Skip to main content

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System

  • Conference paper
  • First Online:
Machine Learning for Cyber Security (ML4CS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11806))

Included in the following conference series:

Abstract

Most of the existing GPS spoofing detection schemes are vulnerable to the complex generative GPS spoofing attack, and require additional auxiliary equipments and extensive signal processing capabilities, leading to defects such as low real-time performance and large communication overhead which may not be available for the unmanned aerial vehicle (UAV, also known as drone) system. Motivated by the limitations of prior work, we propose a GPS spoofing detection scheme that requires minimal prior configuration and employs information fusion based on the GPS receiver and inertial measurement unit (IMU). We use a real-time model of tracking and calculating to derive the current location of the drones which are then contrasted with the location information received by the GPS receiver to judge whether the UAV system is under spoofing attack. Experiments show that, while the accuracy meets the requirements of detection, the proposed method can accurately determine whether the system is attacked within 8 s, with a detection rate of 98.6%. Compared with the existing schemes, the performance of real-time detecting is improved in our method while the detection rate is ensured. Even in our worst-case, we detect GPS spoofing attack within 28 s after the UAV system starts its mission.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.avascent.com/2018/02/think-bigger-large-unmanned-systems-and-the-next-major-shift-in-aviation/.

References

  1. Psiaki, M.L., Humphreys, T.: Protecting GPS from spoofers is critical to the future of navigation. IEEE Spectrum. http://spectrum.ieee.org/telecom/security/protecting-gps-from-spoofers-is-critical-to-the-future-of-navigation. Accessed 29 July 2016

  2. Amirtha, T.: Satnav spoofing attacks: why these researchers think they have the answer. ZDNet. http://www.zdnet.com/article/satnav-spoofing-attacks-why-these-researchers-think-they-have-the-answer. Accessed 27 Mar 2017

  3. Kugler, L.: Why GPS spoofing is a threat to companies, countries. Commun. ACM 60(9), 18–19 (2017)

    Article  Google Scholar 

  4. Bonior, J., Evans, P., Sheets, G., et al.: Implementation of a wireless time distribution testbed protected with quantum key distribution. In: 2017 IEEE Wireless Communications and Networking Conference, pp. 1–6. IEEE, San Francisco (2017)

    Google Scholar 

  5. Psiaki, M.L., O’Hanlon, B.W., Bhatti, J.A., et al.: GPS spoofing detection via Dual-Receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 49(4), 2250–2267 (2013)

    Article  Google Scholar 

  6. Yangy, K., Luoz, Z.-Q.: Robust target localization with multiple sensors using time difference of arrivals. In: Radar Conference, pp. 1–6. IEEE, Rome (2008)

    Google Scholar 

  7. Jansen, K., Tippenhauer, N.O., Pőpper, C.: Multi-receiver GPS spoofing detection: error models and realization. In: Annual Conference on Computer Security Applications, pp. 237–250. ACM, California (2016)

    Google Scholar 

  8. Tippenhauer, N.O., Pőpper, C., Rasmussen, K.B., Capkun, S.: On the requirements for successful GPS spoofing attacks. In: Computer and Communications Security, pp. 75–86. ACM, Illinois (2011)

    Google Scholar 

  9. Jansen, K., Schafer, M., Lenders, V., Pőpper, C., Schmitt, J.: POSTER: localization of spoofing devices using a Large-scale air traffic surveillance system. In: Asia Conference on Computer and Communications Security, pp. 914–916. ACM, Abu Dhabi (2017)

    Google Scholar 

  10. Hamelmann, P., Vullings, R., Mischi, M., et al.: An extended Kalman filter for fetal heart location estimation during Doppler-based heart rate monitoring. IEEE Trans. Instrum. Measur. 1–11 (2018)

    Google Scholar 

  11. Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J., Lachapelle, G.: GPS vulnerability to spoofing threats and a review of antispoofing techniques. Int. J. Navig. Obs. 2012, 1–16 (2012)

