Hostname: page-component-cd9895bd7-gbm5v Total loading time: 0 Render date: 2024-12-26T06:50:44.306Z Has data issue: false hasContentIssue false

Detection of Spoofing Attack using Machine Learning based on Multi-Layer Neural Network in Single-Frequency GPS Receivers

Published online by Cambridge University Press:  14 August 2017

E. Shafiee
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
M. R. Mosavi*
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
M. Moazedi
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
*

Abstract

The importance of the Global Positioning System (GPS) and related electronic systems continues to increase in a range of environmental, engineering and navigation applications. However, civilian GPS signals are vulnerable to Radio Frequency (RF) interference. Spoofing is an intentional intervention that aims to force a GPS receiver to acquire and track invalid navigation data. Analysis of spoofing and authentic signal patterns represents the differences as phase, energy and imaginary components of the signal. In this paper, early-late phase, delta, and signal level as the three main features are extracted from the correlation output of the tracking loop. Using these features, spoofing detection can be performed by exploiting conventional machine learning algorithms such as K-Nearest Neighbourhood (KNN) and naive Bayesian classifier. A Neural Network (NN) as a learning machine is a modern computational method for collecting the required knowledge and predicting the output values in complicated systems. This paper presents a new approach for GPS spoofing detection based on multi-layer NN whose inputs are indices of features. Simulation results on a software GPS receiver showed adequate detection accuracy was obtained from NN with a short detection time.

