skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Detecting and Mitigating Attacks on GPS Devices
Modern systems and devices, including unmanned aerial systems (UAS), autonomous vehicles, and other unmanned and autonomous systems, commonly rely on the Global Positioning System (GPS) for positioning, navigation, and timing (PNT). Cellular mobile devices rely on GPS for PNT and location-based services. Many of these systems cannot function correctly without GPS; however, GPS signals are susceptible to a wide variety of signal-related disruptions and cyberattacks. GPS threat detection and mitigation have received significant attention recently. There are many surveys and systematic reviews in the literature related to GPS security; however, many existing reviews only briefly discuss GPS security within a larger discussion of cybersecurity. Other reviews focus on niche topics related to GPS security. There are no existing comprehensive reviews of GPS security issues in the literature. This paper fills that gap by providing a comprehensive treatment of GPS security, with an emphasis on UAS applications. This paper provides an overview of the threats to GPS and the state-of-the-art techniques for attack detection and countermeasures. Detection and mitigation approaches are categorized, and the strengths and weaknesses of existing approaches are identified. This paper also provides a comprehensive overview of the state-of-the-art on alternative positioning and navigation techniques in GPS-disrupted environments, discussing the strengths and weaknesses of existing approaches. Finally, this paper identifies gaps in existing research and future research directions.  more » « less
Award ID(s):
2006674
PAR ID:
10564788
Author(s) / Creator(s):
; ;
Corporate Creator(s):
Publisher / Repository:
MDPI
Date Published:
Journal Name:
Sensors
Volume:
24
Issue:
17
ISSN:
1424-8220
Page Range / eLocation ID:
5529
Subject(s) / Keyword(s):
UAS UAV global positioning system GPS security GPS jamming GPS spoofing GPS-denied environments
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. NA (Ed.)
    Unmanned Aerial Systems have become ubiquitous and are now widely used in commercial, consumer, and military applications. Their widespread use is due to a combination of their low cost, high capability, and ability to perform tasks and go places that are not easy or safe for humans. Most UAS platforms are dependent on Global Navigation Satellite Systems (GNSS), such as the Global Positioning System (GPS), to provide positioning information for navigation and flight control. Without reliable GPS signals, the flight path cannot be trusted, and flight safety cannot be assured. However, GPS is vulnerable to several types of malicious attacks, including jamming, spoofing, or physical attacks on the GPS constellation itself. Additionally, there are environments in which GPS reception is not always possible, a key example being urban canyon areas where line-of-site to the GPS satellite constellation may be blocked or obscured by large obstacles such as buildings. Numerous methods have been proposed for position estimation in GPS denied environments. However, these methods have significant limitations and typically exhibit poor performance in certain environments and scenarios. This paper analyzes the strengths and weaknesses of existing alternate positioning methods and describes a framework where multiple positioning solutions are jointly employed to construct an optimal position estimate. The proposed framework aims to reduce computation complexity and yield good positioning performance across a wide variety of environments. 
    more » « less
  2. The security of Unmanned Aerial System (UAS) networks is becoming crucial as their number and application in several fields are increasing every day. For navigation and positioning, the Global Navigation System (GPS) is essential as it provides an accurate location for the UAS. However, since the civilian GPS signals are open and unencrypted, attackers target them in different ways such as spoofing attacks. To address this security concern, we propose a comparison of several tree-based machine learning models, namely Random Forest, Gradient Boost, XGBoost, and LightGBM, to detect GPS spoofing attacks. In this work, the dataset was built of real GPS signals that were collected using a Software Defined Radio unit and different types of simulated GPS spoofing attacks. The results show that XGBoost has the best accuracy (95.52%) and fastest detection time (2ms), which makes this model appropriate for UAS applications. 
    more » « less
  3. Unmanned Aerial Systems (UAS) heavily depend on the Global Positioning System (GPS) for navigation. However, the unencrypted civilian GPS signals are subject to different types of threats, including GPS spoofing attacks. In this paper, we evaluate five instance-based learning models for GPS spoofing detection in UAS, namely K Nearest Neighbor, Radius Neighbor, Linear Support Vector Machine (SVM), C-SVM, and Nu-SVM. We used software-defined radio units to collect and extract features from satellite signals. Then, we simulated three types of GPS spoofing attacks specifically the simplistic, intermediate, and sophisticated attacks. The evaluation results show that Nu-SVM outperforms the other instance learning classifiers in terms of accuracy, probability of detection, probability of false alarm, and probability of misdetection. In addition, the model shows good computational performance regarding memory usage and processing time in the detection phase. 
    more » « less
  4. In the field of autonomous transportation systems, the integration of Unmanned Aerial Vehicles (UAVs) in emergency response scenarios is important for enhancing the operational efficiency and the victims’ positioning. This article presents a novel Positioning, Navigation, and Timing (PNT) framework, namedHEROES, which leverages the UAV and integrated sensing and communication technologies to address the challenges in post-disaster environments. Our approach focuses on a comprehensive post-disaster scenario involving multiple victims, first responders, UAVs, and an emergency control center. HEROES enables UAVs to function as anchor nodes and facilitate the precise positioning of the victims while simultaneously collecting critical data from the disaster area. We further introduce a reinforcement learning model based on the Optimistic Q-learning with Upper Confidence Bound algorithm, enabling the victims and first responders to autonomously select the most advantageous UAV connections based on their channel gain, shadowing probability, and positional characteristics. Furthermore, HEROES is based on a satisfaction game-theoretic model to enhance the sensing, communication, and positioning functionalities. Our analysis reveals the existence of various satisfaction equilibria, including minimum efficient satisfaction equilibrium, ensuring that the UAVs meet their quality of service constraints at minimal operational costs. Extensive experimental results validate the scalability and performance of HEROES, demonstrating significant improvements over existing state-of-the-art methods in delivering PNT services during humanitarian emergencies. 
    more » « less
  5. A resilient positioning, navigation, and timing (PNT) system is a necessity for the robust navigation of autonomous vehicles (AVs). A global navigation satellite system (GNSS) provides satellite-based PNT services. However, a spoofer can tamper the authentic GNSS signal and could transmit wrong position information to an AV. Therefore, an AV must have the capability of real-time detection of spoofing attacks related to PNT receivers, whereby it will help the end-user (the AV in this case) to navigate safely even if the GNSS is compromised. This paper aims to develop a deep reinforcement learning (RL)-based turn-by-turn spoofing attack detection method using low-cost in-vehicle sensor data. We have utilized the Honda Research Institute Driving Dataset to create attack and non-attack datasets to develop a deep RL model and have evaluated the performance of the deep RL-based attack detection model. We find that the accuracy of the deep RL model ranges from 99.99% to 100%, and the recall value is 100%. Furthermore, the precision ranges from 93.44% to 100%, and the f1 score ranges from 96.61% to 100%. Overall, the analyses reveal that the RL model is effective in turn-by-turn spoofing attack detection. 
    more » « less