skip to main content

Attention:

The NSF Public Access Repository (NSF-PAR) system and access will be unavailable from 11:00 PM ET on Thursday, May 23 until 2:00 AM ET on Friday, May 24 due to maintenance. We apologize for the inconvenience.


Title: A Reinforcement Learning Approach for Global Navigation Satellite System Spoofing Attack Detection in Autonomous Vehicles
A resilient positioning, navigation, and timing (PNT) system is a necessity for the robust navigation of autonomous vehicles (AVs). A global navigation satellite system (GNSS) provides satellite-based PNT services. However, a spoofer can tamper the authentic GNSS signal and could transmit wrong position information to an AV. Therefore, an AV must have the capability of real-time detection of spoofing attacks related to PNT receivers, whereby it will help the end-user (the AV in this case) to navigate safely even if the GNSS is compromised. This paper aims to develop a deep reinforcement learning (RL)-based turn-by-turn spoofing attack detection method using low-cost in-vehicle sensor data. We have utilized the Honda Research Institute Driving Dataset to create attack and non-attack datasets to develop a deep RL model and have evaluated the performance of the deep RL-based attack detection model. We find that the accuracy of the deep RL model ranges from 99.99% to 100%, and the recall value is 100%. Furthermore, the precision ranges from 93.44% to 100%, and the f1 score ranges from 96.61% to 100%. Overall, the analyses reveal that the RL model is effective in turn-by-turn spoofing attack detection.  more » « less
Award ID(s):
2104999
NSF-PAR ID:
10396882
Author(s) / Creator(s):
; ;
Date Published:
Journal Name:
Transportation Research Record: Journal of the Transportation Research Board
Volume:
2676
Issue:
12
ISSN:
0361-1981
Page Range / eLocation ID:
318 to 330
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract

    Global Navigation Satellite System (GNSS) is pervasively used in position, navigation, and timing (PNT) applications. As a consequence, important assets have become vulnerable to intentional attacks on GNSS, where of particular relevance is spoofing transmissions that aim at superseding legitimate signals with forged ones in order to control a receiver’s PNT computations. Detecting such attacks is therefore crucial, and this article proposes to employ an algorithm based on deep learning to achieve the task. A data-driven classifier is considered that has two components: a deep learning model that leverages parallelization to reduce its computational complexity and a clustering algorithm that estimates the number and parameters of the spoofing signals. Based on the experimental results, it can be concluded that the proposed scheme exhibits superior performance compared to the existing solutions, especially under moderate-to-high signal-to-noise ratios.