Type
Research Article
Copyright
Copyright © The Royal Institute of Navigation 2017 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Arlot, S. and Celisse, A. (2010). Survey of Cross-Validation Procedures for Model Selection. Statistics Surveys, 4, 4079.CrossRefGoogle Scholar
Azami, H., Mosavi, M.R. and Sanei, S. (2013). Classification of GPS Satellites using Improved Back Propagation Training Algorithms. Wireless Personal Communications, 71(2), 789803.CrossRefGoogle Scholar
Baziar, A.R., Moazedi, M., Mosavi, M.R. (2015). Analysis of Single Frequency GPS Receiver Under Delay and Combining Spoofing Algorithm. Wireless Personal Communication, 83(3) 19551970.Google Scholar
Bhatia, N. and Vandana, A. (2010). Survey of Nearest Neighbor Techniques. International Journal of Computer Science and Information Security, 8(2), 302305.Google Scholar
Bonebrake, C. and O'Neil, L.R. (2014). Attacks on GPS Time Reliability. IEEE Transactions on Security & Privacy, 12(3), 8285.CrossRefGoogle Scholar
Burmana, P. (1989). Comparative Study of Ordinary Cross-Validation, R-Fold Cross-Validation and the Repeated Learning-Testing Methods. Great Britain, 76(3), 503514.Google Scholar
Cavaleri, A., Motella, A.B., Pini, M. and Fantino, M. (2010). Detection of Spoofed GPS Signals at Code and Carrier Tracking Level. The 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing, 16.Google Scholar
Han, J., Pei, J. and Kamber, M. (2011). Data Mining, Concepts, Models, Methods and Algorithms, Elsevier Press.Google Scholar
Hassanat, A.B., Abbadi, M.A., Altarawneh, G.A. and Alhasanat, A.A. (2014). Solving the Problem of the K Parameter in the KNN Classifier using an Ensemble Learning Approach. International Journal of Computer Science and Information Security, 12(8), 3339.Google Scholar
Humphreys, T.E., Psiaki, M.L., Kintner, P.M. and Ledvina, B.M. (2006). GNSS Receiver Implementation on a DSP: Status, Challenges and Prospects. International Technical Meeting of the Satellite Division of the Institute of Navigation, 113.Google Scholar
Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O'Hanlon, B.W. and Kintner, P.M. (2008). Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. The 21st International Technical Meeting of the Satellite Division of the Institute of Navigation, 23142325.Google Scholar
Jahromi, A.J., Broumandan, A., Nielsen, L. and Lachapelle, G. (2012a). GPS Spoofer Countermeasure Effectiveness Based on Signal Strength, Noise Power and C/N0 Observables. International Journal of Satellite Communications and Networking, 30(4), 181191.CrossRefGoogle Scholar
Jahromi, A.J., Broumandan, A., Nielsen, J. and Lachapelle, G. (2012b). GPS Vulnerability to Spoofing Threats and a Review of Anti-spoofing Techniques. International Journal of Navigation and Observation, 116.CrossRefGoogle Scholar
Jahromi, A.J., Lin, T., Broumandan, A., Nielsen, J. and Lachapelle, G. (2012c). Detection and Mitigation of Spoofing Attacks on a Vector-Based Tracking GPS Receiver. International Technical Meeting of the Institute of Navigation, 790800.Google Scholar
Jovanovic, A., Botteron, C. and Farine, P.A. (2014). Multi-test Detection and Protection Algorithm Against Spoofing Attacks on GNSS Receivers. IEEE Position, Location and Navigation Symposium, 12581271.Google Scholar
Kantardzic, M. (2003). Data Mining - Concepts, Models, Methods and Algorithms. IEEE Press, Wiley-Interscience.Google Scholar
Lashley, M. and Bevly, D. (2009). What About Vector Tracking Loops? GNSS Solutions, 16.Google Scholar
Lo, S.C. and Enge, P.K. (2010). Authenticating Aviation Augmentation System Broadcasts. IEEE/ION Position Location and Navigation Symposium, 708717.CrossRefGoogle Scholar
Ma, C.M., Yang, W.S. and Cheng, B.W. (2014). How the Parameters of K-Nearest Neighbor Algorithm Impact on the Best Classification Accuracy. Journal of Applied Sciences, 14(2), 171174.CrossRefGoogle Scholar
Montgomery, P.Y., Humphreys, T.E. and Ledvina, B.M. (2009a). A Multi-Antenna Defense: Receiver-autonomous GPS Spoofing Detection. Inside GNSS, 4(2), 4046.Google Scholar
Montgomery, P.Y., Humphreys, T.E. and Ledvina, B.M. (2009b). Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense against a Portable Civil GPS Spoofer. Institute of International Technical Meeting of the Institute of Navigation, 17.Google Scholar
Mosavi, M.R., Mohammadi, K., M. Refan, H. and Farrokhi, M. (2003). Prediction of Errors and Improvement of Position Accuracy on Low Cost GPS Receiver with MLP Neural Network. The 11th Iranian Conference on Electrical Engineering, 3, 513520.Google Scholar
Mosavi, M.R. (2007). GPS Receivers Timing Data Processing using Neural Networks: Optimal Estimation and Errors Modeling, International Journal of Neural Systems, 17(5), 383393.CrossRefGoogle ScholarPubMed
Mosavi, M.R. and Shafiee, F. (2016). Narrowband Interference Suppression for GPS Navigation using Neural Networks, GPS Solutions, 20(3), 341351.CrossRefGoogle Scholar
Niedermeier, H., Beckmann, H. and Eissfeller, B. (2012) Robust, Secure and Precise Vehicle Navigation System for Harsh GNSS Signal Conditions. The 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, 15891600.Google Scholar
Nielsen, J., Broumandan, A. and Lachapelle, G. (2010). Spoofing Detection and Mitigation with a Moving Handheld Receiver. GPS World Magazine, 21(9), 2733.Google Scholar
Nielsen, J., Dehghanian, V. and Lachapelle, G. (2012). Effectiveness of GNSS Spoofing Countermeasure based on Receiver CNR Measurements. International Journal of Navigation and Observation, 19.CrossRefGoogle Scholar
Ochin, E., Dobryakova, L. and Lemieszewski, L. (2012). Antiterrorism-Design and Analysis of GNSS Anti-spoofing Algorithms. Scientific Journals Zeszyty Naukowe Maritime University of Szczecin, 93101.Google Scholar
Petovello, M.G. (2003) Real-Time Integration of a Tactical-Grade IMU and GPS for High-Accuracy Positioning and Navigation, Ph.D. Thesis, Department of Geomatics Engineering, University of Calgary, Alberta, Canada.Google Scholar
Pini, M., Fantino, M., Cavaleri, A., Ugazio, S. and Presti, L.L. (2001). Signal Quality Monitoring Applied to Spoofing Detection. The 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, 18881896.Google Scholar
Visa, S., Ramsay, B., Ralescu, A. and Knaap, E.V.D. (2011). Confusion Matrix-based Feature Selection. The 22nd Midwest Artificial Intelligence and Cognitive Science Conference, 18.Google Scholar
Wesson, K.D., Shepard, D.P., Bhatti, J.A. and Humphreys, T.E. (2011). An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing. The 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, 111.Google Scholar