Araştırma Makalesi
BibTex RIS Kaynak Göster

An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles

Yıl 2024, Cilt: 36 Sayı: 3, 211 - 223, 26.09.2024
https://doi.org/10.7240/jeps.1459595

Öz

Unmanned Aerial Vehicles (UAV) are expected to be a critical component for logistics, agriculture, defense and enabling connectivity for post-5G communications. The utilization of drones in diverse sectors raises concerns about their vulnerability to potential attacks that disrupt or obstruct their operational mechanisms. In this work, we first demonstrate how navigation attacks can compromise a drone’s system, using GPS jamming and spoofing attacks via HackRF One PortaPack Software Defined Radio (SDR) device. Next, we propose a mechanism called “Return-to-Start”, which can protect a drone from loss by responding promptly to such widely spread navigational attacks. We evaluate the effectiveness of our solution through experiments on a Raspberry Pi-based drone we developed. Our experiments validate the robustness of Return-to-Start functionality in a variety of attack scenarios with different durations and GPS geolocations.

Kaynakça

  • Kurt, G. K., Khoshkholgh, M. G., Alfattani, S., Ibrahim, A., Darwish, T. S., Alam, M. S., ... & Yongacoglu, A. (2021). A vision and framework for the high altitude platform station (HAPS) networks of the future. IEEE Communications Surveys & Tutorials, 23(2), 729-779.
  • Altawy, R., & Youssef, A. M. (2016). Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems, 1(2), 1-25.
  • Iran–U.S. RQ-170 incident. (2024, June 7). In Wikipedia. https://en.wikipedia.org/wiki/Iran–U.S._RQ-170_incident
  • Sturdivant, R. L., & Chong, E. K. (2017). Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access, 5, 7123-7138.
  • Spilker Jr, J. J., Axelrad, P., Parkinson, B. W., & Enge, P. (Eds.). (1996). Global Positioning System: Theory and Applications, volume I. American Institute of Aeronautics and Astronautics.
  • Seo, S. H., Lee, B. H., Im, S. H., & Jee, G. I. (2015). Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal. Journal of Positioning, Navigation, and Timing, 4(2), 57-65.
  • Courbon, J., Mezouar, Y., Guénard, N., & Martinet, P. (2010). Vision-based navigation of unmanned aerial vehicles. Control engineering practice, 18(7), 789-799.
  • Psiaki, M. L., Humphreys, T. E., & Stauffer, B. (2016). Attackers can spoof navigation signals without our knowledge. Here's how to fight back GPS lies. IEEE Spectrum, 53(8), 26-53.
  • Purwar, A., Joshi, D., & Chaubey, V. K. (2016). GPS signal jamming and anti-jamming strategy—A theoretical analysis. In 2016 IEEE Annual India Conference (INDICON) (pp. 1-6).
  • Gaspar, J., Ferreira, R., Sebastião, P., & Souto, N. (2018). Capture of UAVs through GPS spoofing. In 2018 Global Wireless Summit (GWS) (pp. 21-26).
  • Shijith, N., Poornachandran, P., Sujadevi, V. G., & Dharmana, M. M. (2017). Spoofing technique to counterfeit the GPS receiver on a drone. In 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy) (pp. 1-3).
  • He, D., Qiao, Y., Chen, S., Du, X., Chen, W., Zhu, S., & Guizani, M. (2018). A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles. IEEE Network, 33(2), 146-151.
  • Ceccato, M., Formaggio, F., & Tomasin, S. (2020). Spatial GNSS spoofing against drone swarms with multiple antennas and Wiener filter. IEEE Transactions on Signal Processing, 68, 5782-5794.
  • Alamleh, H., & Roy, N. (2021, April). Manipulating GPS signals to determine the launch location of drones in rescue mode. In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 1-5).
  • Chen, W., Dong, Y., & Duan, Z. (2022, January). Accurately redirecting a malicious drone. In 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC) (pp. 827-834).
  • Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., & Yi, W. (2017, March). Efficient drone hijacking detection using onboard motion sensors. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (pp. 1414-1419).
  • Melikhova, A. P., & Tsikin, I. A. (2018, July). Optimum array processing with unknown attitude parameters for GNSS anti-spoofing integrity monitoring. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP) (pp. 1-4).
  • Restivo, R. D., Dodson, L. C., Wang, J., Tan, W., Liu, Y., Wang, H., & Song, H. (2023, May). GPS spoofing on UAV: A survey. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)(pp. 1-6).
  • Shafique, A., Mehmood, A., & Elhadef, M. (2021). Detecting signal spoofing attack in uavs using machine learning models. IEEE access, 9, 93803-93815.
  • Aissou, G., Slimane, H. O., Benouadah, S., & Kaabouch, N. (2021, December). Tree-based supervised machine learning models for detecting GPS spoofing attacks on UAS. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0649-0653).
  • Gasimova, A., Khoei, T. T., & Kaabouch, N. (2022, January). A comparative analysis of the ensemble models for detecting gps spoofing attacks on uavs. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0310-0315).
  • Bachrach, A., Prentice, S., He, R., & Roy, N. (2011). RANGE–Robust autonomous navigation in GPS‐denied environments. Journal of Field Robotics, 28(5), 644-666.
  • Kendoul, F. (2012). Survey of advances in guidance, navigation, and control of unmanned rotorcraft systems. Journal of Field Robotics, 29(2), 315-378.
  • He, D., Qiao, Y., Chan, S., & Guizani, N. (2018). Flight security and safety of drones in airborne fog computing systems. IEEE Communications Magazine, 56(5), 66-71.
  • Barbeau, M., Garcia-Alfaro, J., & Kranakis, E. (2019, April). Geocaching-inspired resilient path planning for drone swarms. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 620-625).
  • Ferrão, I. G., Pigatto, D. F., Fontes, J. V., Silva, N. B., Espes, D., Dezan, C., & Branco, K. R. (2020, July). STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack. In 2020 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-6).
  • Bera, B., Wazid, M., Das, A. K., & Rodrigues, J. J. (2021). Securing internet of drones networks using ai-envisioned smart-contract-based blockchain. IEEE Internet of Things Magazine, 4(4), 68-73.
  • “Software-defined GPS signal simulator.” GitHub repository, https://github.com/osqzss/gps-sdr-sim, 2018.
  • G. van Esch and D. van den Heuvel (2021). PX4 autopilot on a UAV controller, Topic Embedded Systems [White paper].
  • Koubâa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., & Khalgui, M. (2019). Micro air vehicle link (mavlink) in a nutshell: A survey. IEEE Access, 7, 87658-87680.
  • Pirayesh, H., & Zeng, H. (2022). Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE communications surveys & tutorials, 24(2), 767-809.
  • L. Al-Soufi (2022), “An implementation-based study of the detection and recovery from GPS spoofing attacks for unmanned aerial vehicles”, MSc Thesis, Bahcesehir University, Turkey.

