Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing

Detalhes bibliográficos
Autor(a) principal: Machado, Vinícius
Data de Publicação: 2019
Idioma: por
Título da fonte: Manancial - Repositório Digital da UFSM
dARK ID: ark:/26339/0013000001zhc
Texto Completo: http://repositorio.ufsm.br/handle/1/19286
Resumo: The vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures.
id UFSM_ae2d1cda70c97aeb8d4c5b1f904b086d
oai_identifier_str oai:repositorio.ufsm.br:1/19286
network_acronym_str UFSM
network_name_str Manancial - Repositório Digital da UFSM
repository_id_str
spelling Vulnerabilidade dos sistemas GNSS a ataques do tipo SpoofingVulnerability of GNSS systems at Spoofing attackGNSSSpoofingAnti-spoofingCNPQ::ENGENHARIAS::ENGENHARIA ELETRICAThe vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures.A vulnerabilidade das constelações GNSS se estendem além de bloqueios e perdas de sinais à ataques falsos, nos quais falsificações de sinais de comunicação são gerados com intuito de manipular a posição, velocidade e informações que um receptor recebe. Considerando que vários sistemas fazem parte da constelação GNSS, se viu necessário realizar um estudo dos sistemas e verificar como cada sistema se porta ao receber um ataque do tipo spoofing. Foi analisado os principais sistemas, GPS, GLONASS, Galileo e Beidou, em relação a frequências de comunicação e seus métodos de evitar um ataque de spoofing. Os dados de alguns sistemas por serem mais utilizados e até mesmo, mais conhecidos, são encontrados em documentos abertos disponíveis na internet, já outros menos conhecidos, são obtidos através de estudos realizados em Universidades. A combinação de estrutura de sinal conhecida e previsibilidade de bits de dados torna os sinais civis do GNSS um alvo fácil para ataques de falsificação. O trabalho faz uma análise sobre as contramedidas de cada sistema, se cada um tem um tipo específico ou se todos utilizam o mesmo padrão de defesa e nisso, uma abordagem sobre algumas contramedidas existentes.Universidade Federal de Santa MariaBrasilUFSMCentro de TecnologiaZanetti, Marcelo SerranoMachado, Vinícius2020-01-06T14:33:36Z2020-01-06T14:33:36Z2019-12-102019-12-10Trabalho de Conclusão de Curso de Graduaçãoinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://repositorio.ufsm.br/handle/1/19286ark:/26339/0013000001zhcporinfo:eu-repo/semantics/openAccessreponame:Manancial - Repositório Digital da UFSMinstname:Universidade Federal de Santa Maria (UFSM)instacron:UFSM2022-06-10T18:00:04Zoai:repositorio.ufsm.br:1/19286Biblioteca Digital de Teses e Dissertaçõeshttps://repositorio.ufsm.br/ONGhttps://repositorio.ufsm.br/oai/requestatendimento.sib@ufsm.br||tedebc@gmail.comopendoar:2022-06-10T18:00:04Manancial - Repositório Digital da UFSM - Universidade Federal de Santa Maria (UFSM)false
dc.title.none.fl_str_mv Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
Vulnerability of GNSS systems at Spoofing attack
title Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
spellingShingle Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
Machado, Vinícius
GNSS
Spoofing
Anti-spoofing
CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA
title_short Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
title_full Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
title_fullStr Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
title_full_unstemmed Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
title_sort Vulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
author Machado, Vinícius
author_facet Machado, Vinícius
author_role author
dc.contributor.none.fl_str_mv Zanetti, Marcelo Serrano
dc.contributor.author.fl_str_mv Machado, Vinícius
dc.subject.por.fl_str_mv GNSS
Spoofing
Anti-spoofing
CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA
topic GNSS
Spoofing
Anti-spoofing
CNPQ::ENGENHARIAS::ENGENHARIA ELETRICA
description The vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures.
publishDate 2019
dc.date.none.fl_str_mv 2019-12-10
2019-12-10
2020-01-06T14:33:36Z
2020-01-06T14:33:36Z
dc.type.driver.fl_str_mv Trabalho de Conclusão de Curso de Graduação
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
status_str publishedVersion
dc.identifier.uri.fl_str_mv http://repositorio.ufsm.br/handle/1/19286
dc.identifier.dark.fl_str_mv ark:/26339/0013000001zhc
url http://repositorio.ufsm.br/handle/1/19286
identifier_str_mv ark:/26339/0013000001zhc
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Universidade Federal de Santa Maria
Brasil
UFSM
Centro de Tecnologia
publisher.none.fl_str_mv Universidade Federal de Santa Maria
Brasil
UFSM
Centro de Tecnologia
dc.source.none.fl_str_mv reponame:Manancial - Repositório Digital da UFSM
instname:Universidade Federal de Santa Maria (UFSM)
instacron:UFSM
instname_str Universidade Federal de Santa Maria (UFSM)
instacron_str UFSM
institution UFSM
reponame_str Manancial - Repositório Digital da UFSM
collection Manancial - Repositório Digital da UFSM
repository.name.fl_str_mv Manancial - Repositório Digital da UFSM - Universidade Federal de Santa Maria (UFSM)
repository.mail.fl_str_mv atendimento.sib@ufsm.br||tedebc@gmail.com
_version_ 1815172266616422400