Abstract
Most of the existing GPS spoofing detection schemes are vulnerable to the complex generative GPS spoofing attack, and require additional auxiliary equipments and extensive signal processing capabilities, leading to defects such as low real-time performance and large communication overhead which may not be available for the unmanned aerial vehicle (UAV, also known as drone) system. Motivated by the limitations of prior work, we propose a GPS spoofing detection scheme that requires minimal prior configuration and employs information fusion based on the GPS receiver and inertial measurement unit (IMU). We use a real-time model of tracking and calculating to derive the current location of the drones which are then contrasted with the location information received by the GPS receiver to judge whether the UAV system is under spoofing attack. Experiments show that, while the accuracy meets the requirements of detection, the proposed method can accurately determine whether the system is attacked within 8 s, with a detection rate of 98.6%. Compared with the existing schemes, the performance of real-time detecting is improved in our method while the detection rate is ensured. Even in our worst-case, we detect GPS spoofing attack within 28 s after the UAV system starts its mission.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Psiaki, M.L., Humphreys, T.: Protecting GPS from spoofers is critical to the future of navigation. IEEE Spectrum. http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation. Accessed 29 July 2016
Amirtha, T.: Satnav spoofing attacks: why these researchers think they have the answer. ZDNet. http://www.zdnet.com/article/satnav-spoofing-attacks-why-these-researchers-think-they-have-the-answer. Accessed 27 Mar 2017
Kugler, L.: Why GPS spoofing is a threat to companies, countries. Commun. ACM 60(9), 18–19 (2017)
Bonior, J., Evans, P., Sheets, G., et al.: Implementation of a wireless time distribution testbed protected with quantum key distribution. In: 2017 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE, San Francisco (2017)
Psiaki, M.L., O’Hanlon, B.W., Bhatti, J.A., et al.: GPS spoofing detection via Dual-Receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 49(4), 2250–2267 (2013)
Yangy, K., Luoz, Z.-Q.: Robust target localization with multiple sensors using time difference of arrivals. In: Radar Conference, pp. 1–6. IEEE, Rome (2008)
Jansen, K., Tippenhauer, N.O., Pőpper, C.: Multi-receiver GPS spoofing detection: error models and realization. In: Annual Conference on Computer Security Applications, pp. 237–250. ACM, California (2016)
Tippenhauer, N.O., Pőpper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Computer and Communications Security, pp. 75–86. ACM, Illinois (2011)
Jansen, K., Schafer, M., Lenders, V., Pőpper, C., Schmitt, J.: POSTER: localization of spoofing devices using a Large-scale air traffic surveillance system. In: Asia Conference on Computer and Communications Security, pp. 914–916. ACM, Abu Dhabi (2017)
Hamelmann, P., Vullings, R., Mischi, M., et al.: An extended Kalman filter for fetal heart location estimation during Doppler-based heart rate monitoring. IEEE Trans. Instrum. Measur. 1–11 (2018)
Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., Lachapelle, G.: GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. 2012, 1–16 (2012)
Psiaki, M.L., Humphreys, T.E., Stauer, B.: Attackers can spoof navigation signals without our knowledge. Here’s how to fight back GPS lies. IEEE Spectr. 53(8), 26–53 (2016)
He, L., Li, W., Guo, C., Niu, R.: Civilian unmanned aerial vehicle vulnerability to GPS spooing attacks. In: International Symposium on Computational Intelligence and Design, pp. 212–215. IEEE, Hangzhou (2015)
Wesson, K.D., Rothlisberger, M., Humphreys, T.E.: Practical cryptographic civil GPS signal authentication. Navigation 59(3), 177–193 (2012)
O’Hanlon, B.W., Psiaki, M.L., Bhatti, J.A., et al.: Real-time GPS spoofing detection via correlation of encrypted signals. Navigation 60(4), 267–278 (2013)
Kerns, A.J., Wesson, K.D., Humphreys, T.E.: A blueprint for civil GPS navigation message authentication. In: Position, Location and Navigation Symposium, pp. 262–269. IEEE, Monterey (2014)
Tang, Y., Hu, Y., Cui, J., et al.: Vision-Aided multi-UAV autonomous flocking in GPS-denied environment. IEEE Trans. Ind. Electron. 66(1), 616–626 (2019)
Humphreys, T.E.: Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans. Aerosp. Electron. Syst. 49(2), 1073–1090 (2013)
Yin, S., Zhao, Y., Li, L.: Resource allocation and basestation placement in cellular networks with wireless powered UAVs. IEEE Trans. Veh. Technol. 68(1), 1050–1055 (2019)
Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258–1270 (2016)
Zhang, Z., Trinkle, M., Qian, L., Li, H.: Quickest detection of GPS spoofing attack. In: Military Communications Conference, pp. 1–6. IEEE, Orlando (2012)
Chan, Y.-T., Ho, K.: A simple and efficient estimator for hyperbolic location. IEEE Trans. Sig. Process. 42(8), 1905–1915 (1994)
Ho, K.O., Lu, X., Kovavisaruch, L.: Source localization using TDOA and FDOA measurements in the presence of receiver location errors: analysis and solution. IEEE Trans. Sig. Process. 55(2), 684–696 (2007)
Yang, K., An, J.P., Bu, X.Y., Sun, G.C.: Constrained total least-squares location algorithm using Time-Difference-of-Arrival measurements. IEEE Trans. Veh. Technol. 59(3), 1558–1562 (2010)
Jansen, K., Scha̋fer, M., Moser, D., et al.: Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. In: Security and Privacy, pp. 1018–1031. IEEE, San Francisco (2018)
Fadlullah, Z.M., Takaishi, D., Nishiyama, H., et al.: A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks. IEEE Netw. 30(1), 100–105 (2016)
Acknowledgment
This work were supported by National Natural Science Foundation of China (Grant Nos. U1708262, U1736203, 61772173, 61672413).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Liang, C. et al. (2019). Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-30619-9_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30618-2
Online ISBN: 978-3-030-30619-9
eBook Packages: Computer ScienceComputer Science (R0)