留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

无人机GPS欺骗干扰攻击对策

陈立军 潘正军 陈孝如

陈立军, 潘正军, 陈孝如. 无人机GPS欺骗干扰攻击对策[J]. 全球定位系统, 2023, 48(4): 91-98. doi: 10.12265/j.gnss.2023026
引用本文: 陈立军, 潘正军, 陈孝如. 无人机GPS欺骗干扰攻击对策[J]. 全球定位系统, 2023, 48(4): 91-98. doi: 10.12265/j.gnss.2023026
CHEN Lijun, PAN Zhengjun, CHEN Xiaoru. Countermeasure of UAV GPS spoofing jamming attcck[J]. GNSS World of China, 2023, 48(4): 91-98. doi: 10.12265/j.gnss.2023026
Citation: CHEN Lijun, PAN Zhengjun, CHEN Xiaoru. Countermeasure of UAV GPS spoofing jamming attcck[J]. GNSS World of China, 2023, 48(4): 91-98. doi: 10.12265/j.gnss.2023026

无人机GPS欺骗干扰攻击对策

doi: 10.12265/j.gnss.2023026
基金项目: 2021年度广东省普通高校重点科研平台和科研项目(2021KTSCX160)
详细信息
    作者简介:

    陈立军:(1974—),男,硕士,讲师,研究方向为无人机安全

    潘正军:(1985—),男,硕士,副教授,研究方向为无人机安全

    陈孝如:(1975—),男,硕士,副教授,研究方向为无人机安全

    通讯作者:

    陈立军 E-mail:372158286@qq.com

  • 中图分类号: P228.4

Countermeasure of UAV GPS spoofing jamming attcck

  • 摘要: 自主和半自主的无人机群(unmanned aerial vehicles,UAVs)开始引发大量的研究兴趣和来自各种民用应用领域的需求,然而,为成功执行各种任务,无人机群需要GPS的信号. 民用GPS信号是未加密和未认证的,这为GPS欺骗攻击的实施提供了便利,在这些攻击中,对手通过模仿真实的GPS信号,并将其广播给目标无人机,以改变其航线,迫使其降落或坠毁. 在这项研究中,提出了一种GPS欺骗检测机制,能够检测单发射器和多发射器的GPS欺骗攻击,以防止改变其航线或坠毁. GPS欺骗是基于比较每两个蜂群成员之间从其GPS坐标计算出的距离和同一蜂群成员之间从脉冲无线电超宽带测距获得的距离,如果距离的差异大于选定的阈值,则宣布检测到GPS欺骗攻击. 通过案例证明:检测机制优于现存的检测技术,它无需修改原有的天线和安装额外的硬件,便可检测GPS欺骗攻击,并且也不需要复杂的计算和通信开销,减少了误报,使检测机制更加可靠.

     

  • 图  1  单发射器GPS欺骗攻击

    Figure  1.  Single transmitter GPS spoofing attack

    图  2  多发射机GPS欺骗攻击

    Figure  2.  Multi-transmitter GPS spoofing attack

    图  3  UAV到集群中其他UAVs的IR-UWB测距数据采集过程

    Figure  3.  IR-UWB ranging data acquisition process from one UAV to other UAVs in the cluster

    表  1  GPS欺骗检测机制

    Table  1.   GPS spoofing detection mechanism

    机制 方法 限制和缺点 检测率
    基于车辆网络(vehicle network,VN) 到达时间相关性 仅适用于VN;需要车对车通信 不适用
    基于摄像头的视频流 帧和坐标之间的相关性 速度和地形可靠;要求摄像机始终指
    向下方
    不适用
    Crowd-GPS-Sec 到达时间、信号财产和广播式自动相关监视(automatic dependent surveillance - broadcast,
    ASD-B)信息分析
    需要额外的地面基础设施 75.0 %
    基于蜂窝网络 位置有效性交叉检查 需要蜂窝模块;需要蜂窝网络覆盖 95.0 %
    基于陀螺仪和加速计 位置估计 需要额外的运动传感器进行精确检测 96.0 %
    基于IMU 机器学习 计算开销;受初始训练数据集的限制 96.3 %
    多接收器 位置比较 需要额外的硬件;不适用于小型无人机 99.0 %
    天线阵列 GPS信号的到达方向 需要额外的硬件;不适用于小型无人机 99.0 %
    基于蜂窝网络 位置验证 需要额外的蜂窝模块;不适合农村地区 100.0 %
    本文的GPS欺骗检测机制 距离验证 不需要额外的硬件,适用于小型、
    中型无人机
    100.0 %
    下载: 导出CSV

