Skip to main content
Top
Published in: Distributed and Parallel Databases 1/2021

24-06-2020

GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data

Published in: Distributed and Parallel Databases | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

GPS-dependent localization, tracking and navigation applications have a significant impact on the modern aviation industry. However, the lack of encryption and authentication makes GPS vulnerable for spoofing attacks with the purpose of hijacking aircrafts or threatening air safety. In this paper, we propose GPS-Probe, a GPS spoofing detection algorithm which leverages the air traffic control (ATC) messages periodically broadcasted by aircrafts. By exploiting the received signal strength indicator (RSSI) and the timestamps at server (TSS) of the ATC messages monitored by multiple ground sensors, GPS-Probe constructs a machine learning enabled framework which can estimate the real position of the target aircraft and then detect whether GPS is spoofed or not. Unlike existing techniques, GPS-Probe neither requires any updates of the GPS infrastructure nor of the GPS receivers. It also releases the requirement on the time synchronization of the ground sensors distributed around the world. We further present GPS-Probe-Plus by incorporating a flight height estimation module and a calibration method for RSSI and TSS values, which performs better on both target localization and spoofing detection than GPS-Probe. Using the real-world ATC data crowdsourced by OpenSky Network, our experiment results show that GPS-Probe (resp. GPS-Probe-Plus) can achieve an average detection accuracy and precision, of 81.7% (resp. 86.8%) and 85.3% (resp. 91.2%), respectively, significantly outperforming the state-of-the-arts.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Liu, G., Zhang, R., Wang, C., Liu, L.: Synchronization-free GPS spoofing detection with crowdsourced air traffic control data. In: Proceedings of 20th IEEE MDM, pp. 260–268 (2019) Liu, G., Zhang, R., Wang, C., Liu, L.: Synchronization-free GPS spoofing detection with crowdsourced air traffic control data. In: Proceedings of 20th IEEE MDM, pp. 260–268 (2019)
2.
go back to reference Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, New York (2012) Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, New York (2012)
3.
4.
go back to reference Wang, C., Lin, H., Jiang, H.: CANS: towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Trans. Mob. Comput. 15(5), 1077–1089 (2016)CrossRef Wang, C., Lin, H., Jiang, H.: CANS: towards congestion-adaptive and small stretch emergency navigation with wireless sensor networks. IEEE Trans. Mob. Comput. 15(5), 1077–1089 (2016)CrossRef
5.
go back to reference Zhang, W., Li, M., Tandon, R., Li, H.: Online location trace privacy: an information theoretic approach. IEEE Trans. Inf. Forensics Secur. 14(1), 235–250 (2019)CrossRef Zhang, W., Li, M., Tandon, R., Li, H.: Online location trace privacy: an information theoretic approach. IEEE Trans. Inf. Forensics Secur. 14(1), 235–250 (2019)CrossRef
6.
go back to reference Tang, J., Chen, G., Coon, J.P.: Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers. IEEE Trans. Inf. Forensics Secur. 14(11), 3026–3041 (2019)CrossRef Tang, J., Chen, G., Coon, J.P.: Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers. IEEE Trans. Inf. Forensics Secur. 14(11), 3026–3041 (2019)CrossRef
7.
go back to reference Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258–1270 (2016)CrossRef Psiaki, M.L., Humphreys, T.E.: GNSS spoofing and detection. Proc. IEEE 104(6), 1258–1270 (2016)CrossRef
8.
go back to reference Moser, D., Leu, P., Lenders, V., Ranganathan, A., Ricciato, F., Capkun, S.: Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. In: Proceedings of ACM MobiCom, pp. 375–386 (2016) Moser, D., Leu, P., Lenders, V., Ranganathan, A., Ricciato, F., Capkun, S.: Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. In: Proceedings of ACM MobiCom, pp. 375–386 (2016)
