File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Stars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset

TitleStars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset
Authors
Issue Date2021
Citation
Proceedings of the 30th Usenix Security Symposium, 2021, p. 3935-3952 How to Cite?
AbstractThe GPS has empowered billions of users and various critical infrastructures with its positioning and time services. However, GPS spoofing attacks also become a growing threat to GPS-dependent systems. Existing detection methods either require expensive hardware modifications to current GPS devices or lack the basic robustness against sophisticated attacks, hurting their adoption and usage in practice. In this paper, we propose a novel GPS spoofing detection framework that works with off-the-shelf GPS chipsets. Our basic idea is to rotate a one-side-blocked GPS receiver to derive the angle-of-arrival (AoAs) of received signals and compare them with the GPS constellation (consists of tens of GPS satellites). We first demonstrate the effectiveness of this idea by implementing a smartphone prototype and evaluating it against a real spoofer in various field experiments (in both open air and urban canyon environments). Our method achieves a high accuracy (95%-100%) in 5 seconds. Then we implement an adaptive attack, assuming the attacker becomes aware of our defense method and actively modulates the spoofing signals accordingly. We study this adaptive attack and propose enhancement methods (using the rotation speed as the “secret key”) to fortify the defense. Further experiments are conducted to validate the effectiveness of the enhanced defense.
Persistent Identifierhttp://hdl.handle.net/10722/363419

 

DC FieldValueLanguage
dc.contributor.authorLiu, Shinan-
dc.contributor.authorCheng, Xiang-
dc.contributor.authorYang, Hanchao-
dc.contributor.authorShu, Yuanchao-
dc.contributor.authorWeng, Xiaoran-
dc.contributor.authorGuo, Ping-
dc.contributor.authorZeng, Kexiong-
dc.contributor.authorWang, Gang-
dc.contributor.authorYang, Yaling-
dc.date.accessioned2025-10-10T07:46:44Z-
dc.date.available2025-10-10T07:46:44Z-
dc.date.issued2021-
dc.identifier.citationProceedings of the 30th Usenix Security Symposium, 2021, p. 3935-3952-
dc.identifier.urihttp://hdl.handle.net/10722/363419-
dc.description.abstractThe GPS has empowered billions of users and various critical infrastructures with its positioning and time services. However, GPS spoofing attacks also become a growing threat to GPS-dependent systems. Existing detection methods either require expensive hardware modifications to current GPS devices or lack the basic robustness against sophisticated attacks, hurting their adoption and usage in practice. In this paper, we propose a novel GPS spoofing detection framework that works with off-the-shelf GPS chipsets. Our basic idea is to rotate a one-side-blocked GPS receiver to derive the angle-of-arrival (AoAs) of received signals and compare them with the GPS constellation (consists of tens of GPS satellites). We first demonstrate the effectiveness of this idea by implementing a smartphone prototype and evaluating it against a real spoofer in various field experiments (in both open air and urban canyon environments). Our method achieves a high accuracy (95%-100%) in 5 seconds. Then we implement an adaptive attack, assuming the attacker becomes aware of our defense method and actively modulates the spoofing signals accordingly. We study this adaptive attack and propose enhancement methods (using the rotation speed as the “secret key”) to fortify the defense. Further experiments are conducted to validate the effectiveness of the enhanced defense.-
dc.languageeng-
dc.relation.ispartofProceedings of the 30th Usenix Security Symposium-
dc.titleStars can tell: A robust method to defend against GPS spoofing attacks using off-the-shelf chipset-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-85114480789-
dc.identifier.spage3935-
dc.identifier.epage3952-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats