Hello,

We noticed you're browsing in private or incognito mode.

To continue reading this article, please exit incognito mode or log in.

Not an Insider? Subscribe now for unlimited access to online articles.

Intelligent Machines

Hijacking Satellite Navigation

Sending false signals to GPS receivers could disrupt critical infrastructure.

The Global Positioning System (GPS) lies at the heart of an increasing number of technologies, from vehicle navigation systems to the power grid. And yet, although the military version of GPS includes security features such as encryption, civilian signals are transmitted in the clear. Now, researchers at Cornell University and Virginia Tech have demonstrated a relatively simple way to fool ordinary GPS receivers into accepting bogus signals using a briefcase-size transmitter.

Out of position: Researchers have found that a software-based GPS device (shown above) can fool GPS receivers into accepting erroneous positional information. The attack could disrupt critical infrastructure, they warn.

Paul Kintner, a professor of electrical and computer engineering at Cornell, who worked on the project, warns that society is becoming dependent on GPS for an ever-broadening list of applications, including management of the power grid and tracking criminals under house arrest. “I’m just amazed at the way people are using these GPS systems,” Kintner says. “Ten years from now, there will be more ways that we just don’t know about–it migrates into our technological fabric, and we become dependent on it.”

Kintner and his group, which recently presented details of the spoofing attack at the Institute of Navigation’s Global Navigation Satellite Systems (GNSS) meeting in Savannah, GA, did not start out looking for a way to subvert GPS. They were working on a software-based GPS receiver to help them understand the effects of solar flares on GPS satellites. But as their design progressed, Todd Humphreys, one of the researchers in the group, realized that the same system could be used to spoof ordinary GPS signals.

Here’s how GPS works: roughly 30 satellites orbit the earth, broadcasting signals that can be picked up by a receiver virtually anywhere on the planet. By collecting signals from several satellites and measuring the time delay between each signal, GPS receivers can calculate their exact position and receive very precise time signals.

The software GPS device built at Cornell can receive and transmit any GPS signal. To attack a target receiver, the device need only be placed nearby. It would start out simply retransmitting ordinary satellite signals without any modifications. After a few seconds, the target receiver should focus on the signal coming from the device, because it’s the clearest source. At that point, the device could begin modifying transmissions, altering the signals little by little until the target receiver shows any time and position the attacker chooses. Kintner says that an attacker could use fake GPS signals to disrupt the power grid, potentially causing power spikes and even damaging generators. The same trick could let criminals under house arrest move around freely, he adds.

Richard Langley, a professor in the Department of Geodesy and Geomatics at the University of New Brunswick, in Canada, who has worked extensively with GPS, says that this potential weak spot in the technology has, in fact, been known for years, although little has been done to date to protect the civilian system against it. “You would think that more would have been developed by now,” he says, “but maybe it takes the demonstration that these guys have carried out to show how easily a GPS receiver can be spoofed.”

Langley notes that solutions are some distance away. Although a European navigation system, called Galileo, will have the ability to send encrypted signals for civilian use, it isn’t scheduled to be fully operational until 2013. It would be possible to add encryption to the existing system, but Langley says that the likely cost and disruption make this an unlikely solution. The best bet in the near term, he says, is to add security features to normal GPS receivers.

One option would be to add more antennas to receivers. The attack relies on the fact that most consumer GPS receivers use just a single antenna to receive signals from multiple satellites. By adding multiple antennas, a normal receiver could recognize that the spoofed signals in fact come from only one source. But Langley notes that there would be a cost trade-off. “Manufacturers have to get a return on any investment they make in antispoofing technology,” he says.

Kintner says that manufacturers have time to respond before attacks become realistic, but he warns that countermeasures have to be introduced. “We live in a time where we’re really dependent on technology,” he says. “We need to understand how that makes us vulnerable.”

If the technology needed to make a GPS spoofing device is miniaturized, then handheld devices could be produced for about $1,000 each, Kintner warns. “My greatest fear is that someone will reduce it to the size of a cigarette pack, and the world will be flooded with these small devices at a fairly cheap price,” he says. “That would make GPS useless in a whole variety of circumstances.”

Want to go ad free? No ad blockers needed.

Become an Insider
Already an Insider? Log in.
More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Plus.
  • Insider Plus {! insider.prices.plus !}*

    {! insider.display.menuOptionsLabel !}

    Everything included in Insider Basic, plus the digital magazine, extensive archive, ad-free web experience, and discounts to partner offerings and MIT Technology Review events.

    See details+

    Print + Digital Magazine (6 bi-monthly issues)

    Unlimited online access including all articles, multimedia, and more

    The Download newsletter with top tech stories delivered daily to your inbox

    Technology Review PDF magazine archive, including articles, images, and covers dating back to 1899

    10% Discount to MIT Technology Review events and MIT Press

    Ad-free website experience

/3
You've read of three free articles this month. for unlimited online access. You've read of three free articles this month. for unlimited online access. This is your last free article this month. for unlimited online access. You've read all your free articles this month. for unlimited online access. You've read of three free articles this month. for more, or for unlimited online access. for two more free articles, or for unlimited online access.