Skip to main content

Advertisement

Log in

Mitigating Spoofed GNSS Trajectories through Nature Inspired Algorithm

  • Published:
GeoInformatica Aims and scope Submit manuscript

Abstract

Advancement in technology has resulted in the easy sharing of locations across various stakeholders. Unprotected sharing of location information makes any Global Navigation Satellite System (GNSS) device vulnerable to spoofing attacks. Spoofed GNSS signals propagate misleading trajectories to cripple any Location-Based Service (LBS). This manuscript introduces a novel algorithm for the detection and mitigation of spoofing attacks. The proposed algorithm was implemented in the Android application using the OpenStreetMap dataset. GNSS spoofing attacks were simulated and detected in real-time. The efficiency of the proposed algorithm was analyzed using the Ratio of Correctly Detected (RCD) and Ratio of Correctly Matched (RCM) spoofed points. The maximum observed values for RCD and RCM were 75% and 94%, respectively. Minimum RCD and RCM values observed during the experiment were 59% and 92%. The accuracy of the proposed algorithm was further analyzed using average positional error (APE). Maximum and minimum recorded APE values were 25.08% and 13.83% respectively. The manuscript concludes with a comparison of the proposed algorithm with that of existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. In HotSec, pages 1–6

  2. Kugler L (2017) Why GPS spoofing is a threat to companies, countries. Commun ACM 60(9):18–19

    Article  Google Scholar 

  3. Gunther C (2014) A survey of spoofing and counter-measures. NAVIGATION: Journal of The Institute of Navigation 61(3):159–177

    Article  Google Scholar 

  4. Humphreys TE, Psiaki ML (2016) Protecting GPS from spoofers is critical to the future of navigation. Technical report, July

  5. Schmidt D, Radke K, Camtepe S, Foo E, Ren ML (2016) A survey and analysis of the GNSS spoofing threat and countermeasures. ACM Computing Surveys (CSUR) 48(4):64

    Article  Google Scholar 

  6. Zheng Y, Zhou Z, Liu Y (2013) From RSSI to CSI: Indoor localization via channel response. ACM Computing Surveys (CSUR) 46(2):25

    Google Scholar 

  7. Jafarnia-Jahromi A, Broumandan A, Nielsen J, Lachapelle G (2012) GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation

  8. Magiera J, Katulski R (2015) Detection and mitigation of GPS spoofing based on antenna array processing. Journal of applied research and technology 13(1):45–57

    Article  Google Scholar 

  9. Humphreys TE (2013) Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans Aerosp Electron Syst 49(2):1073–1090

    Article  Google Scholar 

  10. Psiaki ML, Ohanlon BW, Bhatti JA, Shepard DP, Humphreys TE (2011) Civilian GPS spoofing detection based on dualreceiver correlation of military signals. In Radionavigation Laboratory Conference Proceedings

  11. Wesson K, Rothlisberger M, Humphreys T (2012) Practical cryptographic civil GPS signal authentication. Navigation 59(3):177–193

    Article  Google Scholar 

  12. Akos DM (ed) (2012) Who's afraid of the spoofer? GPS / GNSS spoofing detection via automatic gain control (AGC). Navigation 59(4):281–290

  13. Bastide F, Akos D, Macabiau C, Roturier B (2003) Automatic gain control (AGC) as an interference assessment tool. In 16th International Technical Meeting of the Satellite Division of The Institute of Navigation ION GPS/GNSS 2003, pages:2042

  14. Montgomery PY (2011) Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Radionavigation Laboratory Conference Proceedings

  15. Warner JS, Johnston RG (2003) GPS spoofing countermeasures. Homeland Security Journal 25(2):19–27

    Google Scholar 

  16. Wesson KD, Shepard DP, Bhatti JA, Humphreys TE (2011) An evaluation of the vestigial signal defense for civil GPS anti-spoofing. In Radio navigation Laboratory Conference Proceedings

  17. Yang C, Gidofalvi G (2018) Fast map matching, an algorithm integrating hidden Markov model with precomputation. Int J Geogr Inf Sci 32(3):547–570

    Article  Google Scholar 

  18. Beaudoin Y, Desbiens A, Gagnon E, Landry R Jr (2018) Observability of satellite launcher navigation with INS, GPS, attitude sensors and reference trajectory. Acta Astronautica 142:277–288