İnsansız Hava Araçları için GPS Spoofing Saldırılarının Tespiti ve Kurtarılması Üzerine Uygulama Tabanlı Bir Çalışma

Yıl 2024, Cilt: 36 Sayı: 3, 211 - 223, 26.09.2024
https://doi.org/10.7240/jeps.1459595

Öz

İnsansız Hava Araçlarının (İHA) lojistik, tarım, savunma ve 5G sonrası iletişim için bağlantıyı mümkün kılan kritik bir bileşen olması beklenmektedir. İHA'ların farklı sektörlerde kullanılması, operasyonel mekanizmalarını bozan veya engelleyen potansiyel saldırılara karşı savunmasızlıkları konusunda endişelere yol açmaktadır. Bu çalışmada, ilk olarak HackRF One PortaPack Yazılım Tanımlı Radyo (SDR) cihazı aracılığıyla GPS karıştırma ve sahtekarlık saldırılarını kullanarak navigasyon saldırılarının bir drone'un sistemini nasıl tehlikeye atabileceğini gösteriyoruz. Ardından, bu tür yaygın navigasyon saldırılarına anında yanıt vererek bir drone'u kayıplardan koruyabilen "Başlangıca Dönüş" adlı bir mekanizma öneriyoruz. Çözümümüzün etkinliğini, geliştirdiğimiz Raspberry Pi tabanlı bir drone üzerinde yaptığımız deneylerle değerlendiriyoruz. Deneylerimiz, farklı sürelere ve GPS coğrafi konumlarına sahip çeşitli saldırı senaryolarında Return-to-Start işlevselliğinin sağlamlığını doğrulamaktadır.

