skip to main content
10.1145/3052973.3055158acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

Localization of Spoofing Devices using a Large-scale Air Traffic Surveillance System

Published: 02 April 2017 Publication History

Abstract

Systems relying on satellite positioning techniques such as GPS can be targeted by spoofing attacks, where attackers try to inject fake positioning information. With the growing spread of flying drones and their usage of GPS for localization, these systems become interesting targets of attacks with the purpose of hijacking or to distract air safety surveillance. The most recent development in air traffic surveillance is the automatic dependent surveillance -- broadcast (ADS-B). Aircraft periodically broadcast their location, speed, or environmental measurements via ADS-B. The open research project OpenSky Network collects ADS-B reports and makes them available for research purposes. This poster presents a concept to detect and localize spoofing devices by utilizing the information provided by a large-scale air traffic surveillance system. We utilize ADS-B reports collected by the OpenSky Network and provide first results on the effectiveness of localizing spoofing sources.

References

[1]
Y. Chen, W. Trappe, and R. P. Martin. Detecting and Localizing Wireless Spoofing Attacks. In IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON '07, pages 193--202, San Diego, CA, USA, June 2007. IEEE.
[2]
A. Costin and A. Francillon. Ghost in the Air(Traffic): On insecurity of ADS-B protocol and practical attacks on ADS-B devices. Technical report, Black Hat USA, July 2012.
[3]
FlightAware. Multilateration (MLAT) Overview, 2016.
[4]
Flightradar24. How We Track Flights with MLAT, 2015.
[5]
T. E. Humphreys. Statement on the Vulnerability of Civil Unmanned Aerial Vehicles and Other Systems to Civil GPS Spoofing. Technical report, The University of Texas at Austin, July 2012. Submitted to the Subcommittee on Oversight, Investigations, and Management of the House Committee on Homeland Security.
[6]
T. E. Humphreys. Statement on the Security Threat Posed by Unmanned Aerial Systems and Posssible Countermeasures. Technical report, The University of Texas at Austin, Mar. 2015. Submitted to the Subcommittee on Oversight and Management Efficiency of the House Committee on Homeland Security.
[7]
K. Jansen, N. O. Tippenhauer, and C. Pöpper. Multi-Receiver GPS Spoofing Detection: Error Models and Realization. In Annual Computer Security Applications Conference, ACSAC '16, Los Angeles, CA, USA, Dec. 2016. ACM.
[8]
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys. Unmanned Aircraft Capture and Control via GPS Spoofing. Journal of Field Robotics, 31(4):617--636, July 2014.
[9]
D. Moser, P. Leu, L. Vincent, A. Ranganathan, F. Ricciato, and S.vCapkun. Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures. In ACM Conference on Mobile Computing and Networking, MobiCom '16, New York, USA, Oct. 2016. ACM.
[10]
A. Ranganathan, H. Ólafsdóttir, and S.vCapkun. SPREE: A Spoofing Resistant GPS Receiver. In ACM Conference on Mobile Computing and Networking, MobiCom '16, New York, USA, Oct. 2016. ACM.
[11]
M. Schafer, V. Lenders, and I. Martinovic. Experimental Analysis of Attacks on Next Generation Air Traffic Communication. In International Conference on Applied Cryptography and Network Security, ACNS '13, pages 253--271, Banff, Alberta, Canada, June 2013. Springer.
[12]
M. Schafer, V. Lenders, and J. Schmitt. Secure Track Verification. In IEEE Symposium on Security and Privacy, SP '15, pages 199--213, San Jose, CA, USA, May 2015. IEEE.
[13]
M. Sch\"afer, P. Leu, V. Lenders, and J. Schmitt. Secure Motion Verification using the Doppler Effect. In ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec '16, pages 135--145, Darmstadt, Germany, July 2016. ACM.
[14]
M. Sch\"afer, M. Strohmeier, V. Lenders, I. Martinovic, and M. Wilhelm. Bringing up OpenSky: A Large-scale ADS-B Sensor Network for Research. In ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN '14, pages 83--94, Berlin, Germany, Apr. 2014. IEEE.
[15]
M. Schafer, M. Strohmeier, M. Smith, M. Fuchs, R. Pinheiro, V. Lenders, and I. Martinovic. OpenSky Report 2016: Facts and Figures on SSR Mode S and ADS-B Usage. In IEEE/AIAA Digital Avionics Systems Conference, DASC '16, Sacramento, CA, USA, Sept. 2016. IEEE.
[16]
M. Strohmeier, V. Lenders, and I. Martinovic. On the Security of the Automatic Dependent Surveillance-Broadcast Protocol. IEEE Communications Surveys & Tutorials, 17(2):1066--1087, Oct. 2014.
[17]
M. Strohmeier, M. Schafer, V. Lenders, and I. Martinovic. Realities and Challenges of NextGen Air Traffic Management: The Case of ADS-B. IEEE Communications Magazine, 52(5):111--118, May 2014.
[18]
N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun. On the Requirements for Successful GPS Spoofing Attacks. In ACM Conference on Computer and Communications Security, CCS '11, pages 75--86, Chicago, IL, USA, Oct. 2011. ACM.
[19]
U.S. Department of Defense. Global Positioning System Standard Positioning Service Performance Standard, 4th edition, Sept. 2008.
[20]
J. Yang, Y. Chen, W. Trappe, and J. Cheng. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE Transactions on Parallel and Distributed Systems, 24(1):44--58, Jan. 2013.

Cited By

View all
  • (2022)GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer LocalizationIEEE Access10.1109/ACCESS.2022.316004710(42014-42028)Online publication date: 2022
  • (2022)GPS spoofing detection via crowd-sourced information for connected vehiclesComputer Networks10.1016/j.comnet.2022.109230216(109230)Online publication date: Oct-2022
  • (2021)Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systemsMegatrend revija10.5937/MegRev2103281K18:3(281-306)Online publication date: 2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
April 2017
952 pages
ISBN:9781450349444
DOI:10.1145/3052973
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2017

Check for updates

Author Tags

  1. ADS-B
  2. GPS
  3. countermeasure
  4. localization
  5. opensky

Qualifiers

  • Poster

Conference

ASIA CCS '17
Sponsor:

Acceptance Rates

ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
Overall Acceptance Rate 418 of 2,322 submissions, 18%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer LocalizationIEEE Access10.1109/ACCESS.2022.316004710(42014-42028)Online publication date: 2022
  • (2022)GPS spoofing detection via crowd-sourced information for connected vehiclesComputer Networks10.1016/j.comnet.2022.109230216(109230)Online publication date: Oct-2022
  • (2021)Spoofing in civil aviation: Security and safety of GPS/GNSS and ADS-B systemsMegatrend revija10.5937/MegRev2103281K18:3(281-306)Online publication date: 2021
  • (2020)Mitigating Spoofed GNSS Trajectories through Nature Inspired AlgorithmGeoInformatica10.1007/s10707-020-00412-zOnline publication date: 22-May-2020
  • (2020)Detection of global positioning system spoofing attack on unmanned aerial vehicle systemConcurrency and Computation: Practice and Experience10.1002/cpe.592534:7Online publication date: 21-Jul-2020
  • (2019)Drive me not: GPS spoofing detection via cellular networkProceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3317549.3319719(12-22)Online publication date: 15-May-2019
  • (2019)Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle SystemMachine Learning for Cyber Security10.1007/978-3-030-30619-9_10(123-139)Online publication date: 9-Sep-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media