{"title":"一举多得:通过众包提高 GPS 的准确性和安全性","authors":"Mahsa Foruhandeh, Hanchao Yang, Xiang Cheng, Angelos Stavrou, Haining Wang, Yaling Yang","doi":"10.1016/j.comnet.2024.110775","DOIUrl":null,"url":null,"abstract":"<div><p>GPS is an integral part of billions of devices that serve a wide range of applications. This reliance upon GPS renders the users vulnerable to GPS spoofing attacks, especially when in need of precise or real-time location information. To protect commodity devices, we first propose a crowdsourcing-based method for detecting GPS spoofing. In this method, called method I, we leverage the orientation diversity of different users to expose spoofing attacks and, in many cases, the location of the attacker. In all scenarios, our method not only recovers the correct location but also significantly improves the location accuracy. This is an important incentive that can drive the adoption of our approach along with the use of privacy-preserving location sharing. Additionally, we leverage the users’ distances produced by GPS and Bluetooth measurements to detect discrepancies and account for errors, called Method II. Method II is robust even in the presence of multiple coordinate adversaries. The experimental results based on our prototype implementation and large-scale simulations demonstrate a detection rate as high as 98.72<!--> <!-->% and latency of 62<!--> <!-->ms with average localization error of 2.43<!--> <!-->m.</p></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"All in one: Improving GPS accuracy and security via crowdsourcing\",\"authors\":\"Mahsa Foruhandeh, Hanchao Yang, Xiang Cheng, Angelos Stavrou, Haining Wang, Yaling Yang\",\"doi\":\"10.1016/j.comnet.2024.110775\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>GPS is an integral part of billions of devices that serve a wide range of applications. This reliance upon GPS renders the users vulnerable to GPS spoofing attacks, especially when in need of precise or real-time location information. To protect commodity devices, we first propose a crowdsourcing-based method for detecting GPS spoofing. In this method, called method I, we leverage the orientation diversity of different users to expose spoofing attacks and, in many cases, the location of the attacker. In all scenarios, our method not only recovers the correct location but also significantly improves the location accuracy. This is an important incentive that can drive the adoption of our approach along with the use of privacy-preserving location sharing. Additionally, we leverage the users’ distances produced by GPS and Bluetooth measurements to detect discrepancies and account for errors, called Method II. Method II is robust even in the presence of multiple coordinate adversaries. The experimental results based on our prototype implementation and large-scale simulations demonstrate a detection rate as high as 98.72<!--> <!-->% and latency of 62<!--> <!-->ms with average localization error of 2.43<!--> <!-->m.</p></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2024-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128624006078\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128624006078","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
摘要
全球定位系统是服务于各种应用的数十亿设备不可或缺的一部分。这种对 GPS 的依赖使用户容易受到 GPS 欺骗攻击,尤其是在需要精确或实时位置信息时。为了保护商品设备,我们首先提出了一种基于众包的 GPS 欺骗检测方法。在这个被称为方法 I 的方法中,我们利用不同用户的定位多样性来揭露欺骗攻击,并在许多情况下揭露攻击者的位置。在所有情况下,我们的方法不仅能恢复正确的位置,还能显著提高定位精度。这是一个重要的激励因素,可以推动我们的方法与保护隐私的位置共享一起得到采用。此外,我们还利用全球定位系统和蓝牙测量产生的用户距离来检测差异并考虑误差,这被称为方法 II。方法 II 即使在存在多个坐标对手的情况下也很稳健。基于我们的原型实施和大规模模拟的实验结果表明,检测率高达 98.72%,延迟时间为 62 毫秒,平均定位误差为 2.43 米。
All in one: Improving GPS accuracy and security via crowdsourcing
GPS is an integral part of billions of devices that serve a wide range of applications. This reliance upon GPS renders the users vulnerable to GPS spoofing attacks, especially when in need of precise or real-time location information. To protect commodity devices, we first propose a crowdsourcing-based method for detecting GPS spoofing. In this method, called method I, we leverage the orientation diversity of different users to expose spoofing attacks and, in many cases, the location of the attacker. In all scenarios, our method not only recovers the correct location but also significantly improves the location accuracy. This is an important incentive that can drive the adoption of our approach along with the use of privacy-preserving location sharing. Additionally, we leverage the users’ distances produced by GPS and Bluetooth measurements to detect discrepancies and account for errors, called Method II. Method II is robust even in the presence of multiple coordinate adversaries. The experimental results based on our prototype implementation and large-scale simulations demonstrate a detection rate as high as 98.72 % and latency of 62 ms with average localization error of 2.43 m.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.