Abstract
Advancement in technology has resulted in the easy sharing of locations across various stakeholders. Unprotected sharing of location information makes any Global Navigation Satellite System (GNSS) device vulnerable to spoofing attacks. Spoofed GNSS signals propagate misleading trajectories to cripple any Location-Based Service (LBS). This manuscript introduces a novel algorithm for the detection and mitigation of spoofing attacks. The proposed algorithm was implemented in the Android application using the OpenStreetMap dataset. GNSS spoofing attacks were simulated and detected in real-time. The efficiency of the proposed algorithm was analyzed using the Ratio of Correctly Detected (RCD) and Ratio of Correctly Matched (RCM) spoofed points. The maximum observed values for RCD and RCM were 75% and 94%, respectively. Minimum RCD and RCM values observed during the experiment were 59% and 92%. The accuracy of the proposed algorithm was further analyzed using average positional error (APE). Maximum and minimum recorded APE values were 25.08% and 13.83% respectively. The manuscript concludes with a comparison of the proposed algorithm with that of existing techniques.
Similar content being viewed by others
References
Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. In HotSec, pages 1–6
Kugler L (2017) Why GPS spoofing is a threat to companies, countries. Commun ACM 60(9):18–19
Gunther C (2014) A survey of spoofing and counter-measures. NAVIGATION: Journal of The Institute of Navigation 61(3):159–177
Humphreys TE, Psiaki ML (2016) Protecting GPS from spoofers is critical to the future of navigation. Technical report, July
Schmidt D, Radke K, Camtepe S, Foo E, Ren ML (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys (CSUR) 48(4):64
Zheng Y, Zhou Z, Liu Y (2013) From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys (CSUR) 46(2):25
Jafarnia-Jahromi A, Broumandan A, Nielsen J, Lachapelle G (2012) GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation
Magiera J, Katulski R (2015) Detection and mitigation of GPS spoofing based on antenna array processing. Journal of applied research and technology 13(1):45–57
Humphreys TE (2013) Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans Aerosp Electron Syst 49(2):1073–1090
Psiaki ML, Ohanlon BW, Bhatti JA, Shepard DP, Humphreys TE (2011) Civilian GPS spoofing detection based on dualreceiver correlation of military signals. In Radionavigation Laboratory Conference Proceedings
Wesson K, Rothlisberger M, Humphreys T (2012) Practical cryptographic civil GPS signal authentication. Navigation 59(3):177–193
Akos DM (ed) (2012) Who's afraid of the spoofer? GPS / GNSS spoofing detection via automatic gain control (AGC). Navigation 59(4):281–290
Bastide F, Akos D, Macabiau C, Roturier B (2003) Automatic gain control (AGC) as an interference assessment tool. In 16th International Technical Meeting of the Satellite Division of The Institute of Navigation ION GPS/GNSS 2003, pages:2042
Montgomery PY (2011) Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Radionavigation Laboratory Conference Proceedings
Warner JS, Johnston RG (2003) GPS spoofing countermeasures. Homeland Security Journal 25(2):19–27
Wesson KD, Shepard DP, Bhatti JA, Humphreys TE (2011) An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In Radio navigation Laboratory Conference Proceedings
Yang C, Gidofalvi G (2018) Fast map matching, an algorithm integrating hidden Markov model with precomputation. Int J Geogr Inf Sci 32(3):547–570
Beaudoin Y, Desbiens A, Gagnon E, Landry R Jr (2018) Observability of satellite launcher navigation with INS, GPS, attitude sensors and reference trajectory. Acta Astronautica 142:277–288
Bridgelall R, Tolliver D (2018) Accuracy enhancement of roadway anomaly localization using connected vehicles. International Journal of Pavement Engineering 19(1):75–81
Feng T, Timmermans HJP (2013) Transportation mode recognition using GPS and accelerometer data. Transportation Research Part C: Emerging Technologies 37:118–130
Kang B, Moudon AV, Hurvitz PM, Reichley L, Saelens BE (2013) Walking objectively measured: classifying accelerometer data with GPS and travel diaries. Medicine and science in sports and exercise 45(7):1419
Jansen K, Schafer M, Lenders V, Popper C, Schmitt J (2017) POSTER: Localization of spoofing devices using a large-scale air traffic surveillance system. In Proceedings of the 2017 ACM on Asia conference on computer and communications security, pages 914-916. ACM
Borio D, Gioia C (2016) A sum-of-squares approach to GNSS spoofing detection. IEEE Trans Aerosp Electron Syst 52(4):1756–1768
Wang W, Li N, Wu R, Closas P (2019) Detection of induced GNSS spoofing using S-Curve-Bias. Sensors 19(4):922
Kar G, Mustafa H, Wang Y, Chen Y, Xu W, Gruteser M, Vu T (2014) Detection of on-road vehicles emanating GPS interference. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pages 621-632. ACM
Dolburg L, Francis J, Engel T (2014) Tracking spoofed locations in crowdsourced vehicular applications. In IEEE Network Operations and Management Symposium, 2014, pages 1–9. IEEE
Restuccia F, Saracino A, Das SK, Martinelli F (2016) LVS: A wifi-based system to tackle location spoofing in location-based services. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2016 IEEE 17th International Symposium on A, pages 1–4. IEEE
Capkun S, Buttyn L, Hubaux J (2003) SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 21–32. ACM
Chen K, Lu M, Fan X, Wei M, Wu J (2011) Road condition monitoring using on-board three-axis accelerometer and GPS sensor
Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In Proceedings of the 2nd ACM workshop on Wireless Security, pages 1–10. ACM
Yang L, Li S, Qiangwen F, Liu Z, Zhou Q (2019) Analysis of kalman filter innovation-based GNSS spoofing detection method for INS/GNSS integrated navigation system. IEEE Sensors J 19(13):5167–5178
Verhagen S, Teunissen PJG (2014) Ambiguity resolution performance with GPS and beidou for LEO formation ying. Advances in Space Research 54(5):830–839
Sehra SS, Singh J, Rai HS (2014) A systematic study of OpenStreetMap data quality assessment. In 11th International Conference on Information Technology: New Generations (ITNG), pages 377–381. IEEE
Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4(2):65–85
Zeng W, Church RL (2009) Finding shortest paths on real road networks: the case for A*. International Journal of Geographical Information Science 23(4):531–543
Park SK, Miller KW (1988) Random number generators: good ones are hard to find. Commun ACM 31(10):1192–1201
Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. arXiv preprint arXiv:1003.4083
Terra R, Figueiredo L, Barbosa RS, Anacleto R (2014) Traveled distance estimation algorithm for indoor localization 248–255
Kok M, Hol JD, Schön TB (2017) Using inertial sensors for position and orientation estimation. arXiv preprint arXiv:1704.06053
Psiaki ML, Humphreys TE (2016) GNSS spoofing and detection. Proceedings of the IEEE, 104(6):1258–1270
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, S., Singh, J. & Singh, S. Mitigating Spoofed GNSS Trajectories through Nature Inspired Algorithm. Geoinformatica 25, 581–600 (2021). https://doi.org/10.1007/s10707-020-00412-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10707-020-00412-z