2023
DOI: 10.1109/access.2023.3241236
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Detection of Location Spoofing and Variation Attacks

Abstract: Location spoofing is a critical attack in mobile communications. While several previous studies investigated the detection of location spoofing attacks, they are limited in their performance and lack the consideration of emerging attack variations. In this paper, we present a data-driven methodology for the reliable detection of location spoofing and its variations. To enhance the performance, we introduce and utilize a new set of features, which is differential in nature and enables the checking of the mobili… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 37 publications
0
13
0
Order By: Relevance
“…Type-16 BCM RF-FV2 1.0000 0.9990 0.9999 0.9970 0.9989 0.9986 [30] 0.9564 0.7543 0.9116 0.9177 0.8403 0.8838 [31] 0.9680 0.7795 0.9713 0.9704 0.8403 0.9082 [32] -0.9501 ---- [33] 0.8566 0.8680 0.8466 0.8410 0.8663 - [34] -----0.7990 [35] -----0.9910…”
Section: Testing Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Type-16 BCM RF-FV2 1.0000 0.9990 0.9999 0.9970 0.9989 0.9986 [30] 0.9564 0.7543 0.9116 0.9177 0.8403 0.8838 [31] 0.9680 0.7795 0.9713 0.9704 0.8403 0.9082 [32] -0.9501 ---- [33] 0.8566 0.8680 0.8466 0.8410 0.8663 - [34] -----0.7990 [35] -----0.9910…”
Section: Testing Resultsmentioning
confidence: 99%
“…Kin et al [35] trained different models using Extreme Gradient Boosting (XGB), Multi-layer Perceptron (MLP), KNN, SVM, and RF algorithms to evaluate the performance of two different feature sets, named (Basic and Ext). In the "Basic" feature set, all the features in two consecutive BSMs -from the same senderare combined in one feature set for each message.…”
Section: Ml-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…A new cognitive closed‐loop system was developed in Benlloch‐Caballero et al 34 to provide distributed dual‐layer self‐protection capabilities. Comparative analysis of federated deep learning approaches was introduced in Kim et al 35 for higher accuracy in detecting attacks. The data‐driven methodology was presented in Ferrag et al 36 for discovering location spoofing attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The method can detect simple spoofing attacks, but a complex spoofing attack, such as a turn-by-turn attack or a wrong-turn attack, cannot be detected. Dasgupta et al proposed a data-driven approach to reliably detect network attacks generated by location spoofing [77].…”
Section: B: For Location Spoofing Attackmentioning
confidence: 99%