Abstract
Nowadays, Global Navigation Satellite Systems are the main source for high accuracy positioning and timing. For this reason, they are essential both for everyday activities and services, and for the industrial and critical infrastructure sectors. Moreover, the spread of increasingly autonomous vehicles results in strict accuracy and integrity requirements. This leads to the need for additional infrastructure to send corrections to the end users and mitigate the measurement errors, the Augmentation Networks. However, due to the increasing exploitation of localization functionalities, the Augmentation Networks could become a primary target for attackers resulting in a high financial and safety cost. Among the possible attacks, spoofing, that is the generation of a fake satellite signal which is seen as genuine by the receiver, is one of the most powerful and tricky. In this contribution, a detection and mitigation strategy for Augmentation Network spoofing attacks is proposed. We introduce two attack models and present a technique based on K-means clustering to counteract them. More in details, our approach is based on the computation of the number of clusters formed by the Augmentation Network corrections. Starting from the hypothesis that under nominal conditions only one cluster is present, the effects of the attacks on the clustering procedure are analyzed, and several attack simulations are performed to evaluate the algorithm performances. The proposed method has been compared both to an Augmentation Network attack detection technique, and to a receiver-level spoofing mitigation approach, showing comparable or better performances. Moreover, to the best of our knowledge, this is the first work addressing mitigation for spoofing attacks which target an Augmentation Network.
Highlights
T HE Global Navigation Satellite Systems (GNSSs) like Global Positioning System (GPS), Galileo, GLObal NAvigation Satellite System (GLONASS), and BeiDou Navigation Satellite System (BDS), constitute pervasive, enabling technologies for a large amount of today activities and services, including those related to critical infrastructures
On the contrary, we focus on the use of Differential GNSS (DGNSS) implemented through ground Reference Stations (RSs) which provide the differential corrections via a terrestrial link
Once the position accuracy is entrusted to Augmentation Networks, such systems become a perfect target. Since such a kind of attack may produce large scale effects while staying undetected, in this paper we address two research questions: R1) Is it possible to design a clustering-based method for detecting and mitigating spoofing attacks directed to the Augmentation Networks?
Summary
T HE Global Navigation Satellite Systems (GNSSs) like Global Positioning System (GPS), Galileo, GLObal NAvigation Satellite System (GLONASS), and BeiDou Navigation Satellite System (BDS), constitute pervasive, enabling technologies for a large amount of today activities and services, including those related to critical infrastructures. To fulfill the needs of those applications that require a higher accuracy than the one achievable by GNSS stand-alone mode, like those related to autonomous and connected transport systems, Augmentation Networks have been introduced They exploit a set of ground Reference Stations (RSs), georeferenced during their deployment, to compute accurate corrections (e.g. Differential GNSS, Precise Point Positioning) and/or reference signals (Networked Real-Time Kinematic) to be sent to the end users to fix their measurements, either directly or through terrestrial or satellite broadcast channels, like the U.S.A. Wide Area Augmentation System (WAAS), and the European Geostationary Navigation Overlay Service (EGNOS). Satellite Based Augmentation Systems (SBASs) use RSs located in an entire continent to measure GNSS errors and transfer them to a central computing centre where differential corrections and integrity messages are computed This information is broadcasted through geostationary satellites to the final users.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.