Evaluation of Impact of Intermediate GPS Spoofing to Mobile Terminals

Tatsuya Ueki, Kazutoshi Yoshii, Shigeru Shimamoto, Katsunari Mizuno, Kenta Matsufuji

Research output: Contribution to journalConference articlepeer-review

Abstract

GPS is known to be vulnerable to GPS spoofing. This can be divided into three stages based on technical aspects: Simplistic, Intermediate, and Sophisticated [1]. Intermediate spoofing is a feasible and threatening technology. However, most of the existing research on mobile device spoofing focuses only on the Simplistic spoofing, which is the least threatening, and there are few experimental-based studies specifically on Intermediate spoofing. In this article, we conduct an experiment of Simplistic and Intermediate spoofing on mobile terminals using an open-source GPS signal generation simulator and analyze the threats.

Original languageEnglish
Pages (from-to)717-718
Number of pages2
JournalProceedings - IEEE Consumer Communications and Networking Conference, CCNC
DOIs
Publication statusPublished - 2022
Event19th IEEE Annual Consumer Communications and Networking Conference, CCNC 2022 - Virtual, Online, United States
Duration: 2022 Jan 82022 Jan 11

Keywords

  • electric field strength
  • GPS
  • SDR
  • spoofing

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Evaluation of Impact of Intermediate GPS Spoofing to Mobile Terminals'. Together they form a unique fingerprint.

Cite this