TY - GEN
T1 - Drive me not: GPS spoofing detection via cellular network (architectures, models, and experiments)
AU - Oligeri, Gabriele
AU - Sciancalepore, Savio
AU - Ibrahim, Omar Adel
AU - Di Pietro, Roberto
N1 - Generated from Scopus record by KAUST IRTS on 2023-09-20
PY - 2019/5/15
Y1 - 2019/5/15
N2 - The Global Positioning System (GPS) has been proved to be exposed to several cybersecurity attacks, due to its intrinsic insecure design. GPS spoofing is one of the most easiest, cheap, and dreadful attacks that can be delivered: fake GPS signals can be sent to a target device and make it moving according to a pre-computed path. Although some proposals exist to discriminate between legitimate and rogue GPS signals, those solutions are still difficult to deploy, since they resort to special hardware capable of identifying physical properties of original GPS signals. In this paper, we propose a brand new approach, exploiting the broadcast signals transmitted by the mobile cellular network infrastructure to validate the position received by the GPS infrastructure. In detail, we provide several contributions: (i) the architecture of our solution; (ii) the analytic models related to the GSM infrastructure, including the number of in-range base stations, the distance to the base stations, and the received signal strength; and, (iii) the results achieved via an extensive measurement campaign, carried out by first collecting GPS signals while driving for more than 158 Km, and then using these data to build an experimental model for the evaluation of the performance of our technique in the detection of a wide number of emulated spoofing attacks. Finally, we also tested our solution against a real GPS spoofing attack. We proved it being able to guarantee 0% false positive and 100% detection with an almost negligible delay-all the system parameters being finely tunable, allowing for a wide range of possible trade-offs.
AB - The Global Positioning System (GPS) has been proved to be exposed to several cybersecurity attacks, due to its intrinsic insecure design. GPS spoofing is one of the most easiest, cheap, and dreadful attacks that can be delivered: fake GPS signals can be sent to a target device and make it moving according to a pre-computed path. Although some proposals exist to discriminate between legitimate and rogue GPS signals, those solutions are still difficult to deploy, since they resort to special hardware capable of identifying physical properties of original GPS signals. In this paper, we propose a brand new approach, exploiting the broadcast signals transmitted by the mobile cellular network infrastructure to validate the position received by the GPS infrastructure. In detail, we provide several contributions: (i) the architecture of our solution; (ii) the analytic models related to the GSM infrastructure, including the number of in-range base stations, the distance to the base stations, and the received signal strength; and, (iii) the results achieved via an extensive measurement campaign, carried out by first collecting GPS signals while driving for more than 158 Km, and then using these data to build an experimental model for the evaluation of the performance of our technique in the detection of a wide number of emulated spoofing attacks. Finally, we also tested our solution against a real GPS spoofing attack. We proved it being able to guarantee 0% false positive and 100% detection with an almost negligible delay-all the system parameters being finely tunable, allowing for a wide range of possible trade-offs.
UR - https://dl.acm.org/doi/10.1145/3317549.3319719
UR - http://www.scopus.com/inward/record.url?scp=85066730640&partnerID=8YFLogxK
U2 - 10.1145/3317549.3319719
DO - 10.1145/3317549.3319719
M3 - Conference contribution
SN - 9781450367264
SP - 12
EP - 22
BT - WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks
PB - Association for Computing Machinery, [email protected]
ER -