GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles

Read original: arXiv:2405.08359 - Published 5/15/2024 by Murad Mehrab Abrar, Raian Islam, Shalaka Satam, Sicong Shao, Salim Hariri, Pratik Satam
Total Score

0

🔎

Sign in to get full access

or

If you already have an account, we'll log you in

Overview

  • Autonomous vehicles (AVs) rely heavily on sensors and communication networks like GPS for navigation
  • Existing research has shown that these networks are vulnerable to cyber-attacks like spoofing and jamming, which can lead to navigation errors and system failures
  • As AV deployment increases, these threats are expected to intensify, making it crucial to detect and mitigate such attacks
  • This paper proposes the GPS Intrusion Detection System (GPS-IDS), an Anomaly Behavior Analysis (ABA)-based framework to detect GPS spoofing attacks on AVs

Plain English Explanation

Autonomous vehicles, or self-driving cars, use a variety of sensors and communication networks to navigate on their own without a human driver. One of the key technologies they rely on is the Global Positioning System (GPS), which helps the vehicle know its location and plan its route.

However, research has shown that GPS and other communication networks used by AVs can be vulnerable to cyber-attacks, where hackers can interfere with the signals and make the vehicle think it's somewhere it's not. This could cause the AV to make navigation errors or even completely fail, which could be very dangerous.

As more and more autonomous vehicles are deployed on our roads, these security threats are expected to become even more serious. That's why this research paper proposes a new system called the GPS Intrusion Detection System (GPS-IDS). It uses a novel approach called Anomaly Behavior Analysis (ABA) to detect when a GPS signal is being tampered with, so the AV can respond and avoid potential accidents.

The key idea is to create a very detailed model of how an AV should behave based on its physics and the GPS data. Then, the system can analyze the AV's actual behavior in real-time and look for any abnormalities that might indicate a GPS spoofing attack. This allows it to catch these threats early before they can cause major problems.

Technical Explanation

The GPS-IDS framework uses a novel physics-based vehicle behavior model that integrates a GPS navigation model into the conventional dynamic bicycle model. This provides a more accurate representation of AV behavior, which is crucial for detecting anomalies.

The framework extracts temporal features from this behavior model and uses machine learning techniques to analyze them and distinguish between normal and abnormal navigation patterns. This allows it to identify GPS spoofing attacks in real-time.

To evaluate the performance of GPS-IDS, the researchers created a new dataset called the AV-GPS-Dataset. This dataset contains real-world data collected using an AV testbed, and it has been made publicly available to support further research in this area.

Critical Analysis

The GPS-IDS framework represents an important step in addressing the security vulnerabilities of GPS-reliant autonomous vehicles. By using a physics-based behavior model and advanced anomaly detection techniques, it can effectively identify GPS spoofing attacks that could otherwise lead to dangerous navigation errors or system failures.

However, the paper does not discuss the potential limitations or edge cases of the proposed approach. For example, it's unclear how the system would perform under more sophisticated attack scenarios or in the presence of other sensor malfunctions. Additionally, the reliance on a single dataset, even if publicly available, may raise concerns about the generalizability of the results.

Further research is needed to systematically assess the performance of anomaly detectors in a variety of realistic scenarios, including the integration with other sensor fusion techniques like GPS-IMU sensor fusion or radar-based localization. A more comprehensive review of anomaly detection approaches for connected and autonomous vehicles would also help to contextualize the contributions of this work.

Conclusion

This paper presents the GPS Intrusion Detection System (GPS-IDS), an Anomaly Behavior Analysis (ABA)-based framework for detecting GPS spoofing attacks on autonomous vehicles. By integrating a GPS navigation model into a physics-based vehicle behavior representation, the framework can accurately identify abnormal navigation patterns that may indicate a cyber-attack.

The public release of the AV-GPS-Dataset is a valuable contribution that will support further research in this important area of autonomous vehicle security. While the proposed approach shows promise, additional studies are needed to fully understand its limitations and integrate it with other sensor fusion techniques to enhance the overall security and reliability of autonomous driving systems.



This summary was produced with help from an AI and may contain inaccuracies - check out the links to read the original source documents!

