Guardian Positioning System (GPS) for Location Based Services
- URL: http://arxiv.org/abs/2505.09743v1
- Date: Wed, 14 May 2025 19:06:13 GMT
- Title: Guardian Positioning System (GPS) for Location Based Services
- Authors: Wenjie Liu, Panos Papadimitratos,
- Abstract summary: Smartphones are vulnerable to attacks that manipulate positions to control and undermine functionality.<n>We show that spoofing attacks succeed even though smartphones have multiple sources of positioning information.<n>We propose an extended receiver autonomous integrity monitoring (RAIM) framework that leverages the readily available, redundant, often so-called opportunistic positioning information.
- Score: 1.9688858888666714
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Location-based service (LBS) applications proliferate and support transportation, entertainment, and more. Modern mobile platforms, with smartphones being a prominent example, rely on terrestrial and satellite infrastructures (e.g., global navigation satellite system (GNSS) and crowdsourced Wi-Fi, Bluetooth, cellular, and IP databases) for correct positioning. However, they are vulnerable to attacks that manipulate positions to control and undermine LBS functionality -- thus enabling the scamming of users or services. Our work reveals that GNSS spoofing attacks succeed even though smartphones have multiple sources of positioning information. Moreover, that Wi-Fi spoofing attacks with GNSS jamming are surprisingly effective. More concerning is the evidence that sophisticated, coordinated spoofing attacks are highly effective. Attacks can target GNSS in combination with other positioning methods, thus defenses that assume that only GNSS is under attack cannot be effective. More so, resilient GNSS receivers and special-purpose antennas are not feasible on smartphones. To address this gap, we propose an extended receiver autonomous integrity monitoring (RAIM) framework that leverages the readily available, redundant, often so-called opportunistic positioning information on off-the-shelf platforms. We jointly use onboard sensors, terrestrial infrastructures, and GNSS. We show that our extended RAIM framework improves resilience against location spoofing, e.g., achieving a detection accuracy improvement of up to 24-58% compared to the state-of-the-art algorithms and location providers; detecting attacks within 5 seconds, with a low false positive rate.
Related papers
- GNSS Spoofing Detection Based on Opportunistic Position Information [1.9688858888666714]
Position-based Attack Detection Scheme (PADS) is a probabilistic framework that uses regression and uncertainty analysis for positions.<n>PADS achieves up to 3 times the true positive rate at a low false positive rate.
arXiv Detail & Related papers (2025-06-14T17:27:06Z) - Time-based GNSS attack detection [0.0]
Cross-checking the provided time against alternative trusted time sources can lead to attack detection aiming at controlling the receiver time.<n>We implement adversaries spanning from simplistic spoofers to advanced ones synchronized with the constellation.<n>The method is largely agnostic to the satellite constellation and the attacker type, making time-based data validation of information compatible with existing receivers and readily deployable.
arXiv Detail & Related papers (2025-02-06T08:28:41Z) - GNSS/GPS Spoofing and Jamming Identification Using Machine Learning and Deep Learning [0.8594140167290099]
Global Navigation Satellite Systems (GNSS) are vulnerable to malicious threats such as spoofing and jamming.<n>Recent advancements in machine learning and deep learning provide promising avenues for enhancing detection and mitigation strategies.<n>This paper addresses both spoofing and jamming by tackling real-world challenges through machine learning, deep learning, and computer vision techniques.
arXiv Detail & Related papers (2025-01-04T18:14:43Z) - Extending RAIM with a Gaussian Mixture of Opportunistic Information [1.9688858888666714]
Original receiver autonomous integrity monitoring (RAIM) was not designed for securing.
We extend RAIM by incorporating all opportunistic information, i.e., measurements from terrestrial infrastructures and onboard sensors.
The objective is to assess the likelihood of spoofing by analyzing locations derived from extended RAIM solutions.
arXiv Detail & Related papers (2024-02-05T19:03:18Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Avoid Adversarial Adaption in Federated Learning by Multi-Metric
Investigations [55.2480439325792]
Federated Learning (FL) facilitates decentralized machine learning model training, preserving data privacy, lowering communication costs, and boosting model performance through diversified data sources.
FL faces vulnerabilities such as poisoning attacks, undermining model integrity with both untargeted performance degradation and targeted backdoor attacks.
We define a new notion of strong adaptive adversaries, capable of adapting to multiple objectives simultaneously.
MESAS is the first defense robust against strong adaptive adversaries, effective in real-world data scenarios, with an average overhead of just 24.37 seconds.
arXiv Detail & Related papers (2023-06-06T11:44:42Z) - Task-Oriented Communications for NextG: End-to-End Deep Learning and AI
Security Aspects [78.84264189471936]
NextG communication systems are beginning to explore shifting this design paradigm to reliably executing a given task such as in task-oriented communications.
Wireless signal classification is considered as the task for the NextG Radio Access Network (RAN), where edge devices collect wireless signals for spectrum awareness and communicate with the NextG base station (gNodeB) that needs to identify the signal label.
Task-oriented communications is considered by jointly training the transmitter, receiver and classifier functionalities as an encoder-decoder pair for the edge device and the gNodeB.
arXiv Detail & Related papers (2022-12-19T17:54:36Z) - TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack [46.79557381882643]
We present TANTRA, a novel end-to-end Timing-based Adversarial Network Traffic Reshaping Attack.
Our evasion attack utilizes a long short-term memory (LSTM) deep neural network (DNN) which is trained to learn the time differences between the target network's benign packets.
TANTRA achieves an average success rate of 99.99% in network intrusion detection system evasion.
arXiv Detail & Related papers (2021-03-10T19:03:38Z) - Adversarial Attacks on Deep Learning Based Power Allocation in a Massive
MIMO Network [62.77129284830945]
We show that adversarial attacks can break DL-based power allocation in the downlink of a massive multiple-input-multiple-output (maMIMO) network.
We benchmark the performance of these attacks and show that with a small perturbation in the input of the neural network (NN), the white-box attacks can result in infeasible solutions up to 86%.
arXiv Detail & Related papers (2021-01-28T16:18:19Z) - Demo Abstract: Indoor Positioning System in Visually-Degraded
Environments with Millimetre-Wave Radar and Inertial Sensors [44.58134907168034]
We present a real-time indoor positioning system which fuses millimetre-wave (mmWave) radar and Inertial Measurement Units (IMU) data via deep sensor fusion.
Good accuracy and resilience were exhibited even in poorly illuminated scenes.
arXiv Detail & Related papers (2020-10-26T17:41:25Z) - Prediction-Based GNSS Spoofing Attack Detection for Autonomous Vehicles [5.579370215490055]
We have developed a prediction-based spoofing attack detection strategy using the long short-term memory (LSTM) model.
Based on the predicted distance traveled between the current location and the immediate future location, a threshold value is established.
Our analysis revealed that the prediction-based spoofed attack detection strategy can successfully detect the attack in real-time.
arXiv Detail & Related papers (2020-10-16T18:26:59Z) - Measurement-driven Security Analysis of Imperceptible Impersonation
Attacks [54.727945432381716]
We study the exploitability of Deep Neural Network-based Face Recognition systems.
We show that factors such as skin color, gender, and age, impact the ability to carry out an attack on a specific target victim.
We also study the feasibility of constructing universal attacks that are robust to different poses or views of the attacker's face.
arXiv Detail & Related papers (2020-08-26T19:27:27Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.