Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
Autor(a) principal: | |
---|---|
Data de Publicação: | 2019 |
Idioma: | por |
Título da fonte: | Manancial - Repositório Digital da UFSM |
dARK ID: | ark:/26339/0013000001zhc |
Texto Completo: | http://repositorio.ufsm.br/handle/1/19286 |
Resumo: | The vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures. |
id |
UFSM_ae2d1cda70c97aeb8d4c5b1f904b086d |
---|---|
oai_identifier_str |
oai:repositorio.ufsm.br:1/19286 |
network_acronym_str |
UFSM |
network_name_str |
Manancial - Repositório Digital da UFSM |
repository_id_str |
|
spelling |
Vulnerabilidade dos sistemas GNSS a ataques do tipo SpoofingVulnerability of GNSS systems at Spoofing attackGNSSSpoofingAnti-spoofingCNPQ::ENGENHARIAS::ENGENHARIA ELETRICAThe vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures.A vulnerabilidade das constelações GNSS se estendem além de bloqueios e perdas de sinais à ataques falsos, nos quais falsificações de sinais de comunicação são gerados com intuito de manipular a posição, velocidade e informações que um receptor recebe. Considerando que vários sistemas fazem parte da constelação GNSS, se viu necessário realizar um estudo dos sistemas e verificar como cada sistema se porta ao receber um ataque do tipo spoofing. Foi analisado os principais sistemas, GPS, GLONASS, Galileo e Beidou, em relação a frequências de comunicação e seus métodos de evitar um ataque de spoofing. Os dados de alguns sistemas por serem mais utilizados e até mesmo, mais conhecidos, são encontrados em documentos abertos disponíveis na internet, já outros menos conhecidos, são obtidos através de estudos realizados em Universidades. A combinação de estrutura de sinal conhecida e previsibilidade de bits de dados torna os sinais civis do GNSS um alvo fácil para ataques de falsificação. O trabalho faz uma análise sobre as contramedidas de cada sistema, se cada um tem um tipo específico ou se todos utilizam o mesmo padrão de defesa e nisso, uma abordagem sobre algumas contramedidas existentes.Universidade Federal de Santa MariaBrasilUFSMCentro de TecnologiaZanetti, Marcelo SerranoMachado, Vinícius2020-01-06T14:33:36Z2020-01-06T14:33:36Z2019-12-102019-12-10Trabalho de Conclusão de Curso de Graduaçãoinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://repositorio.ufsm.br/handle/1/19286ark:/26339/0013000001zhcporinfo:eu-repo/semantics/openAccessreponame:Manancial - Repositório Digital da UFSMinstname:Universidade Federal de Santa Maria (UFSM)instacron:UFSM2022-06-10T18:00:04Zoai:repositorio.ufsm.br:1/19286Biblioteca Digital de Teses e Dissertaçõeshttps://repositorio.ufsm.br/ONGhttps://repositorio.ufsm.br/oai/requestatendimento.sib@ufsm.br||tedebc@gmail.comopendoar:2022-06-10T18:00:04Manancial - Repositório Digital da UFSM - Universidade Federal de Santa Maria (UFSM)false |
dc.title.none.fl_str_mv |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing Vulnerability of GNSS systems at Spoofing attack |
title |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
spellingShingle |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing Machado, Vinícius GNSS Spoofing Anti-spoofing CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA |
title_short |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
title_full |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
title_fullStr |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
title_full_unstemmed |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
title_sort |
Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing |
author |
Machado, Vinícius |
author_facet |
Machado, Vinícius |
author_role |
author |
dc.contributor.none.fl_str_mv |
Zanetti, Marcelo Serrano |
dc.contributor.author.fl_str_mv |
Machado, Vinícius |
dc.subject.por.fl_str_mv |
GNSS Spoofing Anti-spoofing CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA |
topic |
GNSS Spoofing Anti-spoofing CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA |
description |
The vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures. |
publishDate |
2019 |
dc.date.none.fl_str_mv |
2019-12-10 2019-12-10 2020-01-06T14:33:36Z 2020-01-06T14:33:36Z |
dc.type.driver.fl_str_mv |
Trabalho de Conclusão de Curso de Graduação |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://repositorio.ufsm.br/handle/1/19286 |
dc.identifier.dark.fl_str_mv |
ark:/26339/0013000001zhc |
url |
http://repositorio.ufsm.br/handle/1/19286 |
identifier_str_mv |
ark:/26339/0013000001zhc |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Universidade Federal de Santa Maria Brasil UFSM Centro de Tecnologia |
publisher.none.fl_str_mv |
Universidade Federal de Santa Maria Brasil UFSM Centro de Tecnologia |
dc.source.none.fl_str_mv |
reponame:Manancial - Repositório Digital da UFSM instname:Universidade Federal de Santa Maria (UFSM) instacron:UFSM |
instname_str |
Universidade Federal de Santa Maria (UFSM) |
instacron_str |
UFSM |
institution |
UFSM |
reponame_str |
Manancial - Repositório Digital da UFSM |
collection |
Manancial - Repositório Digital da UFSM |
repository.name.fl_str_mv |
Manancial - Repositório Digital da UFSM - Universidade Federal de Santa Maria (UFSM) |
repository.mail.fl_str_mv |
atendimento.sib@ufsm.br||tedebc@gmail.com |
_version_ |
1815172266616422400 |