9.
go back to reference Schmidt, E., Ruble, Z., Akopian, D., Pack, D.J.: Software-defined radio GNSS instrumentation for spoofing mitigation: a review and a case study. IEEE Trans. Instrum. Meas. 68(8), 2768–2784 (2019)CrossRef Schmidt, E., Ruble, Z., Akopian, D., Pack, D.J.: Software-defined radio GNSS instrumentation for spoofing mitigation: a review and a case study. IEEE Trans. Instrum. Meas. 68(8), 2768–2784 (2019)CrossRef
10.
go back to reference Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O’Hanlon, B.W., Kintner, P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Proceedings on Radionavigation Laboratory Conference (2008) Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O’Hanlon, B.W., Kintner, P.M.: Assessing the spoofing threat: development of a portable GPS civilian spoofer. In: Proceedings on Radionavigation Laboratory Conference (2008)
11.
go back to reference Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617–636 (2014)CrossRef Kerns, A.J., Shepard, D.P., Bhatti, J.A., Humphreys, T.E.: Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 31(4), 617–636 (2014)CrossRef
12.
go back to reference Psiaki, M.L., Humphreys, T.E., Stauffer, B.: Attackers can spoof navigation signals without our knowledge. Here’s how to fight back GPS lies. IEEE Spectr. 53(8), 26–53 (2016)CrossRef Psiaki, M.L., Humphreys, T.E., Stauffer, B.: Attackers can spoof navigation signals without our knowledge. Here’s how to fight back GPS lies. IEEE Spectr. 53(8), 26–53 (2016)CrossRef
13.
go back to reference Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., Jiang, H.: ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 1033–1042 (2018)CrossRef Zhao, P., Li, J., Zeng, F., Xiao, F., Wang, C., Jiang, H.: ILLIA: enabling k-anonymity-based privacy preserving against location injection attacks in continuous LBS queries. IEEE Internet Things J. 5(2), 1033–1042 (2018)CrossRef
14.
go back to reference Wesson, K.D., Gross, J.N., Humphreys, T.E., Evans, B.L.: GNSS signal authentication via power and distortion monitoring. IEEE Trans. Aerosp. Electron. Syst. 54(2), 739–754 (2018)CrossRef Wesson, K.D., Gross, J.N., Humphreys, T.E., Evans, B.L.: GNSS signal authentication via power and distortion monitoring. IEEE Trans. Aerosp. Electron. Syst. 54(2), 739–754 (2018)CrossRef
15.
go back to reference Heng, L., Work, D.B., Gao, G.X.: GPS signal authentication from cooperative peers. IEEE Trans. Intell. Transp. Syst. 16(4), 1794–1805 (2015)CrossRef Heng, L., Work, D.B., Gao, G.X.: GPS signal authentication from cooperative peers. IEEE Trans. Intell. Transp. Syst. 16(4), 1794–1805 (2015)CrossRef
16.
go back to reference Wesson, K., Rothlisberger, M., Humphreys, T.: Practical cryptographic civil GPS signal authentication. Navigation 59(3), 177–193 (2012)CrossRef Wesson, K., Rothlisberger, M., Humphreys, T.: Practical cryptographic civil GPS signal authentication. Navigation 59(3), 177–193 (2012)CrossRef
17.
go back to reference Montgomery, P.Y.: Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: Proceedings of Radionavigation Laboratory Conference (2011) Montgomery, P.Y.: Receiver-autonomous spoofing detection: experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In: Proceedings of Radionavigation Laboratory Conference (2011)
18.
go back to reference Nielsen, J., Broumandan, A., Lachapelle, G.: GNSS spoofing detection for single antenna handheld receivers. Navigation 58(4), 335–344 (2011)CrossRef Nielsen, J., Broumandan, A., Lachapelle, G.: GNSS spoofing detection for single antenna handheld receivers. Navigation 58(4), 335–344 (2011)CrossRef
19.
