Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks
security
Jansen K, Schäfer M, Moser D, et al. Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks[C] IEEE Symposium on Security and Privacy (S&P). 2018.
在此输入正文
Introduction
GPS
A. GPS Usage in avaition
非常广泛
B. GPS Spoofing Attacks
依赖GPS的航空工具都是攻击者倾向的目标
1) Threat Model
Spoffer is emulating a moving track such as a straight line or a curve with some potential acceleation
2) Validation of assumptions
first,position advertisements contain the spoofed GPS positions
Second,spoofed signals will affect neighboring aircraft and UAVs
GPS Spoofing Expriments
The gole of these expriments is to demonstrate that existing transponders do not perform any checks on the derived GPS position and that spoffers can precisely control the positino and speed of victim receivers
实验表明欺骗很容易实现
GPS Spoofing Coverage Estimation
根据假设作出自由空间路径损失
自由空间路径损耗,信号源与接收器距离,信号频率
根据(1)得
由该公式知所有离被攻击目标内34km的UAVs都会收到至少-160dBW的信号
CROWD-GPS-SEC
所调查,传感器主要分布在美欧,我们的系统由三个模型组成
multilateration(MLAT) module estimates the location of airrcraft based on the time defference of Arrival(TDoA) between different sensors
spoofing detection module check inconsistencies between multilaterated positions and GPS-derived positions in consistencies between position advertisements from different aircraft
spoofer localization module has tetected a GPS spoofer estimates the position fo the spoffer.