    Google Scholar 

  12. Psiaki, M.L., Humphreys, T.E., Stauer, B.: Attackers can spoof navigation signals without our knowledge. Here’s how to fight back GPS lies. IEEE Spectr. 53(8), 26–53 (2016)

    Article  Google Scholar 

  13. He, L., Li, W., Guo, C., Niu, R.: Civilian unmanned aerial vehicle vulnerability to GPS spooing attacks. In: International Symposium on Computational Intelligence and Design, pp. 212–215. IEEE, Hangzhou (2015)

    Google Scholar 

  14. Wesson, K.D., Rothlisberger, M., Humphreys, T.E.: Practical cryptographic civil GPS signal authentication. Navigation 59(3), 177–193 (2012)

    Article  Google Scholar 

  15. O’Hanlon, B.W., Psiaki, M.L., Bhatti, J.A., et al.: Real-time GPS spoofing detection via correlation of encrypted signals. Navigation 60(4), 267–278 (2013)

    Article  Google Scholar 

  16. Kerns, A.J., Wesson, K.D., Humphreys, T.E.: A blueprint for civil GPS navigation message authentication. In: Position, Location and Navigation Symposium, pp. 262–269. IEEE, Monterey (2014)

    Google Scholar 

  17. Tang, Y., Hu, Y., Cui, J., et al.: Vision-Aided multi-UAV autonomous flocking in GPS-denied environment. IEEE Trans. Ind. Electron. 66(1), 616–626 (2019)

    Article  Google Scholar 

  18. Humphreys, T.E.: Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans. Aerosp. Electron. Syst. 49(2), 1073–1090 (2013)

    Article  Google Scholar 

  19. Yin, S., Zhao, Y., Li, L.: Resource allocation and basestation placement in cellular networks with wireless powered UAVs. IEEE Trans. Veh. Technol. 68(1), 1050–1055 (2019)

    Article  Google Scholar 

  20. Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258–1270 (2016)

    Article  Google Scholar 

  21. Zhang, Z., Trinkle, M., Qian, L., Li, H.: Quickest detection of GPS spoofing attack. In: Military Communications Conference, pp. 1–6. IEEE, Orlando (2012)

    Google Scholar 

  22. Chan, Y.-T., Ho, K.: A simple and efficient estimator for hyperbolic location. IEEE Trans. Sig. Process. 42(8), 1905–1915 (1994)

    Article  Google Scholar 

  23. Ho, K.O., Lu, X., Kovavisaruch, L.: Source localization using TDOA and FDOA measurements in the presence of receiver location errors: analysis and solution. IEEE Trans. Sig. Process. 55(2), 684–696 (2007)

    Article  MathSciNet  Google Scholar 

  24. Yang, K., An, J.P., Bu, X.Y., Sun, G.C.: Constrained total least-squares location algorithm using Time-Difference-of-Arrival measurements. IEEE Trans. Veh. Technol. 59(3), 1558–1562 (2010)

    Article  Google Scholar 

  25. Jansen, K., Scha̋fer, M., Moser, D., et al.: Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. In: Security and Privacy, pp. 1018–1031. IEEE, San Francisco (2018)

    Google Scholar 

  26. Fadlullah, Z.M., Takaishi, D., Nishiyama, H., et al.: A dynamic trajectory control algorithm for improving the communication throughput and delay in UAV-aided networks. IEEE Netw. 30(1), 100–105 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

This work were supported by National Natural Science Foundation of China (Grant Nos. U1708262, U1736203, 61772173, 61672413).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xinghua Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Liang, C. et al. (2019). Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. In: Chen, X., Huang, X., Zhang, J. (eds) Machine Learning for Cyber Security. ML4CS 2019. Lecture Notes in Computer Science(), vol 11806. Springer, Cham. https://doi.org/10.1007/978-3-030-30619-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30619-9_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30618-2

  • Online ISBN: 978-3-030-30619-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics