GPS Location Spoofing Attack Detection for Enhancing the Security of Autonomous Vehicles
Authors/Creators
- 1. KIOS Research and Innovation Center of Excellence, University of Cyprus, Nicosia, 1678, Cyprus
- 2. KIOS Research and Innovation Center of Excellence, University of Cyprus, Nicosia, 1678, Cyprus and Department of Electrical and Computer Engineering, University of Cyprus, Nicosia, 1678, Cyprus
Description
Attacks on the GPS receiver of Connected and Autonomous Vehicles (CAV) and specifically GPS location spoofing is of great concern for the automotive industry as the attacker can compromise the security of CAVs leading to serious repercussions for the drivers and pedestrians. Attack detection solutions based on specialized hardware (e.g., antenna arrays) and satellite signal processing techniques are accurate, yet bulky and expensive to mount on CAVs. Thus, lightweight and cost-effective solutions for detecting location spoofing attacks are highly desirable. This work presents an in-vehicle attack detection solution that fuses multi-source data readily available from the CAV's on-board sensors. It can be implemented in software running on cheap embedded computing platforms integrated into the CAV. The proposed solution is validated using the real-time CARLA simulator, while extensive experimental results demonstrate its effectiveness under different attack scenarios.
Notes
Files
VTC2021_FALL.pdf
Files
(883.9 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:5997aeac5507276ff05010756a58765c
|
883.9 kB | Preview Download |
Additional details
Related works
- Is published in
- Conference paper: 10.1109/VTC2021-Fall52928.2021.9625567 (DOI)
- Is supplement to
- Presentation: https://zenodo.org/record/6511287 (URL)
- Video/Audio: https://zenodo.org/record/6511291 (URL)