Follow @aimodelsfyi on 𝕏 →

Related Papers

🔎

Total Score

0

GPS-IDS: An Anomaly-based GPS Spoofing Attack Detection Framework for Autonomous Vehicles

Murad Mehrab Abrar, Raian Islam, Shalaka Satam, Sicong Shao, Salim Hariri, Pratik Satam

Autonomous Vehicles (AVs) heavily rely on sensors and communication networks like Global Positioning System (GPS) to navigate autonomously. Prior research has indicated that networks like GPS are vulnerable to cyber-attacks such as spoofing and jamming, thus posing serious risks like navigation errors and system failures. These threats are expected to intensify with the widespread deployment of AVs, making it crucial to detect and mitigate such attacks. This paper proposes GPS Intrusion Detection System, or GPS-IDS, an Anomaly Behavior Analysis (ABA)-based intrusion detection framework to detect GPS spoofing attacks on AVs. The framework uses a novel physics-based vehicle behavior model where a GPS navigation model is integrated into the conventional dynamic bicycle model for accurate AV behavior representation. Temporal features derived from this behavior model are analyzed using machine learning to detect normal and abnormal navigation behavior. The performance of the GPS-IDS framework is evaluated on the AV-GPS-Dataset - a real-world dataset collected by the team using an AV testbed. The dataset has been publicly released for the global research community. To the best of our knowledge, this dataset is the first of its kind and will serve as a useful resource to address such security challenges.

Read more

5/15/2024

Total Score

0

An Anomaly Behavior Analysis Framework for Securing Autonomous Vehicle Perception

Murad Mehrab Abrar, Salim Hariri

As a rapidly growing cyber-physical platform, Autonomous Vehicles (AVs) are encountering more security challenges as their capabilities continue to expand. In recent years, adversaries are actively targeting the perception sensors of autonomous vehicles with sophisticated attacks that are not easily detected by the vehicles' control systems. This work proposes an Anomaly Behavior Analysis approach to detect a perception sensor attack against an autonomous vehicle. The framework relies on temporal features extracted from a physics-based autonomous vehicle behavior model to capture the normal behavior of vehicular perception in autonomous driving. By employing a combination of model-based techniques and machine learning algorithms, the proposed framework distinguishes between normal and abnormal vehicular perception behavior. To demonstrate the application of the framework in practice, we performed a depth camera attack experiment on an autonomous vehicle testbed and generated an extensive dataset. We validated the effectiveness of the proposed framework using this real-world data and released the dataset for public access. To our knowledge, this dataset is the first of its kind and will serve as a valuable resource for the research community in evaluating their intrusion detection techniques effectively.

Read more

4/8/2024

Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks
Total Score

0

Enhanced Intrusion Detection System for Multiclass Classification in UAV Networks

Safaa Menssouri, Mamady Delamou, Khalil Ibrahimi, El Mehdi Amhoud

Unmanned Aerial Vehicles (UAVs) have become increasingly popular in various applications, especially with the emergence of 6G systems and networks. However, their widespread adoption has also led to concerns regarding security vulnerabilities, making the development of reliable intrusion detection systems (IDS) essential for ensuring UAVs safety and mission success. This paper presents a new IDS for UAV networks. A binary-tuple representation was used for encoding class labels, along with a deep learning-based approach employed for classification. The proposed system enhances the intrusion detection by capturing complex class relationships and temporal network patterns. Moreover, a cross-correlation study between common features of different UAVs was conducted to discard correlated features that might mislead the classification of the proposed IDS. The full study was carried out using the UAV-IDS-2020 dataset, and we assessed the performance of the proposed IDS using different evaluation metrics. The experimental results highlighted the effectiveness of the proposed multiclass classifier model with an accuracy of 95%.

Read more

6/18/2024

Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data
Total Score

0

Navigating Connected Car Cybersecurity: Location Anomaly Detection with RAN Data

Feng Wang, Yaron Koral, Kenichi Futamura

The cybersecurity of connected cars, integral to the broader Internet of Things (IoT) landscape, has become of paramount concern. Cyber-attacks, including hijacking and spoofing, pose significant threats to these technological advancements, potentially leading to unauthorized control over vehicular networks or creating deceptive identities. Given the difficulty of deploying comprehensive defensive logic across all vehicles, this paper presents a novel approach for identifying potential attacks through Radio Access Network (RAN) event monitoring. The major contribution of this paper is a location anomaly detection module that identifies aberrant devices that appear in multiple locations simultaneously - a potential indicator of a hijacking attack. We demonstrate how RAN-event based location anomaly detection is effective in combating malicious activity targeting connected cars. Using RAN data generated by tens of millions of connected cars, we developed a fast and efficient method for identifying potential malicious or rogue devices. The implications of this research are far-reaching. By increasing the security of connected cars, we can enhance the safety of users, provide robust defenses for the automotive industry, and improve overall cybersecurity practices for IoT devices.

Read more

7/4/2024