go back to reference Psiaki, M.L., Powell, S.P., O’hanlon, B.W.: GNSS spoofing detection using high-frequency antenna motion and carrier-phase data. In: Proceedings of the ION GNSS Meeting, pp. 2949–2991 (2013) Psiaki, M.L., Powell, S.P., O’hanlon, B.W.: GNSS spoofing detection using high-frequency antenna motion and carrier-phase data. In: Proceedings of the ION GNSS Meeting, pp. 2949–2991 (2013)
20.
go back to reference Akos, D.M.: Who’s afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). Navigation 59(4), 281–290 (2012)CrossRef Akos, D.M.: Who’s afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). Navigation 59(4), 281–290 (2012)CrossRef
21.
go back to reference Jansen, K., Schäfer, M., Moser, D., Lenders, V., Pöpper, C., Schmitt, J.: Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. In: Proceedings of IEEE S&P, pp. 1018–1031 (2018) Jansen, K., Schäfer, M., Moser, D., Lenders, V., Pöpper, C., Schmitt, J.: Crowd-GPS-Sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks. In: Proceedings of IEEE S&P, pp. 1018–1031 (2018)
22.
go back to reference Xu, B., Sun, G., Yu, R., Yang, Z.: High-accuracy TDOA-based localization without time synchronization. IEEE Trans. Parallel Distrib. Syst. 24(8), 1567–1576 (2013)CrossRef Xu, B., Sun, G., Yu, R., Yang, Z.: High-accuracy TDOA-based localization without time synchronization. IEEE Trans. Parallel Distrib. Syst. 24(8), 1567–1576 (2013)CrossRef
23.
go back to reference Schäfer, M., Strohmeier, M., Lenders, V., Martinovic, I., Wilhelm, M.: Bringing up OpenSky: a large-scale ADS-B sensor network for research. In: Proceedings of ACM/IEEE IPSN, pp. 83–94 (2014) Schäfer, M., Strohmeier, M., Lenders, V., Martinovic, I., Wilhelm, M.: Bringing up OpenSky: a large-scale ADS-B sensor network for research. In: Proceedings of ACM/IEEE IPSN, pp. 83–94 (2014)
24.
go back to reference Tippenhauer, N.O., Pöpper, C., Rasmussen, K.B., Čapkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of ACM CCS, pp. 75–85 (2011) Tippenhauer, N.O., Pöpper, C., Rasmussen, K.B., Čapkun, S.: On the requirements for successful GPS spoofing attacks. In: Proceedings of ACM CCS, pp. 75–85 (2011)
25.
go back to reference Nolan, M.: Fundamentals of Air Traffic Control. Cengage Learning, Boston (2010) Nolan, M.: Fundamentals of Air Traffic Control. Cengage Learning, Boston (2010)
26.
go back to reference Trüb, R., Moser, D., Schäfer, M., Pinheiro, R., Lenders, V.: Monitoring meteorological parameters with crowdsourced air traffic control data. In: Proceedings of ACM/IEEE IPSN, pp. 25–36 (2018) Trüb, R., Moser, D., Schäfer, M., Pinheiro, R., Lenders, V.: Monitoring meteorological parameters with crowdsourced air traffic control data. In: Proceedings of ACM/IEEE IPSN, pp. 25–36 (2018)
27.
go back to reference Zheng, Y., Liu, Y., Zhou, Z.: From RSSI to CSI: indoor localization via channel response. ACM Comput. Surv. 46(2), 1–32 (2013)MATH Zheng, Y., Liu, Y., Zhou, Z.: From RSSI to CSI: indoor localization via channel response. ACM Comput. Surv. 46(2), 1–32 (2013)MATH
28.
go back to reference Chen, T., Guestrin, C.: XGBoost: A scalable tree boosting system. In: Proceedings of ACM SIGKDD, pp. 785–794 (2016) Chen, T., Guestrin, C.: XGBoost: A scalable tree boosting system. In: Proceedings of ACM SIGKDD, pp. 785–794 (2016)
29.
go back to reference Liu, X., Cao, J., Tang, S., Wen, J., Guo, P.: Contactless respiration monitoring via off-the-shelf WiFi devices. IEEE Trans. Mob. Comput. 15(10), 2466–2479 (2016)CrossRef Liu, X., Cao, J., Tang, S., Wen, J., Guo, P.: Contactless respiration monitoring via off-the-shelf WiFi devices. IEEE Trans. Mob. Comput. 15(10), 2466–2479 (2016)CrossRef
30.
go back to reference Strohmeier, M., Lenders, V., Martinovic, I.: A localization approach for crowdsourced air traffic communication networks. arXiv preprint arXiv:1610.06754 (2016) Strohmeier, M., Lenders, V., Martinovic, I.: A localization approach for crowdsourced air traffic communication networks. arXiv preprint arXiv:​1610.​06754 (2016)
