2018 IEEE Symposium on Security and Privacy (SP) 2018
DOI: 10.1109/sp.2018.00012
|View full text |Cite
|
Sign up to set email alerts
|

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Abstract: The aviation industry's increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requires any updates of the GPS infrastructure nor of the airborne GPS receivers, which are both unlikely to happen in the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 102 publications
(57 citation statements)
references
References 25 publications
0
48
0
Order By: Relevance
“…Different techniques have been proposed in literature to defend against GPS spoofing attacks with a focus on attack detection [16]- [20]. In [16], different techniques are discussed that can enable a UAV's receiver to detect the spoofing attacks.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Different techniques have been proposed in literature to defend against GPS spoofing attacks with a focus on attack detection [16]- [20]. In [16], different techniques are discussed that can enable a UAV's receiver to detect the spoofing attacks.…”
Section: A Related Workmentioning
confidence: 99%
“…In [21], automatic gain control is used within the GPS receiver to detect and flag potential spoofing attacks within a low computational complexity framework. Finally, the work in [20] proposed a technique that allows UAVs to detect GPS spoofers by using an independent ground infrastructure that continuously analyzes the contents and times of arrival of the estimated UAV positions. The proposed technique was shown to be effective in detecting the spoofing attacks in less than two seconds and to determine the spoofer's location after 15 minutes of monitoring time, with an accuracy of up 150 meters.…”
Section: Arxiv:190411568v3 [Cssy] 29 Dec 2019mentioning
confidence: 99%
“…Volunteers around the world set up and operate large numbers of receivers for transponder signals and send the live tracking data to a central server via the Internet. This approach has been used to improve the security in GPS [26].…”
Section: Secure Location Verification Technologymentioning
confidence: 99%
“…the OpenSky Network [20], Flightaware [5], Flightradar24 [6] and many others. These sensor networks can leverage the time-of-arrival (TOA) of Mode S signals for various kinds of applications, including aircraft localization [20,22], air traffic data verification [13,16,17,19,21], and self-localization [15]. In those applications, a set of cooperating receivers measure locally the TOA of the arriving signals and then send these data to a central computation server.…”
Section: Introductionmentioning
confidence: 99%