Probabilistic detection of GNSS spoofing using opportunistic information
- URL: http://arxiv.org/abs/2305.05404v2
- Date: Sun, 11 May 2025 13:03:36 GMT
- Title: Probabilistic detection of GNSS spoofing using opportunistic information
- Authors: Wenjie Liu, Panos Papadimitratos,
- Abstract summary: Civilian signals are usually not cryptographically protected.<n>This makes attacks that forge signals relatively easy.<n>Considering modern devices often have network connections and onboard sensors, a Probabilistic Detection of Spoofing scheme is proposed.
- Score: 1.9688858888666714
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Global Navigation Satellite Systems (GNSS) are integrated into many devices. However, civilian GNSS signals are usually not cryptographically protected. This makes attacks that forge signals relatively easy. Considering modern devices often have network connections and onboard sensors, the proposed here Probabilistic Detection of GNSS Spoofing (PDS) scheme is based on such opportunistic information. PDS has at its core two parts. First, a regression problem with motion model constraints, which equalizes the noise of all locations considering the motion model of the device. Second, a Gaussian process, that analyzes statistical properties of location data to construct uncertainty. Then, a likelihood function, that fuses the two parts, as a basis for a Neyman-Pearson lemma (NPL)-based detection strategy. Our experimental evaluation shows a performance gain over the state-of-the-art, in terms of attack detection effectiveness.
Related papers
- GNSS Spoofing Detection Based on Opportunistic Position Information [1.9688858888666714]
Position-based Attack Detection Scheme (PADS) is a probabilistic framework that uses regression and uncertainty analysis for positions.<n>PADS achieves up to 3 times the true positive rate at a low false positive rate.
arXiv Detail & Related papers (2025-06-14T17:27:06Z) - Extending RAIM with a Gaussian Mixture of Opportunistic Information [1.9688858888666714]
Original receiver autonomous integrity monitoring (RAIM) was not designed for securing.
We extend RAIM by incorporating all opportunistic information, i.e., measurements from terrestrial infrastructures and onboard sensors.
The objective is to assess the likelihood of spoofing by analyzing locations derived from extended RAIM solutions.
arXiv Detail & Related papers (2024-02-05T19:03:18Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles [5.624009710240032]
We present a sensor fusion-based spoofing attack detection framework for Autonomous Vehicles.
Experiments are conducted in Tuscaloosa, AL, mimicking urban road structures.
Results demonstrate the framework's ability to detect various sophisticated spoofing attacks, even including slow drifting attacks.
arXiv Detail & Related papers (2024-01-02T17:30:46Z) - Learning-based NLOS Detection and Uncertainty Prediction of GNSS
Observations with Transformer-Enhanced LSTM Network [2.798138034569478]
This work proposes a deeplearning-based method to detect NLOS and predict errors by analyzing pseudo-temporal modeling problem.
We use datasets from Hong Kong and Aachen to train and evaluate the proposed network.
We show that the proposed method avoids trajectory divergence in real-world vehicle localization by classifying and excluding NLOS observations.
arXiv Detail & Related papers (2023-09-01T14:17:02Z) - Automated classification of pre-defined movement patterns: A comparison
between GNSS and UWB technology [55.41644538483948]
Real-time location systems (RTLS) allow for collecting data from human movement patterns.
The current study aims to design and evaluate an automated framework to classify human movement patterns in small areas.
arXiv Detail & Related papers (2023-03-10T14:46:42Z) - A Sensor Fusion-based GNSS Spoofing Attack Detection Framework for
Autonomous Vehicles [4.947150829838588]
This paper presents a sensor fusion based Global Navigation Satellite System (GNSS) spoofing attack detection framework for autonomous vehicles.
Data from multiple low-cost in-vehicle sensors are fused and fed into a recurrent neural network model.
We have combined k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect and classify left and right turns.
arXiv Detail & Related papers (2021-08-19T11:59:51Z) - DAAIN: Detection of Anomalous and Adversarial Input using Normalizing
Flows [52.31831255787147]
We introduce a novel technique, DAAIN, to detect out-of-distribution (OOD) inputs and adversarial attacks (AA)
Our approach monitors the inner workings of a neural network and learns a density estimator of the activation distribution.
Our model can be trained on a single GPU making it compute efficient and deployable without requiring specialized accelerators.
arXiv Detail & Related papers (2021-05-30T22:07:13Z) - Object Detection Made Simpler by Eliminating Heuristic NMS [70.93004137521946]
We show a simple NMS-free, end-to-end object detection framework.
We attain on par or even improved detection accuracy compared with the original one-stage detector.
arXiv Detail & Related papers (2021-01-28T02:38:29Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Probing Model Signal-Awareness via Prediction-Preserving Input
Minimization [67.62847721118142]
We evaluate models' ability to capture the correct vulnerability signals to produce their predictions.
We measure the signal awareness of models using a new metric we propose- Signal-aware Recall (SAR)
The results show a sharp drop in the model's Recall from the high 90s to sub-60s with the new metric.
arXiv Detail & Related papers (2020-11-25T20:05:23Z) - Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles [5.579370215490055]
We have developed a prediction-based spoofing attack detection strategy using the long short-term memory (LSTM) model.
Based on the predicted distance traveled between the current location and the immediate future location, a threshold value is established.
Our analysis revealed that the prediction-based spoofed attack detection strategy can successfully detect the attack in real-time.
arXiv Detail & Related papers (2020-10-16T18:26:59Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.