Neutralization of IMU-Based GPS Spoofing Detection using external IMU sensor and feedback methodology
- URL: http://arxiv.org/abs/2512.20964v1
- Date: Wed, 24 Dec 2025 05:40:40 GMT
- Title: Neutralization of IMU-Based GPS Spoofing Detection using external IMU sensor and feedback methodology
- Authors: Ji Hyuk Jung, Ji Won Yoon,
- Abstract summary: We propose a spoofing attack system designed to neutralize IMU sensor-based detection.<n>To this end, this paper proposes an attack model that performs GPS spoofing by stealing internal dynamic state information.
- Score: 10.079494059536735
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Autonomous Vehicles (AVs) refer to systems capable of perceiving their states and moving without human intervention. Among the factors required for autonomous decision-making in mobility, positional awareness of the vehicle itself is the most critical. Accordingly, extensive research has been conducted on defense mechanisms against GPS spoofing attacks, which threaten AVs by disrupting position recognition. Among these, detection methods based on internal IMU sensors are regarded as some of the most effective. In this paper, we propose a spoofing attack system designed to neutralize IMU sensor-based detection. First, we present an attack modeling approach for bypassing such detection. Then, based on EKF sensor fusion, we experimentally analyze both the impact of GPS spoofing values on the internal target system and how our proposed methodology reduces anomaly detection within the target system. To this end, this paper proposes an attack model that performs GPS spoofing by stealing internal dynamic state information using an external IMU sensor, and the experimental results demonstrate that attack values can be injected without being detected.
Related papers
- GPS Spoofing Attack Detection in Autonomous Vehicles Using Adaptive DBSCAN [1.932372263677091]
This study presents an adaptive detection approach utilizing a dynamically tuned Density Based Spatial Clustering of Applications with Noise (DBSCAN) algorithm.<n>The modified algorithm effectively identifies turn-by-turn, stop, overshoot, and multiple small biased spoofing attacks.
arXiv Detail & Related papers (2025-10-12T19:06:44Z) - VIMU: Effective Physics-based Realtime Detection and Recovery against Stealthy Attacks on UAVs [22.51314286850798]
We present VIMU, an efficient sensor attack detection and resilience system for unmanned aerial vehicles.<n>We propose a detection algorithm, CS-EMA, that leverages low-pass filtering to identify stealthy gyroscope attacks.<n>We also augment the state estimation with a FIFO buffer safeguard to mitigate the impact of high-rate IMU attacks.
arXiv Detail & Related papers (2025-04-29T09:20:41Z) - Sensor Deprivation Attacks for Stealthy UAV Manipulation [51.9034385791934]
Unmanned Aerial Vehicles autonomously perform tasks with the use of state-of-the-art control algorithms.
In this work, we propose a multi-part.
Sensor Deprivation Attacks (SDAs), aiming to stealthily impact.
process control via sensor reconfiguration.
arXiv Detail & Related papers (2024-10-14T23:03:58Z) - GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles [1.1992484839577393]
GPS networks are vulnerable to cyber-attacks like spoofing and jamming.<n>This paper proposes GPS Intrusion Detection System, or GPS-IDS, an Anomaly-based intrusion detection framework.<n>To the best of our knowledge, this dataset is the first of its kind and has been publicly released for the global research community to address such security challenges.
arXiv Detail & Related papers (2024-05-14T06:55:16Z) - AdvGPS: Adversarial GPS for Multi-Agent Perception Attack [47.59938285740803]
This study investigates whether specific GPS signals can easily mislead the multi-agent perception system.
We introduce textscAdvGPS, a method capable of generating adversarial GPS signals which are also stealthy for individual agents within the system.
Our experiments on the OPV2V dataset demonstrate that these attacks substantially undermine the performance of state-of-the-art methods.
arXiv Detail & Related papers (2024-01-30T23:13:41Z) - Unveiling the Stealthy Threat: Analyzing Slow Drift GPS Spoofing Attacks for Autonomous Vehicles in Urban Environments and Enabling the Resilience [4.898754501085215]
This study explores a stealthy slow drift GPS spoofing attack, replicating the victim AV's satellite reception pattern.
The attack is designed to gradually deviate from the correct route, making real-time detection challenging.
Changing the pseudo ranges confuses the AV, leading it to incorrect destinations while remaining oblivious to the manipulation.
arXiv Detail & Related papers (2024-01-02T17:36:07Z) - Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack
Detection Framework for Autonomous Vehicles [5.624009710240032]
We present a sensor fusion-based spoofing attack detection framework for Autonomous Vehicles.
Experiments are conducted in Tuscaloosa, AL, mimicking urban road structures.
Results demonstrate the framework's ability to detect various sophisticated spoofing attacks, even including slow drifting attacks.
arXiv Detail & Related papers (2024-01-02T17:30:46Z) - Efficient Real-time Smoke Filtration with 3D LiDAR for Search and Rescue
with Autonomous Heterogeneous Robotic Systems [56.838297900091426]
Smoke and dust affect the performance of any mobile robotic platform due to their reliance on onboard perception systems.
This paper proposes a novel modular computation filtration pipeline based on intensity and spatial information.
arXiv Detail & Related papers (2023-08-14T16:48:57Z) - No Need to Know Physics: Resilience of Process-based Model-free Anomaly
Detection for Industrial Control Systems [95.54151664013011]
We present a novel framework to generate adversarial spoofing signals that violate physical properties of the system.
We analyze four anomaly detectors published at top security conferences.
arXiv Detail & Related papers (2020-12-07T11:02:44Z) - Towards robust sensing for Autonomous Vehicles: An adversarial
perspective [82.83630604517249]
It is of primary importance that the resulting decisions are robust to perturbations.
Adversarial perturbations are purposefully crafted alterations of the environment or of the sensory measurements.
A careful evaluation of the vulnerabilities of their sensing system(s) is necessary in order to build and deploy safer systems.
arXiv Detail & Related papers (2020-07-14T05:25:15Z) - Investigating Robustness of Adversarial Samples Detection for Automatic
Speaker Verification [78.51092318750102]
This work proposes to defend ASV systems against adversarial attacks with a separate detection network.
A VGG-like binary classification detector is introduced and demonstrated to be effective on detecting adversarial samples.
arXiv Detail & Related papers (2020-06-11T04:31:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.