UnReference: analysis of the effect of spoofing on RTK reference stations for connected rovers
- URL: http://arxiv.org/abs/2503.20364v1
- Date: Wed, 26 Mar 2025 09:40:19 GMT
- Title: UnReference: analysis of the effect of spoofing on RTK reference stations for connected rovers
- Authors: Marco Spanghero, Panos Papadimitratos,
- Abstract summary: Unmanned vehicles (aerial or ground vehicles and surface vessels) generally require a much higher level of accuracy than those provided by standalone receivers.<n>The most effective and economical way of achieving centimeter-level accuracy is to rely on corrections provided by fixed emphreference station receivers.<n>Due to their static nature, reference stations are prime targets for attacks, both simplistic jamming and spoofing.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Global Navigation Satellite Systems (GNSS) provide standalone precise navigation for a wide gamut of applications. Nevertheless, applications or systems such as unmanned vehicles (aerial or ground vehicles and surface vessels) generally require a much higher level of accuracy than those provided by standalone receivers. The most effective and economical way of achieving centimeter-level accuracy is to rely on corrections provided by fixed \emph{reference station} receivers to improve the satellite ranging measurements. Differential GNSS (DGNSS) and Real Time Kinematics (RTK) provide centimeter-level accuracy by distributing online correction streams to connected nearby mobile receivers typically termed \emph{rovers}. However, due to their static nature, reference stations are prime targets for GNSS attacks, both simplistic jamming and advanced spoofing, with different levels of adversarial control and complexity. Jamming the reference station would deny corrections and thus accuracy to the rovers. Spoofing the reference station would force it to distribute misleading corrections. As a result, all connected rovers using those corrections will be equally influenced by the adversary independently of their actual trajectory. We evaluate a battery of tests generated with an RF simulator to test the robustness of a common DGNSS/RTK processing library and receivers. We test both jamming and synchronized spoofing to demonstrate that adversarial action on the rover using reference spoofing is both effective and convenient from an adversarial perspective. Additionally, we discuss possible strategies based on existing countermeasures (self-validation of the PNT solution and monitoring of own clock drift) that the rover and the reference station can adopt to avoid using or distributing bogus corrections.
Related papers
- Time-based GNSS attack detection [0.0]
Cross-checking the provided time against alternative trusted time sources can lead to attack detection aiming at controlling the receiver time.<n>We implement adversaries spanning from simplistic spoofers to advanced ones synchronized with the constellation.<n>The method is largely agnostic to the satellite constellation and the attacker type, making time-based data validation of information compatible with existing receivers and readily deployable.
arXiv Detail & Related papers (2025-02-06T08:28:41Z) - Stable Neighbor Denoising for Source-free Domain Adaptive Segmentation [91.83820250747935]
Pseudo-label noise is mainly contained in unstable samples in which predictions of most pixels undergo significant variations during self-training.
We introduce the Stable Neighbor Denoising (SND) approach, which effectively discovers highly correlated stable and unstable samples.
SND consistently outperforms state-of-the-art methods in various SFUDA semantic segmentation settings.
arXiv Detail & Related papers (2024-06-10T21:44:52Z) - DEMO: RTKiller -- manipulation of GNSS RTK rovers by reference base spoofing [0.0]
We show how manipulation of the Position Navigation and Timing solution at the reference station is reflected in the loss of baseline fix or degraded accuracy at the rover.
Attacking the reference stations can harm all receivers (rovers) that rely on the targeted reference station.
arXiv Detail & Related papers (2024-05-17T17:07:51Z) - POSTER: Testing network-based RTK for GNSS receiver security [0.0]
Real Time Kinematics (RTK) allow mobile receivers (termed rovers) to correct errors in their Position Navigation and Timing (PNT) solution.
This work investigates the effect RTK reference station spoofing has on the rover's PNT solution quality.
arXiv Detail & Related papers (2024-05-17T16:53:04Z) - Extending RAIM with a Gaussian Mixture of Opportunistic Information [1.9688858888666714]
Original receiver autonomous integrity monitoring (RAIM) was not designed for securing.
We extend RAIM by incorporating all opportunistic information, i.e., measurements from terrestrial infrastructures and onboard sensors.
The objective is to assess the likelihood of spoofing by analyzing locations derived from extended RAIM solutions.
arXiv Detail & Related papers (2024-02-05T19:03:18Z) - Angle Robustness Unmanned Aerial Vehicle Navigation in GNSS-Denied
Scenarios [66.05091704671503]
We present a novel angle navigation paradigm to deal with flight deviation in point-to-point navigation tasks.
We also propose a model that includes the Adaptive Feature Enhance Module, Cross-knowledge Attention-guided Module and Robust Task-oriented Head Module.
arXiv Detail & Related papers (2024-02-04T08:41:20Z) - Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience [4.898754501085215]
This study explores a stealthy slow drift GPS spoofing attack, replicating the victim AV's satellite reception pattern.
The attack is designed to gradually deviate from the correct route, making real-time detection challenging.
Changing the pseudo ranges confuses the AV, leading it to incorrect destinations while remaining oblivious to the manipulation.
arXiv Detail & Related papers (2024-01-02T17:36:07Z) - Unsupervised Domain Adaptation for Self-Driving from Past Traversal
Features [69.47588461101925]
We propose a method to adapt 3D object detectors to new driving environments.
Our approach enhances LiDAR-based detection models using spatial quantized historical features.
Experiments on real-world datasets demonstrate significant improvements.
arXiv Detail & Related papers (2023-09-21T15:00:31Z) - Bayes Risk Transducer: Transducer with Controllable Alignment Prediction [79.41540601816315]
Bayes Risk Transducer (BRT) proposed to enforce preferred paths and achieve controllable alignment prediction.
BRT saves inference cost by up to 46% for non-streaming ASR and reduces overall system latency by 41% for streaming ASR.
arXiv Detail & Related papers (2023-08-19T20:48:16Z) - Semi-DETR: Semi-Supervised Object Detection with Detection Transformers [105.45018934087076]
We analyze the DETR-based framework on semi-supervised object detection (SSOD)
We present Semi-DETR, the first transformer-based end-to-end semi-supervised object detector.
Our method outperforms all state-of-the-art methods by clear margins.
arXiv Detail & Related papers (2023-07-16T16:32:14Z) - Higher Performance Visual Tracking with Dual-Modal Localization [106.91097443275035]
Visual Object Tracking (VOT) has synchronous needs for both robustness and accuracy.
We propose a dual-modal framework for target localization, consisting of robust localization suppressingors via ONR and the accurate localization attending to the target center precisely via OFC.
arXiv Detail & Related papers (2021-03-18T08:47:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.