A Location Validation Technique to Mitigate GPS Spoofing Attacks in IEEE 802.11p based Fleet Operator's Network of Electric Vehicles
- URL: http://arxiv.org/abs/2410.13031v1
- Date: Wed, 16 Oct 2024 20:42:27 GMT
- Title: A Location Validation Technique to Mitigate GPS Spoofing Attacks in IEEE 802.11p based Fleet Operator's Network of Electric Vehicles
- Authors: Ankita Samaddar, Arvind Easwaran,
- Abstract summary: Vehicle rebalancing application uses the GPS location data of the vehicles periodically to determine the vehicle(s) to be moved to a different charging station for rebalancing.
A malicious attacker residing in the network can spoof the GPS location data packets of the target vehicle(s) resulting in misinterpretation of the location of the vehicle(s)
We propose a location tracking technique that can validate the current location of a vehicle based on its previous location and roadmaps.
- Score: 2.5582913676558205
- License:
- Abstract: Most vehicular applications in electric vehicles use IEEE 802.11p protocol for vehicular communications. Vehicle rebalancing application is one such application that has been used by many car rental service providers to overcome the disparity between vehicle demand and vehicle supply at different charging stations. Vehicle rebalancing application uses the GPS location data of the vehicles periodically to determine the vehicle(s) to be moved to a different charging station for rebalancing. However, a malicious attacker residing in the network can spoof the GPS location data packets of the target vehicle(s) resulting in misinterpretation of the location of the vehicle(s). This can result in wrong rebalancing decision leading to unmet demands of the customers and under utilization of the system. To detect and prevent this attack, we propose a location tracking technique that can validate the current location of a vehicle based on its previous location and roadmaps. We used OpenStreetMap and SUMO simulator to generate the roadmap data from the roadmaps of Singapore. Extensive experiments on the generated datasets show the efficacy of our proposed technique.
Related papers
- Neural Semantic Map-Learning for Autonomous Vehicles [85.8425492858912]
We present a mapping system that fuses local submaps gathered from a fleet of vehicles at a central instance to produce a coherent map of the road environment.
Our method jointly aligns and merges the noisy and incomplete local submaps using a scene-specific Neural Signed Distance Field.
We leverage memory-efficient sparse feature-grids to scale to large areas and introduce a confidence score to model uncertainty in scene reconstruction.
arXiv Detail & Related papers (2024-10-10T10:10:03Z) - CVVLSNet: Vehicle Location and Speed Estimation Using Partial Connected Vehicle Trajectory Data [6.928899738499268]
Real-time estimation of vehicle locations and speeds is crucial for developing beneficial transportation applications.
Recent advances in communication technologies facilitate the emergence of connected vehicles (CVs)
This paper proposes a novel CV-based Vehicle Location and Speed estimation network, CVVLSNet.
arXiv Detail & Related papers (2024-09-30T18:13:26Z) - Protecting Vehicle Location Privacy with Contextually-Driven Synthetic Location Generation [5.283624671933499]
We introduce VehiTrack, a new threat model to demonstrate the vulnerability of Geo-Ind in protecting vehicle location privacy.
VehiTrack can accurately determine exact vehicle locations from obfuscated data.
We propose TransProtect, a new geo-obfuscation approach that limits obfuscation to realistic vehicle movement patterns.
arXiv Detail & Related papers (2024-09-14T17:47:23Z) - Your Car Tells Me Where You Drove: A Novel Path Inference Attack via CAN Bus and OBD-II Data [57.22545280370174]
On Path Diagnostic - Intrusion & Inference (OPD-II) is a novel path inference attack leveraging a physical car model and a map matching algorithm.
We implement our attack on a set of four different cars and a total number of 41 tracks in different road and traffic scenarios.
arXiv Detail & Related papers (2024-06-30T04:21:46Z) - A Prototype on the Feasibility of Learning Spatial Provenance in XBee and LoRa Networks [0.732582506267845]
In Vehicle-to-Everything (V2X) networks, Road Side Units (RSUs) typically desire to gather the location information of the participating vehicles to provide security and network-diagnostics features.
We propose a new spatial-provenance framework wherein the vehicles agree to compromise their privacy to a certain extent and share a low-precision variant of its coordinates in agreement with the demands of the RSU.
Our demonstrations reveal that low-to-moderate precision localization can be achieved in fewer packets, thus making an appealing case for next-generation vehicular networks to include our methods for providing real-time security and network-
arXiv Detail & Related papers (2024-01-12T15:36:28Z) - Precise Payload Delivery via Unmanned Aerial Vehicles: An Approach Using
Object Detection Algorithms [0.0]
We describe the development of a micro-class UAV and propose a novel navigation method.
It incorporates a deep-learning-based computer vision approach to identify and precisely align the UAV with a target marked at the payload delivery position.
This proposed method achieves a 500% increase in average horizontal precision over conventional GPS-based approaches.
arXiv Detail & Related papers (2023-10-10T05:54:04Z) - MSight: An Edge-Cloud Infrastructure-based Perception System for
Connected Automated Vehicles [58.461077944514564]
This paper presents MSight, a cutting-edge roadside perception system specifically designed for automated vehicles.
MSight offers real-time vehicle detection, localization, tracking, and short-term trajectory prediction.
Evaluations underscore the system's capability to uphold lane-level accuracy with minimal latency.
arXiv Detail & Related papers (2023-10-08T21:32:30Z) - Automated Automotive Radar Calibration With Intelligent Vehicles [73.15674960230625]
We present an approach for automated and geo-referenced calibration of automotive radar sensors.
Our method does not require external modifications of a vehicle and instead uses the location data obtained from automated vehicles.
Our evaluation on data from a real testing site shows that our method can correctly calibrate infrastructure sensors in an automated manner.
arXiv Detail & Related papers (2023-06-23T07:01:10Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - Visual Localization for Autonomous Driving: Mapping the Accurate
Location in the City Maze [16.824901952766446]
We propose a novel feature voting technique for visual localization.
In our work, we craft the proposed feature voting method into three state-of-the-art visual localization networks.
Our approach can predict location robustly even in challenging inner-city settings.
arXiv Detail & Related papers (2020-08-13T03:59:34Z) - Real-time Localization Using Radio Maps [59.17191114000146]
We present a simple yet effective method for localization based on pathloss.
In our approach, the user to be localized reports the received signal strength from a set of base stations with known locations.
arXiv Detail & Related papers (2020-06-09T16:51:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.