File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Stars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset
| Title | Stars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset |
|---|---|
| Authors | |
| Issue Date | 2021 |
| Citation | Proceedings of the 30th Usenix Security Symposium, 2021, p. 3935-3952 How to Cite? |
| Abstract | The GPS has empowered billions of users and various critical infrastructures with its positioning and time services. However, GPS spoofing attacks also become a growing threat to GPS-dependent systems. Existing detection methods either require expensive hardware modifications to current GPS devices or lack the basic robustness against sophisticated attacks, hurting their adoption and usage in practice. In this paper, we propose a novel GPS spoofing detection framework that works with off-the-shelf GPS chipsets. Our basic idea is to rotate a one-side-blocked GPS receiver to derive the angle-of-arrival (AoAs) of received signals and compare them with the GPS constellation (consists of tens of GPS satellites). We first demonstrate the effectiveness of this idea by implementing a smartphone prototype and evaluating it against a real spoofer in various field experiments (in both open air and urban canyon environments). Our method achieves a high accuracy (95%-100%) in 5 seconds. Then we implement an adaptive attack, assuming the attacker becomes aware of our defense method and actively modulates the spoofing signals accordingly. We study this adaptive attack and propose enhancement methods (using the rotation speed as the “secret key”) to fortify the defense. Further experiments are conducted to validate the effectiveness of the enhanced defense. |
| Persistent Identifier | http://hdl.handle.net/10722/363419 |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Liu, Shinan | - |
| dc.contributor.author | Cheng, Xiang | - |
| dc.contributor.author | Yang, Hanchao | - |
| dc.contributor.author | Shu, Yuanchao | - |
| dc.contributor.author | Weng, Xiaoran | - |
| dc.contributor.author | Guo, Ping | - |
| dc.contributor.author | Zeng, Kexiong | - |
| dc.contributor.author | Wang, Gang | - |
| dc.contributor.author | Yang, Yaling | - |
| dc.date.accessioned | 2025-10-10T07:46:44Z | - |
| dc.date.available | 2025-10-10T07:46:44Z | - |
| dc.date.issued | 2021 | - |
| dc.identifier.citation | Proceedings of the 30th Usenix Security Symposium, 2021, p. 3935-3952 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/363419 | - |
| dc.description.abstract | The GPS has empowered billions of users and various critical infrastructures with its positioning and time services. However, GPS spoofing attacks also become a growing threat to GPS-dependent systems. Existing detection methods either require expensive hardware modifications to current GPS devices or lack the basic robustness against sophisticated attacks, hurting their adoption and usage in practice. In this paper, we propose a novel GPS spoofing detection framework that works with off-the-shelf GPS chipsets. Our basic idea is to rotate a one-side-blocked GPS receiver to derive the angle-of-arrival (AoAs) of received signals and compare them with the GPS constellation (consists of tens of GPS satellites). We first demonstrate the effectiveness of this idea by implementing a smartphone prototype and evaluating it against a real spoofer in various field experiments (in both open air and urban canyon environments). Our method achieves a high accuracy (95%-100%) in 5 seconds. Then we implement an adaptive attack, assuming the attacker becomes aware of our defense method and actively modulates the spoofing signals accordingly. We study this adaptive attack and propose enhancement methods (using the rotation speed as the “secret key”) to fortify the defense. Further experiments are conducted to validate the effectiveness of the enhanced defense. | - |
| dc.language | eng | - |
| dc.relation.ispartof | Proceedings of the 30th Usenix Security Symposium | - |
| dc.title | Stars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset | - |
| dc.type | Conference_Paper | - |
| dc.description.nature | link_to_subscribed_fulltext | - |
| dc.identifier.scopus | eid_2-s2.0-85114480789 | - |
| dc.identifier.spage | 3935 | - |
| dc.identifier.epage | 3952 | - |