    Article  Google Scholar 

  19. Bridgelall R, Tolliver D (2018) Accuracy enhancement of roadway anomaly localization using connected vehicles. International Journal of Pavement Engineering 19(1):75–81

    Article  Google Scholar 

  20. Feng T, Timmermans HJP (2013) Transportation mode recognition using GPS and accelerometer data. Transportation Research Part C: Emerging Technologies 37:118–130

    Article  Google Scholar 

  21. Kang B, Moudon AV, Hurvitz PM, Reichley L, Saelens BE (2013) Walking objectively measured: classifying accelerometer data with GPS and travel diaries. Medicine and science in sports and exercise 45(7):1419

    Article  Google Scholar 

  22. Jansen K, Schafer M, Lenders V, Popper C, Schmitt J (2017) POSTER: Localization of spoofing devices using a large-scale air traffic surveillance system. In Proceedings of the 2017 ACM on Asia conference on computer and communications security, pages 914-916. ACM

  23. Borio D, Gioia C (2016) A sum-of-squares approach to GNSS spoofing detection. IEEE Trans Aerosp Electron Syst 52(4):1756–1768

    Article  Google Scholar 

  24. Wang W, Li N, Wu R, Closas P (2019) Detection of induced GNSS spoofing using S-Curve-Bias. Sensors 19(4):922

    Article  Google Scholar 

  25. Kar G, Mustafa H, Wang Y, Chen Y, Xu W, Gruteser M, Vu T (2014) Detection of on-road vehicles emanating GPS interference. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pages 621-632. ACM

  26. Dolburg L, Francis J, Engel T (2014) Tracking spoofed locations in crowdsourced vehicular applications. In IEEE Network Operations and Management Symposium, 2014, pages 1–9. IEEE

  27. Restuccia F, Saracino A, Das SK, Martinelli F (2016) LVS: A wifi-based system to tackle location spoofing in location-based services. In World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2016 IEEE 17th International Symposium on A, pages 1–4. IEEE

  28. Capkun S, Buttyn L, Hubaux J (2003) SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 21–32. ACM

  29. Chen K, Lu M, Fan X, Wei M, Wu J (2011) Road condition monitoring using on-board three-axis accelerometer and GPS sensor

  30. Sastry N, Shankar U, Wagner D (2003) Secure verification of location claims. In Proceedings of the 2nd ACM workshop on Wireless Security, pages 1–10. ACM

  31. Yang L, Li S, Qiangwen F, Liu Z, Zhou Q (2019) Analysis of kalman filter innovation-based GNSS spoofing detection method for INS/GNSS integrated navigation system. IEEE Sensors J 19(13):5167–5178

    Article  Google Scholar 

  32. Verhagen S, Teunissen PJG (2014) Ambiguity resolution performance with GPS and beidou for LEO formation ying. Advances in Space Research 54(5):830–839

    Article  Google Scholar 

  33. Sehra SS, Singh J, Rai HS (2014) A systematic study of OpenStreetMap data quality assessment. In 11th International Conference on Information Technology: New Generations (ITNG), pages 377–381. IEEE

  34. Whitley D (1994) A genetic algorithm tutorial. Stat Comput 4(2):65–85

    Article  Google Scholar 

  35. Zeng W, Church RL (2009) Finding shortest paths on real road networks: the case for A*. International Journal of Geographical Information Science 23(4):531–543

    Article  Google Scholar 

  36. Park SK, Miller KW (1988) Random number generators: good ones are hard to find. Commun ACM 31(10):1192–1201

    Article  Google Scholar 

  37. Muda L, Begam M, Elamvazuthi I (2010) Voice recognition algorithms using mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. arXiv preprint arXiv:1003.4083

  38. Terra R, Figueiredo L, Barbosa RS, Anacleto R (2014) Traveled distance estimation algorithm for indoor localization 248–255

  39. Kok M, Hol JD, Schön TB (2017) Using inertial sensors for position and orientation estimation. arXiv preprint arXiv:1704.06053

  40. Psiaki ML, Humphreys TE (2016) GNSS spoofing and detection. Proceedings of the IEEE, 104(6):1258–1270

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jaiteg Singh.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, S., Singh, J. & Singh, S. Mitigating Spoofed GNSS Trajectories through Nature Inspired Algorithm. Geoinformatica 25, 581–600 (2021). https://doi.org/10.1007/s10707-020-00412-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10707-020-00412-z

Keywords

Navigation