    表  2  GPS欺骗攻击检测准则

    Table  2.   GPS spoofing attack detection criteria

    欺骗攻击场景 受影响的无人机 攻击检测准则
    单发射机 1 GGPS(UUAV1)≠GGPS (UUAVi ), i∈{2, ···, n}$ \left| {d_{{\text{GPS}}}^{1,i} - d_{{\text{UWB}}}^{1,i}} \right| > {d_{{\text{THR}}}} $
    >1 GGPS(UUAV1)$\cong $GGPS (UUAVi ), i∈{2, ···, n} 或$ \left| {d_{{\text{GPS}}}^{1,i} - d_{{\text{UWB}}}^{1,i}} \right| > {d_{{\text{THR}}}} $
    多发射机 1 GGPS(UUAV1)≠GGPS (UUAVi ), i∈{2, ···, n}$ \left| {d_{{\text{GPS}}}^{1,i} - d_{{\text{UWB}}}^{1,i}} \right| > {d_{{\text{THR}}}} $
    >1 GGPS(UUAV1)$\cong $GGPS (UUAVi ), i∈{2, ···, n}或
    GGPS(UUAV1)≠GGPS (UUAVi ), i∈{2, ···, n}$ \left| {d_{{\text{GPS}}}^{1,i} - d_{{\text{UWB}}}^{1,i}} \right| > {d_{{\text{THR}}}} $
    下载: 导出CSV