Kaynakça

  • Kurt, G. K., Khoshkholgh, M. G., Alfattani, S., Ibrahim, A., Darwish, T. S., Alam, M. S., ... & Yongacoglu, A. (2021). A vision and framework for the high altitude platform station (HAPS) networks of the future. IEEE Communications Surveys & Tutorials, 23(2), 729-779.
  • Altawy, R., & Youssef, A. M. (2016). Security, privacy, and safety aspects of civilian drones: A survey. ACM Transactions on Cyber-Physical Systems, 1(2), 1-25.
  • Iran–U.S. RQ-170 incident. (2024, June 7). In Wikipedia. https://en.wikipedia.org/wiki/Iran–U.S._RQ-170_incident
  • Sturdivant, R. L., & Chong, E. K. (2017). Systems engineering baseline concept of a multispectral drone detection solution for airports. IEEE Access, 5, 7123-7138.
  • Spilker Jr, J. J., Axelrad, P., Parkinson, B. W., & Enge, P. (Eds.). (1996). Global Positioning System: Theory and Applications, volume I. American Institute of Aeronautics and Astronautics.
  • Seo, S. H., Lee, B. H., Im, S. H., & Jee, G. I. (2015). Effect of spoofing on unmanned aerial vehicle using counterfeited GPS signal. Journal of Positioning, Navigation, and Timing, 4(2), 57-65.
  • Courbon, J., Mezouar, Y., Guénard, N., & Martinet, P. (2010). Vision-based navigation of unmanned aerial vehicles. Control engineering practice, 18(7), 789-799.
  • Psiaki, M. L., Humphreys, T. E., & Stauffer, B. (2016). Attackers can spoof navigation signals without our knowledge. Here's how to fight back GPS lies. IEEE Spectrum, 53(8), 26-53.
  • Purwar, A., Joshi, D., & Chaubey, V. K. (2016). GPS signal jamming and anti-jamming strategy—A theoretical analysis. In 2016 IEEE Annual India Conference (INDICON) (pp. 1-6).
  • Gaspar, J., Ferreira, R., Sebastião, P., & Souto, N. (2018). Capture of UAVs through GPS spoofing. In 2018 Global Wireless Summit (GWS) (pp. 21-26).
  • Shijith, N., Poornachandran, P., Sujadevi, V. G., & Dharmana, M. M. (2017). Spoofing technique to counterfeit the GPS receiver on a drone. In 2017 International Conference on Technological Advancements in Power and Energy (TAP Energy) (pp. 1-3).
  • He, D., Qiao, Y., Chen, S., Du, X., Chen, W., Zhu, S., & Guizani, M. (2018). A friendly and low-cost technique for capturing non-cooperative civilian unmanned aerial vehicles. IEEE Network, 33(2), 146-151.
  • Ceccato, M., Formaggio, F., & Tomasin, S. (2020). Spatial GNSS spoofing against drone swarms with multiple antennas and Wiener filter. IEEE Transactions on Signal Processing, 68, 5782-5794.
  • Alamleh, H., & Roy, N. (2021, April). Manipulating GPS signals to determine the launch location of drones in rescue mode. In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 1-5).
  • Chen, W., Dong, Y., & Duan, Z. (2022, January). Accurately redirecting a malicious drone. In 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC) (pp. 827-834).
  • Feng, Z., Guan, N., Lv, M., Liu, W., Deng, Q., Liu, X., & Yi, W. (2017, March). Efficient drone hijacking detection using onboard motion sensors. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017 (pp. 1414-1419).
  • Melikhova, A. P., & Tsikin, I. A. (2018, July). Optimum array processing with unknown attitude parameters for GNSS anti-spoofing integrity monitoring. In 2018 41st International Conference on Telecommunications and Signal Processing (TSP) (pp. 1-4).
  • Restivo, R. D., Dodson, L. C., Wang, J., Tan, W., Liu, Y., Wang, H., & Song, H. (2023, May). GPS spoofing on UAV: A survey. In IEEE INFOCOM 2023-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)(pp. 1-6).
  • Shafique, A., Mehmood, A., & Elhadef, M. (2021). Detecting signal spoofing attack in uavs using machine learning models. IEEE access, 9, 93803-93815.
  • Aissou, G., Slimane, H. O., Benouadah, S., & Kaabouch, N. (2021, December). Tree-based supervised machine learning models for detecting GPS spoofing attacks on UAS. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0649-0653).
  • Gasimova, A., Khoei, T. T., & Kaabouch, N. (2022, January). A comparative analysis of the ensemble models for detecting gps spoofing attacks on uavs. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0310-0315).
  • Bachrach, A., Prentice, S., He, R., & Roy, N. (2011). RANGE–Robust autonomous navigation in GPS‐denied environments. Journal of Field Robotics, 28(5), 644-666.
  • Kendoul, F. (2012). Survey of advances in guidance, navigation, and control of unmanned rotorcraft systems. Journal of Field Robotics, 29(2), 315-378.
  • He, D., Qiao, Y., Chan, S., & Guizani, N. (2018). Flight security and safety of drones in airborne fog computing systems. IEEE Communications Magazine, 56(5), 66-71.
  • Barbeau, M., Garcia-Alfaro, J., & Kranakis, E. (2019, April). Geocaching-inspired resilient path planning for drone swarms. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) (pp. 620-625).
  • Ferrão, I. G., Pigatto, D. F., Fontes, J. V., Silva, N. B., Espes, D., Dezan, C., & Branco, K. R. (2020, July). STUART: ReSilient archiTecture to dynamically manage Unmanned aeriAl vehicle networks under atTack. In 2020 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-6).
  • Bera, B., Wazid, M., Das, A. K., & Rodrigues, J. J. (2021). Securing internet of drones networks using ai-envisioned smart-contract-based blockchain. IEEE Internet of Things Magazine, 4(4), 68-73.
  • “Software-defined GPS signal simulator.” GitHub repository, https://github.com/osqzss/gps-sdr-sim, 2018.
  • G. van Esch and D. van den Heuvel (2021). PX4 autopilot on a UAV controller, Topic Embedded Systems [White paper].
  • Koubâa, A., Allouch, A., Alajlan, M., Javed, Y., Belghith, A., & Khalgui, M. (2019). Micro air vehicle link (mavlink) in a nutshell: A survey. IEEE Access, 7, 87658-87680.
  • Pirayesh, H., & Zeng, H. (2022). Jamming attacks and anti-jamming strategies in wireless networks: A comprehensive survey. IEEE communications surveys & tutorials, 24(2), 767-809.
  • L. Al-Soufi (2022), “An implementation-based study of the detection and recovery from GPS spoofing attacks for unmanned aerial vehicles”, MSc Thesis, Bahcesehir University, Turkey.
Toplam 32 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi, Elektronik, Sensörler ve Dijital Donanım (Diğer)
Bölüm Araştırma Makaleleri
Yazarlar

