scispace - formally typeset
Open AccessJournal ArticleDOI

A Sensor Fusion-Based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

- 01 Dec 2022 - 
- Vol. 23, Iss: 12, pp 23559-23572
TLDR
In this paper , a sensor fusion-based Global Navigation Satellite System (GNSS) spoofing attack detection framework for autonomous vehicles (AVs) is presented, which consists of two strategies: (i) comparison between predicted location shift and inertial sensor based location shift in addition to monitoring of vehicle motion states.
Abstract
This paper presents a sensor fusion-based Global Navigation Satellite System (GNSS) spoofing attack detection framework for autonomous vehicles (AVs) that consists of two strategies: (i) comparison between predicted location shift—i.e., distance traveled between two consecutive timestamps—and inertial sensor based location shift in addition to monitoring of vehicle motion states—i.e., standstill/ in motion; and (ii) detection and classification of turns (left or right) along with detection of vehicle motion states. In the first strategy, data from low-cost in-vehicle inertial sensors—i.e., speedometer, accelerometer, and steering angle sensor—are fused and fed to a long short-term memory (LSTM) neural network to predict the distance an AV will travel between two consecutive timestamps. The second strategy combines k-Nearest Neighbors (k-NN) and Dynamic Time Warping (DTW) algorithms to detect a turn and then classify left and right turns using steering angle sensor output. In both strategies, the GNSS-derived speed is compared with speedometer output to improve the effectiveness of the framework presented in this paper. To prove the efficacy of the sensor fusion-based attack detection framework, attack datasets are created for four unique spoofing attack scenarios—turn-by-turn, overshoot, wrong turn, and stop, using the publicly available real-world Honda Research Institute Driving Dataset (HDD). Analyses conducted in this study reveal that the sensor fusion-based detection framework successfully detects all four types of spoofing attacks within the required computational latency threshold.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

A Survey of GNSS Spoofing and Anti-Spoofing Technology

TL;DR: This paper briefly analyzes the common interference types of satellite navigation and then focuses on spoofing, and proposes a new classification standard and analyzes and compares the implementation difficulty, effect and adaptability of the current main spoofing detection technologies.
Journal ArticleDOI

Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring

TL;DR: In this paper , a low-cost framework for GPS spoofing detection is proposed, which combines several software-based methods to monitor NMEA-0183 data and evaluate its effectiveness using simulations supported by real-world experiments.
Journal ArticleDOI

Resilient time‐varying formation tracking for mobile robot networks under deception attacks on positioning

TL;DR: In this paper , the authors investigate the resilience of mobile robot networks in time-varying formation tracking under deception attacks on global positioning and propose a localization based on extended information filters.
Journal ArticleDOI

Analyzing Factors Influencing Situation Awareness in Autonomous Vehicles—A Survey

TL;DR: In this article , the influence of mandatory factors like data pre-processing and data fusion along with situation awareness toward effective decision-making in the AVs are analyzed from various perceptive, to pick the major hiccups.
References
More filters
Journal ArticleDOI

The Cosine-Haversine Formula

Proceedings ArticleDOI

Toward Driving Scene Understanding: A Dataset for Learning Driver Behavior and Causal Reasoning

TL;DR: The Honda Research Institute Driving Dataset (HDD) as discussed by the authors is a dataset of 104 hours of real human driving in the San Francisco Bay Area collected using an instrumented vehicle equipped with different sensors.
Journal ArticleDOI

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks

TL;DR: Spatial information, a physical property associated with each node, hard to falsify, and not reliant on cryptography, is proposed as the basis for detecting spoofing attacks; determining the number of attackers when multiple adversaries masquerading as the same node identity; and localizing multiple adversaries.
Journal ArticleDOI

Real‐Time GPS Spoofing Detection via Correlation of Encrypted Signals

TL;DR: A method for detecting the spoofing of civilian GPS signals has been implemented and successfully tested in a real-time system and makes use of correlations between the unknown encrypted GPS L1 P(Y) code signals from two narrow-band civilian receivers to verify the presence or absence of spoofing.
Proceedings ArticleDOI

A Practical GPS Location Spoofing Attack in Road Navigation Scenario

TL;DR: An attack model in road navigation scenario is proposed, and a complete framework to analyze, simulate and evaluate the spoofing attacks under practical constraints is developed.
Related Papers (5)
Trending Questions (1)
How can sensor spoofing be detected and prevented?

Sensor spoofing can be detected and prevented using a sensor fusion-based framework that compares predicted and actual sensor outputs and analyzes vehicle motion states.