On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions

被引:19
|
作者
Khan, Shah Zahid [1 ]
Mohsin, Mujahid [1 ]
Iqbal, Waseem [2 ]
机构
[1] Natl Univ Sci & Technol NUST, Coll Aeronaut Engn CAE, Islamabad, Pakistan
[2] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad, Pakistan
关键词
GPS spoofing; Security threats; Survey; Taxonomy; UAVs; Drones; UNMANNED AIRCRAFT; VULNERABILITIES;
D O I
10.7717/peerj-cs.507
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs' demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks.
引用
收藏
页数:35
相关论文
共 50 条
  • [21] The potential of unmanned aerial systems for sea turtle research and conservation: a review and future directions
    Rees, Alan F.
    Avens, Larisa
    Ballorain, Katia
    Bevan, Elizabeth
    Broderick, Annette C.
    Carthy, Raymond R.
    Christianen, Marjolijn J. A.
    Duclos, Gwenael
    Heithaus, Michael R.
    Johnston, David W.
    Mangel, Jeffrey C.
    Paladino, Frank
    Pendoley, Kellie
    Reina, Richard D.
    Robinson, Nathan J.
    Ryan, Robert
    Sykora-Bodie, Seth T.
    Tilley, Dominic
    Varela, Miguel R.
    Whitman, Elizabeth R.
    Whittock, Paul A.
    Wibbels, Thane
    Godley, Brendan J.
    ENDANGERED SPECIES RESEARCH, 2018, 35 : 81 - 100
  • [22] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    Said El Kafhali
    Iman El Mir
    Mohamed Hanini
    Archives of Computational Methods in Engineering, 2022, 29 : 223 - 246
  • [23] Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing
    El Kafhali, Said
    El Mir, Iman
    Hanini, Mohamed
    ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (01) : 223 - 246
  • [24] Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions
    Mekala, Sri Harsha
    Baig, Zubair
    Anwar, Adnan
    Zeadally, Sherali
    COMPUTER COMMUNICATIONS, 2023, 208 : 294 - 320
  • [25] Implementation Research and Governance: Directions and Challenges for Future Research
    Cejudo, Guillermo M.
    May, Peter J.
    Saetren, Harald
    Hupe, Peter
    Winter, Soren
    GESTION Y POLITICA PUBLICA, 2018, 27 (01): : 269 - 283
  • [26] Human pose estimation using deep learning: review, methodologies, progress and future research directions
    Pranjal Kumar
    Siddhartha Chauhan
    Lalit Kumar Awasthi
    International Journal of Multimedia Information Retrieval, 2022, 11 : 489 - 521
  • [27] Human pose estimation using deep learning: review, methodologies, progress and future research directions
    Kumar, Pranjal
    Chauhan, Siddhartha
    Awasthi, Lalit Kumar
    INTERNATIONAL JOURNAL OF MULTIMEDIA INFORMATION RETRIEVAL, 2022, 11 (04) : 489 - 521
  • [28] Blockchain for Internet of Things (IoT) Research Issues Challenges & Future Directions: A Review
    Alamri, Malak
    Jhanjhi, N. Z.
    Humayun, Mamoona
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (05): : 244 - 258
  • [29] MapReduce and Its Applications, Challenges, and Architecture: a Comprehensive Review and Directions for Future Research
    Khezr, Seyed Nima
    Navimipour, Nima Jafari
    JOURNAL OF GRID COMPUTING, 2017, 15 (03) : 295 - 321
  • [30] Challenges and Enablers for GDPR Compliance: Systematic Literature Review and Future Research Directions
    Zaguir, Nemer Alberto
    de Magalhaes, Guilherme Henrique
    Spinola, Mauro de Mesquita
    IEEE ACCESS, 2024, 12 : 81608 - 81630