Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services
- URL: http://arxiv.org/abs/2510.27346v1
- Date: Fri, 31 Oct 2025 10:30:52 GMT
- Title: Coordinated Position Falsification Attacks and Countermeasures for Location-Based Services
- Authors: Wenjie Liu, Panos Papadimitratos,
- Abstract summary: Location-based service (LBS) applications are susceptible to low-cost attacks (less than $50)<n>These attacks manipulate position data to control or undermine LBS, leading to user scams or service manipulation.<n>We propose a countermeasure to detect and thwart such attacks by utilizing readily available, redundant positioning information from off-the-shelf platforms.
- Score: 4.653727709371718
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: With the rise of location-based service (LBS) applications that rely on terrestrial and satellite infrastructures (e.g., GNSS and crowd-sourced Wi-Fi, Bluetooth, cellular, and IP databases) for positioning, ensuring their integrity and security is paramount. However, we demonstrate that these applications are susceptible to low-cost attacks (less than $50), including Wi-Fi spoofing combined with GNSS jamming, as well as more sophisticated coordinated location spoofing. These attacks manipulate position data to control or undermine LBS functionality, leading to user scams or service manipulation. Therefore, we propose a countermeasure to detect and thwart such attacks by utilizing readily available, redundant positioning information from off-the-shelf platforms. Our method extends the receiver autonomous integrity monitoring (RAIM) framework by incorporating opportunistic information, including data from onboard sensors and terrestrial infrastructure signals, and, naturally, GNSS. We theoretically show that the fusion of heterogeneous signals improves resilience against sophisticated adversaries on multiple fronts. Experimental evaluations show the effectiveness of the proposed scheme in improving detection accuracy by 62% at most compared to baseline schemes and restoring accurate positioning.
Related papers
- Privacy-Preserving and Secure Spectrum Sharing for Database-Driven Cognitive Radio Networks [0.06999740786886537]
Database-driven cognitive radio networks (DB-CRNs) enable dynamic spectrum sharing through geolocation databases.<n>Existing approaches address these issues in isolation and lack a unified, regulation-compliant solution under realistic adversarial conditions.<n>We present a unified security framework for DB-CRNs that simultaneously provides location privacy, user anonymity, verifiable location, and DoS resilience.
arXiv Detail & Related papers (2026-02-17T16:39:07Z) - Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Security-Aware Joint Sensing, Communication, and Computing Optimization in Low Altitude Wireless Networks [83.84711311344918]
Integrated sensing, communications, and computing (I SCC) is one of the core parts of Low-Altitude Wireless Networks (LAWNs)<n>This paper studies joint performance optimization of I SCC while considering secrecyness of the communications.<n>We propose a deep Q-network (DQN)-based multi-objective evolutionary algorithm, which adaptively selects evolutionary operators according to the evolving optimization objectives.
arXiv Detail & Related papers (2025-11-03T11:06:41Z) - OS-Sentinel: Towards Safety-Enhanced Mobile GUI Agents via Hybrid Validation in Realistic Workflows [77.95511352806261]
Computer-using agents powered by Vision-Language Models (VLMs) have demonstrated human-like capabilities in operating digital environments like mobile platforms.<n>We propose OS-Sentinel, a novel hybrid safety detection framework that combines a Formal Verifier for detecting explicit system-level violations with a Contextual Judge for assessing contextual risks and agent actions.
arXiv Detail & Related papers (2025-10-28T13:22:39Z) - GNSS Spoofing Detection Based on Opportunistic Position Information [1.9688858888666714]
Position-based Attack Detection Scheme (PADS) is a probabilistic framework that uses regression and uncertainty analysis for positions.<n>PADS achieves up to 3 times the true positive rate at a low false positive rate.
arXiv Detail & Related papers (2025-06-14T17:27:06Z) - Guardian Positioning System (GPS) for Location Based Services [1.9688858888666714]
Smartphones are vulnerable to attacks that manipulate positions to control and undermine functionality.<n>We show that spoofing attacks succeed even though smartphones have multiple sources of positioning information.<n>We propose an extended receiver autonomous integrity monitoring (RAIM) framework that leverages the readily available, redundant, often so-called opportunistic positioning information.
arXiv Detail & Related papers (2025-05-14T19:06:13Z) - Self-Supervised Federated GNSS Spoofing Detection with Opportunistic Data [1.9688858888666714]
Global navigation satellite systems (GNSS) are vulnerable to spoofing attacks.<n>Deep learning-based methods require extensive labeled datasets, consume significant computational resources, and raise privacy concerns.<n>This paper proposes a self-supervised federated learning framework for spoofing detection.
arXiv Detail & Related papers (2025-05-09T16:22:44Z) - SLAP: Secure Location-proof and Anonymous Privacy-preserving Spectrum Access [2.156208381257605]
We propose a novel framework that ensures location privacy and anonymity during spectrum queries, usage notifications, and location-proof acquisition.<n>Our solution includes an adaptive dual-scenario location verification mechanism with architectural flexibility and a fallback option, along with a counter-DoS approach using time-lock puzzles.
arXiv Detail & Related papers (2025-03-03T19:52:56Z) - Extending RAIM with a Gaussian Mixture of Opportunistic Information [1.9688858888666714]
Original receiver autonomous integrity monitoring (RAIM) was not designed for securing.
We extend RAIM by incorporating all opportunistic information, i.e., measurements from terrestrial infrastructures and onboard sensors.
The objective is to assess the likelihood of spoofing by analyzing locations derived from extended RAIM solutions.
arXiv Detail & Related papers (2024-02-05T19:03:18Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - GraSens: A Gabor Residual Anti-aliasing Sensing Framework for Action
Recognition using WiFi [52.530330427538885]
WiFi-based human action recognition (HAR) has been regarded as a promising solution in applications such as smart living and remote monitoring.
We propose an end-to-end Gabor residual anti-aliasing sensing network (GraSens) to directly recognize the actions using the WiFi signals from the wireless devices in diverse scenarios.
arXiv Detail & Related papers (2022-05-24T10:20:16Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z) - Mind the GAP: Security & Privacy Risks of Contact Tracing Apps [75.7995398006171]
Google and Apple have jointly provided an API for exposure notification in order to implement decentralized contract tracing apps using Bluetooth Low Energy.
We demonstrate that in real-world scenarios the GAP design is vulnerable to (i) profiling and possibly de-anonymizing persons, and (ii) relay-based wormhole attacks that basically can generate fake contacts.
arXiv Detail & Related papers (2020-06-10T16:05:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.