32.
go back to reference Hernández, J.A., Phillips, I.W.: Weibull mixture model to characterise end-to-end internet delay at coarse time-scales. IEE Proc. Commun. 153(2), 295–304 (2006)CrossRef Hernández, J.A., Phillips, I.W.: Weibull mixture model to characterise end-to-end internet delay at coarse time-scales. IEE Proc. Commun. 153(2), 295–304 (2006)CrossRef
33.
go back to reference Van Brummelen, G.: Heavenly Mathematics: The Forgotten Art of Spherical Trigonometry. Princeton University Press, Princeton (2012)CrossRef Van Brummelen, G.: Heavenly Mathematics: The Forgotten Art of Spherical Trigonometry. Princeton University Press, Princeton (2012)CrossRef
34.
go back to reference Ranganathan, A., Ólafsdóttir, H., Capkun, S.: Spree: a spoofing resistant GPS receiver. In: Proceedings of ACM MobiCom, pp. 348–360 (2016) Ranganathan, A., Ólafsdóttir, H., Capkun, S.: Spree: a spoofing resistant GPS receiver. In: Proceedings of ACM MobiCom, pp. 348–360 (2016)
35.
go back to reference Psiaki, M.L., O’Hanlon, B.W., Bhatti, J.A., Shepard, D.P., Humphreys, T.E.: GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 49(4), 2250–2267 (2013)CrossRef Psiaki, M.L., O’Hanlon, B.W., Bhatti, J.A., Shepard, D.P., Humphreys, T.E.: GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 49(4), 2250–2267 (2013)CrossRef
36.
go back to reference Psiaki, M.L., O’hanlon, B.W., Powell, S.P., Bhatti, J.A., Wesson, K.D., Humphreys, T.E.: GNSS spoofing detection using two-antenna differential carrier phase. In: Proceedings of Radionavigation Laboratory Conference (2014) Psiaki, M.L., O’hanlon, B.W., Powell, S.P., Bhatti, J.A., Wesson, K.D., Humphreys, T.E.: GNSS spoofing detection using two-antenna differential carrier phase. In: Proceedings of Radionavigation Laboratory Conference (2014)
37.
go back to reference Bhamidipati, S., Kim, K.J., Sun, H., Orlik, P.V.: GPS spoofing detection and mitigation in pmus using distributed multiple directional antennas. In: Proceedings of IEEE ICC, pp. 1–7 (2019) Bhamidipati, S., Kim, K.J., Sun, H., Orlik, P.V.: GPS spoofing detection and mitigation in pmus using distributed multiple directional antennas. In: Proceedings of IEEE ICC, pp. 1–7 (2019)
38.
go back to reference Jansen, K., Tippenhauer, N.O., Pöpper, C.: Multi-receiver GPS spoofing detection: error models and realization. In: Proceedings of ACM ACSAC, pp. 237–250 (2016) Jansen, K., Tippenhauer, N.O., Pöpper, C.: Multi-receiver GPS spoofing detection: error models and realization. In: Proceedings of ACM ACSAC, pp. 237–250 (2016)
39.
go back to reference Wang, Q., Lu, Z., Gao, M., Qu, G.: Edge computing based gps spoofing detection methods. In: Proceedings of IEEE DSP, pp. 1–5 (2018) Wang, Q., Lu, Z., Gao, M., Qu, G.: Edge computing based gps spoofing detection methods. In: Proceedings of IEEE DSP, pp. 1–5 (2018)
40.
go back to reference Jiang, C., Chen, S., Chen, Y., Bo, Y., Xia, Q., Zhang, B.: Analysis of the baseline data based GPS spoofing detection algorithm. In: Proceedings of IEEE/ION PLANS, pp. 397–403 (2018) Jiang, C., Chen, S., Chen, Y., Bo, Y., Xia, Q., Zhang, B.: Analysis of the baseline data based GPS spoofing detection algorithm. In: Proceedings of IEEE/ION PLANS, pp. 397–403 (2018)
41.
go back to reference Magiera, J., Katulski, R.: Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 13(1), 45–57 (2015)CrossRef Magiera, J., Katulski, R.: Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 13(1), 45–57 (2015)CrossRef
Metadata
Title
GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data
Publication date
24-06-2020
Published in
Distributed and Parallel Databases / Issue 1/2021
Print ISSN: 0926-8782
Electronic ISSN: 1573-7578
DOI
https://doi.org/10.1007/s10619-020-07302-1

Other articles of this Issue 1/2021

Distributed and Parallel Databases 1/2021 Go to the issue

Premium Partner