GPS spoofing detection via crowd-sourced information for connected vehicles

Gabriele Oligeri*, Savio Sciancalepore, Omar Adel Ibrahim, Roberto Di Pietro

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

Modern vehicular systems rely on the Global Positioning System (GPS) technology to provide accurate and timely services. However, the GPS has been proved to be characterized by an intrinsic insecure design, thus being subject to several security attacks. Current solutions can reliably detect GPS spoofing attacks leveraging the physical features of the received GPS signals or resorting to multiple antennas. However, these techniques cannot be deployed when the physical properties of the received signals cannot be accessed, which is the most general case for commercial GPS receivers. Alternative solutions in the literature rely on the cross-check of the received signal with information coming from additional sources. However, such proposals are typically limited to a single source, are rarely supported by experimental results, and do not provide insights on the impact of several parameters, such as detection accuracy, time, false-positives, and robustness to malicious information. To overcome the cited limitations, in this paper, we propose an innovative approach, resorting to combined crowd-sourced information from the mobile cellular infrastructure and the WiFi networks to detect GPS spoofing attacks. Our analysis leverages an extensive experimental dataset, available online for the research community, gathered by driving around a car in urban, suburban, and rural scenarios, for around 5 h and covering more than 196 km. Our solution allows for a tunable tradeoff between detection delay and false positive; for instance, we can detect an attack in approximately 6 s, when leveraging the information coming from only the WiFi, while the delay increases to 30 s when using the information from the mobile cellular network, still achieving a false positive probability strictly less than 0.01. We also show the limitations and trade-offs of our approach, in terms of minimum detection accuracy, time, and robustness to malicious information. The data adopted in this work are publicly released to allow results replicability and foster further research in the highlighted directions.

Original languageEnglish (US)
Article number109230
JournalComputer Networks
Volume216
DOIs
StatePublished - Oct 24 2022

Bibliographical note

Funding Information:
This publication was partially supported by awards NPRP12S-0125-190013 , NPRP-S-11-0109-180242 , NPRP12C-0814-190012 and GSRA6-1-0528-19046 , from the QNRF-Qatar National Research Fund , a member of The Qatar Foundation. This work has been partially supported also by the INTERSECT project, Grant No. NWA.1162.18.301 , funded by Netherlands Organisation for Scientific Research (NWO) . The information and views set out in this publication are those of the authors and do not necessarily reflect the official opinion of the QNRF.

Publisher Copyright:
© 2022 The Author(s)

Keywords

  • Connected vehicles
  • Crowd-sourcing
  • GPS spoofing detection
  • Mobile IoT
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'GPS spoofing detection via crowd-sourced information for connected vehicles'. Together they form a unique fingerprint.

Cite this