DEMO: RTKiller -- manipulation of GNSS RTK rovers by reference base spoofing
Abstract
Global Navigation Satellite Systems (GNSS) provide global positioning and timing. Multiple receivers with known reference positions (stations) can assist mobile receivers (rovers) in obtaining GNSS corrections and achieve centimeter-level accuracy on consumer devices. However, GNSS spoofing and jamming, nowadays achievable with off-the-shelf devices, are serious threats to the integrity and robustness of public correction networks. In this demo, we show how manipulation of the Position Navigation and Timing (PNT) solution at the reference station is reflected in the loss of baseline fix or degraded accuracy at the rover. Real Time Kinematics (RTK) corrections are valuable but fundamentally vulnerable: attacking the reference stations can harm all receivers (rovers) that rely on the targeted reference station.
- Publication:
-
arXiv e-prints
- Pub Date:
- May 2024
- DOI:
- 10.48550/arXiv.2406.07565
- arXiv:
- arXiv:2406.07565
- Bibcode:
- 2024arXiv240607565S
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- To appear in the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks