Analysis of GNSS replay-attack detectors exploiting unpredictable symbols

Ruben Morales Ferre, Gonzalo Seco Granados
2018 Zenodo  
Since its inception, GNSS (Global Navigation Satellite System) have become more popular year after year. GNSS is currently used in a wide variety of applications beyond the determination of the user position by means of a GNSS receiver. GNSS is used in sectors as different as finance, energy distribution or telecommunications. Due to this increase in popularity in the last years, GNSS has become objective of attacks, with the purpose of control the victim receiver and provide an erroneous PVT
more » ... osition, Time and Velocity) solution. In first place, in this document are described the basic concepts of GNSS, this means describe the elements that composes GNSS and how the PVT solution is determined by the receiver. Once are shown the basic concepts of GNSS, the attacks are presented. The state-of-the-art of the attacks against GNSS is described, with the objective of showing the wide variety of possibilities there are available. Next are explained in detail the SCER (Security Code Estimation and Replay) attacks based on the estimation of the impracticable bits. For this attack, are proposed three different strategies, two of them based on modifying the signal at chip level and a third one based on the modification of the bit amplitude, and four detection methods. Once there has been explained in detail in what consist each of them, a comparison of the different attacks and detection methods are carried out in order to determine which attack is the best (from the point of view of the attacker) and which detection method is more effective against each attack strategy.
doi:10.5281/zenodo.3479302 fatcat:dliavs7r2vemnh7oim6f2au37u