     
    more » « less
  2. In Global Navigation Satellite System (GNSS), a spoofing attack consists of forged signals which possibly cause the attacked receivers to deduce a false position, a false clock, or both. In contrast to simplistic spoofing, the induced spoofing captures the victim tracking loops by gradually adjusting it’s parameters, e.g., code phase and power. Then the victims smoothly deviates from the correct position or timing. Therefore, it is more difficult to detect the induced spoofing than the simplistic one. In this paper, by utilizing the dynamic nature of such gradual adjustment process, an induced spoofing detection method is proposed based on the S-curve-bias (SCB). Firstly, SCB in the inducing process is theoretically derived. Then, in order to detect the induced spoofing, a detection metric is defined. After that, a series of experiments using the Texas spoofing test battery (TEXBAT) are performed to demonstrate the effectiveness of the proposed algorithm. 
    more » « less
  3. Unmanned aerial vehicles (UAVs) must keep track of their location in order to maintain flight plans. Currently, this task is almost entirely performed by a combination of Inertial Measurement Units (IMUs) and reference to GNSS (Global Navigation Satellite System). Navigation by GNSS, however, is not always reliable, due to various causes both natural (reflection and blockage from objects, technical fault, inclement weather) and artificial (GPS spoofing and denial). In such GPS-denied situations, it is desirable to have additional methods for aerial geolocalization. One such method is visual geolocalization, where aircraft use their ground facing cameras to localize and navigate. The state of the art in many ground-level image processing tasks involve the use of Convolutional Neural Networks (CNNs). We present here a study of how effectively a modern CNN designed for visual classification can be applied to the problem of Absolute Visual Geolocalization (AVL, localization without a prior location estimate). An Xception based architecture is trained from scratch over a >1000 km2 section of Washington County, Arkansas to directly regress latitude and longitude from images from different orthorectified high-altitude survey flights. It achieves average localization accuracy on unseen image sets over the same region from different years and seasons with as low as 115 m average error, which localizes to 0.004% of the training area, or about 8% of the width of the 1.5 × 1.5 km input image. This demonstrates that CNNs are expressive enough to encode robust landscape information for geolocalization over large geographic areas. Furthermore, discussed are methods of providing uncertainty for CNN regression outputs, and future areas of potential improvement for use of deep neural networks in visual geolocalization. 
    more » « less
  4. Location information is critical to a wide variety of navigation and tracking applications. GPS, today's de-facto outdoor localization system has been shown to be vulnerable to signal spoofing attacks. Inertial Navigation Systems (INS) are emerging as a popular complementary system, especially in road transportation systems as they enable improved navigation and tracking as well as offer resilience to wireless signals spoofing and jamming attacks. In this paper, we evaluate the security guarantees of INS-aided GPS tracking and navigation for road transportation systems. We consider an adversary required to travel from a source location to a destination and monitored by an INS-aided GPS system. The goal of the adversary is to travel to alternate locations without being detected. We develop and evaluate algorithms that achieve this goal, providing the adversary significant latitude. Our algorithms build a graph model for a given road network and enable us to derive potential destinations an attacker can reach without raising alarms even with the INS-aided GPS tracking and navigation system. The algorithms render the gyroscope and accelerometer sensors useless as they generate road trajectories indistinguishable from plausible paths (both in terms of turn angles and roads curvature). We also design, build and demonstrate that the magnetometer can be actively spoofed using a combination of carefully controlled coils. To experimentally demonstrate and evaluate the feasibility of the attack in real-world, we implement a first real-time integrated GPS/INS spoofer that accounts for traffic fluidity, congestion, lights, and dynamically generates corresponding spoofing signals. Furthermore, we evaluate our attack on ten different cities using driving traces and publicly available city plans. Our evaluations show that it is possible for an attacker to reach destinations that are as far as 30 km away from the actual destination without being detected. We also show that it is possible for the adversary to reach almost 60--80% of possible points within the target region in some cities. Such results are only a lower-bound, as an adversary can adjust our parameters to spend more resources (e.g., time) on the target source/destination than we did for our performance evaluations of thousands of paths. We propose countermeasures that limit an attacker's ability, without the need for any hardware modifications. Our system can be used as the foundation for countering such attacks, both detecting and recommending paths that are difficult to spoof. 
    more » « less
  5. Abstract

    After sunset, in the equatorial regions ionospheric plasma irregularities are generated due to the generalized Rayleigh‐Taylor instability. Under favorable conditions these irregularities develop in the equatorial region while mapping along the magnetic field lines giving rise to large plasma depletion structures called Equatorial Plasma Bubbles with embedded smaller structures on their walls. The global navigation satellite system (GNSS) L1 band frequency is sensitive to irregularities of the size of 300–400 m in the first Fresnel zone, which cause scattering and diffraction of the signal and produce amplitude and/or phase scintillation. Severe scintillation of GNSS signals can in turn cause loss of lock of the receiver code and/or carrier loops. As a result, GNSS navigation and positioning solution can be adversely affected by the ionospheric scintillation. There are multiple GNSS receivers designed to monitor scintillations. These receivers are based on different hardware designs and use different methodologies to process the raw data. When using simultaneous data from different GNSS scintillation monitors it is important to evaluate and compare their performances under similar scintillation conditions. The scintillation monitoring techniques may be useful for many applications that use GNSS signal. The aim of this work is to evaluate the performance of six different GNSS receivers located at São José dos Campos (23.1°S, 45.8°W, dip latitude 17.3°S) during moderate and strong scintillation activity. The amplitude (S4) and phase (σϕ) scintillation indexes from these receivers were analyzed and compared for the nights February 20–21 and November 27–28, 2013.

     
    more » « less