Cargando…

On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions

Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and h...

Descripción completa

Detalles Bibliográficos
Autores principales: Khan, Shah Zahid, Mohsin, Mujahid, Iqbal, Waseem
Formato: Online Artículo Texto
Lenguaje:English
Publicado: PeerJ Inc. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114815/
https://www.ncbi.nlm.nih.gov/pubmed/34013033
http://dx.doi.org/10.7717/peerj-cs.507
_version_ 1783691123391201280
author Khan, Shah Zahid
Mohsin, Mujahid
Iqbal, Waseem
author_facet Khan, Shah Zahid
Mohsin, Mujahid
Iqbal, Waseem
author_sort Khan, Shah Zahid
collection PubMed
description Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs’ demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks.
format Online
Article
Text
id pubmed-8114815
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher PeerJ Inc.
record_format MEDLINE/PubMed
spelling pubmed-81148152021-05-18 On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions Khan, Shah Zahid Mohsin, Mujahid Iqbal, Waseem PeerJ Comput Sci Algorithms and Analysis of Algorithms Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs’ demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks. PeerJ Inc. 2021-05-06 /pmc/articles/PMC8114815/ /pubmed/34013033 http://dx.doi.org/10.7717/peerj-cs.507 Text en ©2021 Khan et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited.
spellingShingle Algorithms and Analysis of Algorithms
Khan, Shah Zahid
Mohsin, Mujahid
Iqbal, Waseem
On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_full On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_fullStr On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_full_unstemmed On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_short On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_sort on gps spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
topic Algorithms and Analysis of Algorithms
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8114815/
https://www.ncbi.nlm.nih.gov/pubmed/34013033
http://dx.doi.org/10.7717/peerj-cs.507
work_keys_str_mv AT khanshahzahid ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections
AT mohsinmujahid ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections
AT iqbalwaseem ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections