent pending. Data from this latest demonstration will form the basis of a scientific paper, and a decision to apply for patent protection is forthcoming, according to Psiaki.

GPS spoofing isn't exactly on the collective consciousness, but it is a growing threat: Last year, Iran claimed to have spoofed -- and downed -- a GPS-guided American drone. Such an attack, Psiaki said, might have been carried out using techniques similar to those demonstrated at White Sands if the drone had been using civilian GPS signals. It is not unimaginable, he continued, that the Iranians (possibly with outside help) could have conducted a spoofing-like attack that used encrypted military GPS signals.

Psiaki also said that currently available GPS anti-spoofing technology, called Receiver Autonomous Integrity Monitoring, would not work with the smarter spoofers that Humphreys began developing in 2008 in collaboration with the Cornell GPS group.

"[Humphreys] has developed the baddest known spoofer there is," Psiaki said. "It's a great 'war games' tool that provides realistic attack scenarios for testing improved spoofing defenses. We're happy that our ongoing collaboration has produced several strong defenses that, taken together, may lay this national threat to rest."

Explore further: UT researchers show how easy it is to spoof unencrypted GPS signals used by drones

Related Stories

Protect privacy from drones at home, lawmakers say

July 19, 2012

Before thousands of civilian drones begin flying in U.S. skies, Congress should take steps to protect the public's privacy and prevent terrorists from hacking or jamming signals that control the aircraft, lawmakers said Thursday.

RQ-170 drone's ambush facts spilled by Iranian engineer

December 17, 2011

(PhysOrg.com) -- In the aftermath of the Iran capture of a US military drone earlier this month now come arguments over how Iran managed to pull it off. An Iranian engineer’s exclusive interview with The Christian Science ...

Study confirms that road users are jamming GPS signals

February 21, 2012

The first direct evidence of GPS jammers in use on British roads will be presented today alongside predictions of a major incident involving ships in the English Channel over the next decade caused by disruption to navigation ...

GPS Jamming Devices Pose Many Threats (w/ Video)

February 25, 2010

(PhysOrg.com) -- The latest GPS jamming devices are now being used by car thieves in the UK to render stolen cars and trucks undetectable by law enforcement. These devices also pose a threat to airlines and US military overseas.

Air Force: Tests didn't include troubled GPS unit

May 17, 2010

(AP) -- The Air Force says it performed no advance testing on the specific type of military GPS receiver that had problems picking up locator signals after a change in ground-control software.

Recommended for you

Tiny 'water bears' can teach us about survival

March 20, 2019

Earth's ultimate survivors can weather extreme heat, cold, radiation and even the vacuum of space. Now the U.S. military hopes these tiny critters called tardigrades can teach us about true toughness.

A decade on, smartphone-like software finally heads to space

March 20, 2019

Once a traditional satellite is launched into space, its physical hardware and computer software stay mostly immutable for the rest of its existence as it orbits the Earth, even as the technology it serves on the ground continues ...

Researchers find hidden proteins in bacteria

March 20, 2019

Scientists at the University of Illinois at Chicago have developed a way to identify the beginning of every gene—known as a translation start site or a start codon—in bacterial cell DNA with a single experiment and, through ...

Turn off a light, save a life, says new study

March 20, 2019

We all know that turning off lights and buying energy-efficient appliances affects our financial bottom line. Now, according to a new study by University of Wisconsin-Madison researchers, we know that saving energy also saves ...


Adjust slider to filter visible comments by rank

Display comments: newest first

not rated yet Jul 24, 2012
"correctly detect spoofing in three cases during the demo"--three out of three or three out of hundreds?
not rated yet Jul 24, 2012
Seems to me there's already a couple of companies which build such spoofers, or simulators as they might be called. Pretty sure these companies also have "spoofer-resistant" receivers. I'm curious what their "patent-pending" integrity-monitoring methods include.
not rated yet Jul 24, 2012
I must be missing something. How does something spoof a satellite the is in geo orbit.
not rated yet Jul 25, 2012
Next step for the bad guys is to get some of these radios and then figure out how to outwit them. Consider the extraordinary amount of resources that can be brought to bear by potential antagonists (e.g. governments of other countries).

I imagine for high reliability, other sorts of backup navigation systems will be employed alongside GPS. Maybe as simple as a camera that can view the terrain and compare it to what it should be.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.