IDEAS home Printed from https://ideas.repec.org/a/eee/transa/v149y2021icp300-318.html
   My bibliography  Save this article

A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs

Author

Listed:
  • Bada, Mousaab
  • Boubiche, Djallel Eddine
  • Lagraa, Nasreddine
  • Kerrache, Chaker Abdelaziz
  • Imran, Muhammad
  • Shoaib, Muhammad

Abstract

Most of Flying Adhoc Networks (FANETs) applications consume GPS based location information for their services, which are also shared in real-time with other UAVs, ground control stations and centralized service operators. GPS spoofing is among the most popular attacks in FANETs that lead the Global Navigation Satellite System (GNSS) receivers to generate false navigation solutions. Several anti-spoofing techniques have been proposed in the literature. However, Conventional detection methods present vulnerabilities against Colluding GPS Spoofing Attack where multiple GPS spoofing signal sources are used. In this paper, we propose a policy-based distributed detection mechanism to face colluding GPS-Spoofing attack in FANETs. Based on Burglary scene and the location of each UAV at the time of the attack, we can distinguish between Active and Passive witnesses that are respectively used to help the target to detect and confirm the presence of GPS spoofing signal using respectively Absolute power and Carrier-to-Noise density ratio. A trust model based on Beta and Weibull Distribution has been adopted as a combination technique of different testimonies to both mitigate the spread of false rumors and classify the different signals. Simulation results depict that our proposal is able to detect and revoke the GPS Spoofing signal with high accuracy reaching the 99% and low communication overhead.

Suggested Citation

  • Bada, Mousaab & Boubiche, Djallel Eddine & Lagraa, Nasreddine & Kerrache, Chaker Abdelaziz & Imran, Muhammad & Shoaib, Muhammad, 2021. "A policy-based solution for the detection of colluding GPS-Spoofing attacks in FANETs," Transportation Research Part A: Policy and Practice, Elsevier, vol. 149(C), pages 300-318.
  • Handle: RePEc:eee:transa:v:149:y:2021:i:c:p:300-318
    DOI: 10.1016/j.tra.2021.04.022
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S096585642100121X
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.tra.2021.04.022?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. McCallie, Donald & Butts, Jonathan & Mills, Robert, 2011. "Security analysis of the ADS-B implementation in the next generation air transportation system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 4(2), pages 78-87.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Rudys, Saulius & Aleksandravicius, Jurgis & Aleksiejunas, Rimvydas & Konovaltsev, Andriy & Zhu, Chen & Greda, Lukasz, 2022. "Physical layer protection for ADS-B against spoofing and jamming," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    2. Mark A. Revels & Mark Ciampa, 2018. "Can software defined radio be used to compromise ADS-B aircraft transponder signals?," Journal of Transportation Security, Springer, vol. 11(1), pages 41-52, June.
    3. Mäurer, Nils & Guggemos, Tobias & Ewert, Thomas & Gräupl, Thomas & Schmitt, Corinna & Grundner-Culemann, Sophia, 2022. "Security in Digital Aeronautical Communications A Comprehensive Gap Analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
    4. Riahi Manesh, Mohsen & Kaabouch, Naima, 2017. "Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 19(C), pages 16-31.
    5. Edquist, Charles & Zabala-Iturriagagoitia, Jon Mikel, 2012. "Public Procurement for Innovation as mission-oriented innovation policy," Research Policy, Elsevier, vol. 41(10), pages 1757-1769.
    6. Finke, Cindy & Butts, Jonathan & Mills, Robert & Grimaila, Michael, 2013. "Enhancing the security of aircraft surveillance in the next generation air traffic control system," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(1), pages 3-11.
    7. Matthew Smith & Martin Strohmeier & Vincent Lenders & Ivan Martinovic, 2022. "Understanding realistic attacks on airborne collision avoidance systems," Journal of Transportation Security, Springer, vol. 15(1), pages 87-118, June.
    8. Khan, Suleman & Gaba, Gurjot Singh & Braeken, An & Kumar, Pardeep & Gurtov, Andrei, 2023. "AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications," International Journal of Critical Infrastructure Protection, Elsevier, vol. 42(C).
    9. Li, Tengyao & Wang, Buhong, 2019. "Sequential collaborative detection strategy on ADS-B data attack," International Journal of Critical Infrastructure Protection, Elsevier, vol. 24(C), pages 78-99.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:transa:v:149:y:2021:i:c:p:300-318. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/wps/find/journaldescription.cws_home/547/description#description .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.