GPS Location Spoofing and FM Broadcast Intrusion Using Software-Defined Radio

GPS Location Spoofing and FM Broadcast Intrusion Using Software-Defined Radio

Soon Heng Mavric Tan, Chai Kiat Yeo
DOI: 10.4018/IJITN.2020100108
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper makes use of a simple and inexpensive software-defined radio (SDR) to demonstrate the potential threats posed to wireless communication. SDR is a radio communication system where components that are traditionally implemented in hardware are being replaced via software running on computing devices. The authors make use of a simple SDR to demonstrate how local disruption to wireless communication can be easily carried out. In particular, the authors show how FM radio broadcast can be hijacked and the spoofing of GPS location signals using a single SDR on a local basis as well as how Google Maps apps on an Android phone can be fooled by the spoofed GPS data. The authors also show how an ‘autonomous' car can be re-routed via emulation with a rigged up remote control toy car. The spoofing of GPS signals is a potential threat to all GPS-based applications, especially when powerful radios are used. The security threats on GPS-based navigation especially for drones and autonomous vehicles are real.
Article Preview
Top

Fm Transceiver

An example of a basic application of SDR is to build a radio station receiver. Radio stations in Singapore broadcast islandwide with frequency modulation (FM) which essentially modulate information by changing the carrier frequency. Hence, radio stations modulate audio information into the given frequency and transmit the radio waves island wide. On the receiving end, end users use a FM radio turner to demodulate the radio waves and play back the audio information.

The FM transceiver is coded in GNURadio (GNURadio) as shown in Figure 1. GNURadio provides a huge cache of signal processing blocks to implement real world software radio systems. The SDR can therefore listens to FM transmission. It can also be used to broadcast FM signals to nearby receivers effectively hijacking the broadcast from the official radio stations and replacing the official broadcast with spoofed transmission. All it takes is to for the SDR to transmit the spoofed audio file to the nearby FM radios. The nearby radio tuners will receive the spoofed broadcast since the received SDR’s signal strength is stronger than the official broadcast. As the SDR has limited signal power, it is not feasible to hijack FM broadcast islandwide but given enough SDR power, a localized area’s FM broadcast can be hijacked and spoofed.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 1 Issue (2022)
Volume 13: 4 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing