GNSS security, a new frontier of cyber security
-
摘要: 网络安全是当代网络社会面临的重要问题.全球卫星导航系统(GNSS)是网络空间的重要组成部分,GNSS提供的时空信息不仅是万物互联实现所需的时空参考基准,其本身也是网络传输的重要数据内容之一.易损性是引起GNSS安全性风险的重要因素,GNSS受干扰影响可失去定位授时能力或产生虚假信息,造成GNSS安全性风险并进而影响整个网络空间的安全.应从思想认识,系统建设,技术发展,法律法规等方面入手应对GNSS造成的网络安全性风险.Abstract: Modern society are facing mounting cybersecurity risk. As one of the main means to maintain the spatial and temporal reference, GNSS is the essential component to cyberspace applications. Also the spatial and temporal data provided by GNSS is one of the most important information applied in the network. Vulnerability of GNSS contributes mostly to its security risk. When interfered, the GNSS devices lose its positioning capability or even output misleading information, threatening the security of GNSS applications or even that of the whole cyber-space. All-round countermeasures should be developed to safeguard the security of cyberspace, including the deepening of understanding, system development, technology advancing, and law enforcement.
-
Key words:
- cyber space /
- cyber security /
- GNSS /
- vulnerability /
- interfere
-
[1] ]张飞舟,杨东凯.物联网应用于解决方案[M].北京:电子工业出版社,2012. [2] PETER J G, TEUNISSEN O M. Handbook of Global[JP] Navigation Satellite Systems[M]. Switzerland: Springer International Publishing AG, 2017. [3] POZZOBON O. Directions 2013: The future of GNSS[JP] security[EB/OL]. (2012-12-01)[2018-12-14]. https://www. gpsworld. com/directions-2013-the-future-of-gnss-security.
[4 ]LANGLEY R B. Innovation: GNSS spoofing detection[EB/OL]. (2013-06-01)[2018-12-13]. https://www.gpsworld.com/innovation-gnss-spoofing-detection-correlatingcarrier-phase-with-rapid-antenna-motion.[4] 焦文海,丁群,李建文,等. GNSS开放服务的监测评估[J]. 中国科学:物理学 力学 天文学, 2011,41(5): 521-527. [5] Volpe National Transportation Systems Center. [JP]Vulnerability assessment of the transportation infrastructure relying on the global positioning system[R]. The Office of the Assistant Secretary for Transportation Policy, U.S. Department of Transportation, Cambridge, USA, 2001. [6] HUMPHREYS T E, LEDVINA B U, PSIAKI M L, et al. Assessing the spoofing threat[J].GPS World, 2009, 20(1):28. [7] PSIAKI M L, O'HANLON B W, POWER S P, et al. GNSS lies, GNSS truth[J]. GPS World, 2014, 25(11): 36-44. [8] CAMERON A. Spoofer and detector: Battle of the titans at sea[EB/OL]. (2014-08-05)[2018-12-14]. https://www. gpsworld. com/spoofer-and-detector-battle-of-thetitans-at-sea. [9] TORROJA M, MALKOS S, VERNE C. Putting the (ultralow) power in GeoFence[J].GPS World, 2013,24(11):29-35. [10] Inside GNSS. White House drone incident highlights growing use of UAVs[EB/OL].(2015-02-15)[2018-12-16]. https://insidegnss.com/white-house-drone-incidenthighlights-growing-use-of-uavs. [11] POZZOBON O, From the volpe report to a future for secure receiver certifications: 10 years of civilian GNSS security[C]//Proceedings of the 24th International Technical Meeting of the Satellite Division. Portland, Oregon USA. 2011:3249-3434. [12] MERRILL J. National GPS interference detection and mitigation (IDM)[C]//49th CGSIC. Savannah, GA USA. 2009 [13] GAMBA G, CHIARA A D, POZZOBON O,et al. PROGRESS project: jamming and spoofing detection and localization system for protection of GNSS ground-based infrastructures[C]//Proceedings of the 29th International Technical Meeting of the Satellite Division. Portland, Oregon USA. 2016:3133-3142. [14] CETIN E, THOMPSON R J R, TRINKLE M, et al. Interference detection and localization within the GNSS Environmental Monitoring System (GEMS)-system update and latest field test results[C]//Proceedings of the ION GNSS International Technical Meeting of the Satellite Division. Tampa, Florida USA. 2014.
点击查看大图
计量
- 文章访问数: 437
- HTML全文浏览量: 69
- PDF下载量: 117
- 被引次数: 0