    表  3  算法:GPS欺骗检测机制

    输入:群的位置(swarm_positions )
     群测距(swarm_ranging)
     数学函数(math)
    class GPS_Distance://类GPS_Distance
     def init (timestamp self, int latitude, float longitude, float altitude) //初始化
     self.timestamp: timestamp //时间戳
     self.latitude = latitude //纬度
     self.longitude: = longitude //经度
     self.altitude: = altitude //纬度
     def calc_ditance(self, other: ‘swarm_positions’) //定义计算距离
     distances = {}
     timestamp = min(self.timestamp, other.timestamp) //多个时间戳最小化
     distances[‘gps_timestamp’] = timestamp
     //从度到弧度的转换rad_lat_self = self.latitude * math.pi/180 依次类推
     R = 6371000
     d_flat = math.acos(math.sin(rad_lat_self)*
     math.sin(rad_lat_other)+math.cos(rad_lat_self)*
     math.cos(rad_lat_other)
     *math.cos(rad_delta)*R)
    #相对于高度的欧氏距离欧氏位置distance = math.sqrt(d_flat**2 + (self.altitude - other.altitude)**2) distances[‘gps_dist’] = euclidian_distance
     return distances //返回输出
    class Spoofing_Detection:// 类Spoofing_Detection
     def init (self, gps_dist, uwb_dist,gps_timestamp, ubw_timestamp, time_threshold, dist_threshold)//初始化
     self.gps_dist = gps_dist //GPS距离
     self.uwb_dist = uwb_dist //UWB距离
     self.gps_timestamp = gps_timestamp //GPS时间戳
     self.uwb_timestamp = uwb_timestamp //UWB时间戳
     self.time_thr = time_threshold //时间阈值
     self.dist_thr = dist_threshold //距离阈值
     def distance_comparison(self): //定义距离_比较
     if math.isclose(0, self.gps_dist, abs_tol=10**-1)://比较
     return Spoofing //返回欺骗
     elseif abs(self.uwb_dist–self.gps_dist)>self.dist_thr and abs(self.gps_timestamp self.uwb_timestamp) >
     self.time_thr: //否则再进行比较
     Spoofing = true
     return Spoofing //返回欺骗
     else:
     Spoofing = false
     return Spoofing //返回欺骗
    def main():
    fail_safe = false
    get_gps_dist = GPS_Distance.calc_ditance(UAV1,UAVi) //得到GPS距离
    Spoofing = Spoofing_Detection.distance_comparison(GPS,UWB) //欺骗检测距离比较
     if Spooting == true:
      fail_safe = true
     if name == "main":
    main()
    下载: 导出CSV
  • [1] DALSJO R, JONSSON M, NORBERG J. A brutal examination: russian military capability in light of the ukraine war [J]. Survival, 2022, 64(3): 7-28. DOI: 10.1080/00396338.2022.2078044
    [2] POLKA M, PTAK S, KUZIORA Ł. The use of UAV's for search and rescue operations [J]. Procedia engineering, 2017(192): 748-752. DOI: 10.1016/j.proeng.2017.06.129
    [3] ELDOSOUKY A R, FERDOWSI A, SAAD W. Drones in distress: a game-theoretic countermeasure for protecting UAVS against GPS spoofing[J]. IEEE internet of things journal, 2019, 7(4): 2840-2854. DOI: 10.48550/arXiv.1904.11568
    [4] AGGARWAL S, KUMAR N. Path planning techniques for unmanned aerial vehicles: a review, solutions, and challenges[J]. Computer communications, 2020(149): 270-299. DOI: 10.1016/j.comcom.2019.10.014
    [5] BERGH B V D, POLLIN S. Keeping UAVs under control during GPS jamming[J]. IEEE systems journal, 2019, 13(2): 2010-2021. DOI: 10.1109/JSYST.2018.2882769
    [6] KHOEI T T, ISMAIL S S, KAABOUCH N. Dynamic selection techniques for detecting GPS spoofing attacks on UAVs[J]. Sensors, 2022, 22(2): 662. DOI: 10.3390/s22020662
    [7] LY B, LY R. Cybersecurity in unmanned aerial vehicles (UAVs)[J]. Journal of cyber security technology, 2021, 5(2): 120-137. DOI: 10.1080/23742917.2020.1846307
    [8] FENG Z W, GUAN N, LV M S, et al. Efficient drone hijacking detection using onboard motion sensors [C]//Design, Automation & Test in Europe Conference & Exhibition (DATE), IEEE, 2017. DOI: 10.23919/DATE.2017.7927214
    [9] FENG Z W, GUAN N, LV M S, et al. Efficient drone hijacking detection using two-step GA-XGBoost [J]. Journal of systems architecture, 2019(103): 101694. DOI: 10.1016/j.sysarc.2019.101694
    [10] JANSEN K, TIPPENHAUER N O, PÖPPER C, et al. Multi-receiver GPS spoofing detection: error models and realization[C]//The 32nd Annual Conference on Computer Security Applications 2016. DOI: 10.1145/2991079.2991092
    [11] MILAAT F A, LIU H. Decentralized detection of GPS spoofing in vehicular ad hoc networks [J]. IEEE communications letters, 2018, 22(6): 1256-1259. DOI: 10.1109/LCOMM.2018.2814983
    [12] JANSEN K, SCHÄFER M, MOSER D, et al. Crowd-GPS-sec: leveraging crowdsourcing to detect and localize GPS spoofing attacks[C]//IEEE Symposium on Security and Privacy (SP), 2018. DOI: 10.1109/SP.2018.00012
    [13] DAVIDOVICH B, NASSI B, ELOVICI Y. Towards the detection of GPS spoofing attacks against drones by analyzing camera’s video stream[J]. Sensors, 2022, 22(7): 2608. DOI: 10.3390/s22072608
    [14] OLIGERI G , SCIANCALEPORE S , IBRAHIM O A, et al. Drive me not: GPS spoofing detection via cellular network[C]//The 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019. DOI: 10.1145/3317549.3319719
    [15] DANG Y C, BENZAÏD C, SHEN Y L, et al. GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs[C]//IEEE Global Communications Conference 2020. DOI: 10.1109/GLOBECOM42002.2020.9348030
    [16] MAGIERA J, KATULSKI R. Detection and mitigation of GPS spoofing based on antenna array processing [J]. Journal of applied research and technology, 2015, 13(1): 45-57. DOI: 10.1016/S1665-6423(15)30004-3
    [17] LY B, LY R. Cybersecurity in unmanned aerial vehicles (UAVs)[J]. Journal of cyber security technology, 2020, 5(4): 1-18. DOI: 10.1080/23742917.2020.1846307
    [18] TIEMANN J, FRIEDRICH J, WIETFELD C. Experimental evaluation of IEEE 802.15. 4z UWB ranging performance under interference [J]. Sensors (Basel), 2022, 22(4): 1643. DOI: 10.3390/s22041643
    [19] WING M G, EKLUND A, KELLOGG L D. Consumer-Grade Global Positioning System (GPS) accuracy and reliability [J]. Journal of forestry, 2005, 103(4): 169-173. DOI: 10.1093/JOF/103.4.169
    [20] RIDOLFI M, VAN DE VELDE S, STEENDAM H, et al. Analysis of the scalability of UWB indoor localization solutions for high user densities [J]. Sensors, 2018, 18(6): 1875. DOI: 10.3390/s18061875
    [21] TIAN Y J, SUI L F, XIAO G R, et al. Analysis of Galileo/BDS/GPS signals and RTK performance [J]. GPS solutions, 2019, 23(2): 37. DOI: 10.1007/s10291-019-0831-5
    [22] FLUERATORU L, WEHRLI S, MAGNO M, et al. On the energy consumption and ranging accuracy of ultra-wideband physical interfaces[C]//IEEE Global Communications Conference, 2020. DOI: 10.1109/GLOBECOM42002.2020.9347984
    [23] QUILES-LATORRE F J, GERSNOVIEZ A, ORTIZ-LÓPEZ M, et al. Active electronic egg for breeding of endangered birds [J]. IEEE sensors journal, 2021, 21(22): 26086-26103. DOI: 10.1109/jsen.2021.3114639
  • 加载中
图(3) / 表(3)
计量
  • 文章访问数:  290
  • HTML全文浏览量:  318
  • PDF下载量:  64
  • 被引次数: 0
出版历程
  • 收稿日期:  2023-03-01
  • 录用日期:  2023-07-31
  • 网络出版日期:  2023-08-22

目录

    /

    返回文章
    返回