Abstract
The Global Positioning System has long been a great tool for military—and, of course, civilian—activities, but the military’s heavy reliance on it also makes it a likely target. Due to the character of the satellite navigation system, security vulnerabilities exist that threaten information continuity and integrity. In this chapter possible threats for global satellite systems are discussed briefly and some actual civil and military actions of Navigation Warfare are mentioned. The chapter also gives an overview of past and current research done on these type of vulnerabilities by the Netherlands Defence Academy. Within this research different approaches to Navigation Warfare actions are explored. For this purpose mitigation concepts are designed and tested in a laboratory setting. The chapter also addresses alternative means for obtaining position and timing information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akos D (2012) Who’s Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC), NAVIGATION. Journal of The Institute of Navigation 59(4):281–290
Bhatti J, Shepard D, Humphreys T (2012) Drone Hack - Spoofing Attack Demonstration on a Civilian Unmanned Aerial Vehicle. GPS World (1 August 2012) http://gpsworld.com/drone-hack/ Accessed 1 March 2017
DEFCON-23 notices at https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Lin-Huang-Qing-Yang-GPS-Spoofing.pdf
DEFCON-24 notices at https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Aaron-Luo-Drones-Hijacking-Multi-Dimensional-Attack-Vectors-And-Countermeasures-UPDATED.pdf
Griffioen J, Oonincx P (2013) Suitability of Low-Frequency Navigation Systems for Artillery Positioning in a GNSS Denied Environment. Journal of Navigation 66(1):35–48
Humphreys T (2012) Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing. Submitted to the Subcommittee on Oversight, Investigations, and Management of the House Committee on Homeland Security (18 July 2012) http://homeland.house.gov/files/Testimony-Humphreys.pdf Accessed 1 March 2017
Psiaki M, Powell SP, O’Hanlon BW (2013) GNSS Spoofing Detection. GPS World 24(6):53–58
Scott L (2003) Anti-Spoofing & Authenticated Signal Architectures for Civil Navigation Systems. Proceedings ION GGNSS (9–12 September), Portland OR
Theunissen E (2016) Cyber threats to position and timing data and their impact on safety and security. Netherlands Annual Review of Military Studies pp 309–324
US Department of Transportation (2001) Vulnerability Assessment of the Transportation Infrastructure Relying upon the Global Positioning System. http://ntl.bts.gov/lib/31000/31300/31379/17_2001_Volpe_GPS_Vulnerability_Study.pdf Accessed 1 March 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Lubbers, B., Theunissen, E., Oonincx, P. (2017). Jamming and Spoofing: Effective Cyber Weapons Looking for a Defence. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_15
Download citation
DOI: https://doi.org/10.1007/978-94-6265-189-0_15
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-188-3
Online ISBN: 978-94-6265-189-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)