Home // ICIMP 2019, The Fourteenth International Conference on Internet Monitoring and Protection // View article


GPS Spoofing for Android and iOS Mobile Systems

Authors:
Michael Nelson
Paolina Centonze

Keywords: GPS; spoof; mobile; iOS; Android.

Abstract:
Global Positioning Systems (GPS) are incredibly commonplace in daily life. Examples include fishing vessels, aircraft, cars, and even mobile phones. Currently, civilian GPS signals are transmitted in plain text on known frequencies. Due to the lack of security and obfuscation, there have been many experiments proving the ease and dangers of GPS spoofing and jamming. However, most of the analysis in the past few years has focused on vehicles rather than the devices everybody has and uses daily: smartphones and tablet devices. Spoofing these devices through satellite defined radio as well as applications will show the biggest vulnerabilities in these systems. As of now, there is no clear evidence of one Operating System (OS) being more secure than another or what types of applications are most susceptible to hacking. In this paper, we analyze the effectiveness of different spoofing methods on various commonly used applications. This analysis will determine whether iOS or Android is easier to spoof by comparing the ease and effectiveness of these spoofing methods.

Pages: 37 to 40

Copyright: Copyright (c) IARIA, 2019

Publication date: July 28, 2019

Published in: conference

ISSN: 2308-3980

ISBN: 978-1-61208-729-0

Location: Nice, France

Dates: from July 28, 2019 to August 2, 2019