New "spoofing" attacks resulting in total navigation failure have been occurring above the Middle East for months, which is "highly significant" for airline safety.
Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do::New "spoofing" attacks resulting in total navigation failure have been occurring above the Middle East for months, which is "highly significant" for airline safety.
If their isn't then there's a big problem with implementing that now, which would require a retrofit of every single GPS system currently in use and likely a replacement of all GPS satellites
Edit: I'm slightly mistaken, the military uses encryption but they don't have that open for public use.
You can't copy a signature, since it is different every time the signed content is different. You need to have the correct key in order to make a valid signature.
Yes Galileo supports encryption. But as far as I know it's not in use. Has been trialled only.
But I know all Airbus aircraft only support GPS satellites and nothing else (yet). I assume Boeing, being American would be the same then.
As far as solutions go, an aircraft can navigate fine without GPS. It can update its position from ground navigation aids and if they are not available it can still Dead Reckon very well. The navigation error very slowly grows until it's out of the black spot and can use GPS or navigation aid to increase its accuracy. But this navigation error on the time frame of say an hour is a matter of kilometers at most, not dozens.
Nope. And more importantly, it looks like nobody considered what might happen if the signal gets spoofed. The backup systems that are supposed to keep working if GPS breaks also break due to these spoofed signals.
GPS is encrypted, it's just that the US military won't share the encryption keys so the rest of us have to use the unencrypted channels. They've clearly thought about it and decided against making it public.
If they shared the encryption keys, then it wouldn't be safe from spoofing anymore. The whole point of encryption is to not share the keys.
Also, before someone tries to point out PKI, the satellites don't use PKI. So that's not relevant. You can't share the current keys without jeopardizing the system.
PKI? I assume you mean asymmetric encryption? That's been available long before the GPS system was launched. Why do you think it isn't relevant? They could have designed it into the protocol if they wanted to.
The military didn't design it for civilian use. That's really all there is to it. The commenter I was replying to made it sound like theres an easy solution here. There isn't.
I'm the commenter you originally replied to. If the US military wanted unspoofable GPS available to everyone then it would be available to everyone. They only want the public to have unencrypted GPS, so that's all we get.
The military is as concerned with civilian gps as much as they are with anything else that isn't military-related: not their issue to solve. They won't stop anyone from using encrypted gps. They really won't. The only branch in the us that actively tries to prevent public encryption is the NSA. (Even then, they wouldn't block something like gps). For the record, I'm a security engineer (DDI, private sector), previously worked for the DOD, and used to work in satcom.
GPS is old, the amount of data you get from the satellite is small, essentially satellite id and timestamp. If we would redesign this today, you could include a digital signature.
Sure, but... you can google this to verify ... one can probably manipulate GPS by introducing delay, i.e. resend data from a sat that was hear some seconds ago. With this signal the location will be off.
But that would also mean the timestamp to be off. Just resending them would also require extremely precise timing if you want to simulate a position that is not anywhere but just a bit off the last position. Making a GPS position jumping around half the world is (comparably) easy, pushing it off for a few kilometers is much, much harder.