Home // ICIMP 2019, The Fourteenth International Conference on Internet Monitoring and Protection // View article
GPS Spoofing for Android and iOS Mobile Systems
Authors:
Michael Nelson
Paolina Centonze
Keywords: GPS; spoof; mobile; iOS; Android.
Abstract:
Global Positioning Systems (GPS) are incredibly commonplace in daily life. Examples include fishing vessels, aircraft, cars, and even mobile phones. Currently, civilian GPS signals are transmitted in plain text on known frequencies. Due to the lack of security and obfuscation, there have been many experiments proving the ease and dangers of GPS spoofing and jamming. However, most of the analysis in the past few years has focused on vehicles rather than the devices everybody has and uses daily: smartphones and tablet devices. Spoofing these devices through satellite defined radio as well as applications will show the biggest vulnerabilities in these systems. As of now, there is no clear evidence of one Operating System (OS) being more secure than another or what types of applications are most susceptible to hacking. In this paper, we analyze the effectiveness of different spoofing methods on various commonly used applications. This analysis will determine whether iOS or Android is easier to spoof by comparing the ease and effectiveness of these spoofing methods.
Pages: 37 to 40
Copyright: Copyright (c) IARIA, 2019
Publication date: July 28, 2019
Published in: conference
ISSN: 2308-3980
ISBN: 978-1-61208-729-0
Location: Nice, France
Dates: from July 28, 2019 to August 2, 2019