Lina Al- Soufi 0000-0002-4516-8099

Talha Demirsoy Bu kişi benim 0009-0008-8084-3687

Ece Gelal Soyak 0000-0003-2410-6267

Erken Görünüm Tarihi 19 Eylül 2024
Yayımlanma Tarihi 26 Eylül 2024
Gönderilme Tarihi 2 Nisan 2024
Kabul Tarihi 9 Temmuz 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 36 Sayı: 3

Kaynak Göster

APA Al- Soufi, L., Demirsoy, T., & Gelal Soyak, E. (2024). An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles. International Journal of Advances in Engineering and Pure Sciences, 36(3), 211-223. https://doi.org/10.7240/jeps.1459595
AMA Al- Soufi L, Demirsoy T, Gelal Soyak E. An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles. JEPS. Eylül 2024;36(3):211-223. doi:10.7240/jeps.1459595
Chicago Al- Soufi, Lina, Talha Demirsoy, ve Ece Gelal Soyak. “An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles”. International Journal of Advances in Engineering and Pure Sciences 36, sy. 3 (Eylül 2024): 211-23. https://doi.org/10.7240/jeps.1459595.
EndNote Al- Soufi L, Demirsoy T, Gelal Soyak E (01 Eylül 2024) An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles. International Journal of Advances in Engineering and Pure Sciences 36 3 211–223.
IEEE L. Al- Soufi, T. Demirsoy, ve E. Gelal Soyak, “An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles”, JEPS, c. 36, sy. 3, ss. 211–223, 2024, doi: 10.7240/jeps.1459595.
ISNAD Al- Soufi, Lina vd. “An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles”. International Journal of Advances in Engineering and Pure Sciences 36/3 (Eylül 2024), 211-223. https://doi.org/10.7240/jeps.1459595.
JAMA Al- Soufi L, Demirsoy T, Gelal Soyak E. An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles. JEPS. 2024;36:211–223.
MLA Al- Soufi, Lina vd. “An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles”. International Journal of Advances in Engineering and Pure Sciences, c. 36, sy. 3, 2024, ss. 211-23, doi:10.7240/jeps.1459595.
Vancouver Al- Soufi L, Demirsoy T, Gelal Soyak E. An Implementation-Based Study of the Detection of and Recovery from GPS Spoofing Attacks for Unmanned Aerial Vehicles. JEPS. 2024;36(3):211-23.