You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/348336032

GPS Spoofing: Detecting GPS Fraud in Unmanned Aerial Vehicles

Conference Paper · November 2020


DOI: 10.1109/LARS/SBR/WRE51543.2020.9307036

CITATIONS READS
0 52

4 authors:

Isadora Ferrao Sherlon Almeida da Silva


University of São Paulo University of São Paulo
5 PUBLICATIONS   1 CITATION    9 PUBLICATIONS   4 CITATIONS   

SEE PROFILE SEE PROFILE

Daniel Fernando Pigatto Kalinka Castelo Branco


Federal University of Technology - Paraná/Brazil (UTFPR) University of São Paulo
45 PUBLICATIONS   256 CITATIONS    134 PUBLICATIONS   582 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Internet of Flying Things (IoFT) View project

Workshop on Communications in Critical Embedded Systems (WoCCES) View project

All content following this page was uploaded by Isadora Ferrao on 14 April 2021.

The user has requested enhancement of the downloaded file.


GPS Spoofing: Detecting GPS fraud in unmanned
aerial vehicles
1st Isadora G. Ferrão 2rd Sherlon A. da Silva 3th Daniel F. Pigatto 1st Kalinka R. L. J. C. Branco
Univ. de São Paulo (USP) Univ. de São Paulo (USP) Univ. do Tecnológica Federal Univ. de São Paulo (USP)
São Carlos, SP - Brazil São Carlos, SP - Brazil do Paraná (UTFPR) São Carlos, SP - Brazil
isadoraferrao@usp.br sherlon@usp.br Curitiba, PR - Brazil kalinka@icmc.usp.br
pigatto@utfpr.edu.br

adapted to the random events that arise during the mission,


Abstract—The exponential growth in the Unmanned Aerial thus seeking to ensure autonomy and safety for the aircraft.
Vehicles (UAVs) market is pointed out in recent reports. It is UAVs face numerous challenges to navigate autonomously
believed that in 2022 UAVs will represent the largest share in
the global market. Therefore, the rapid and growing evolution in a viable and safe way [5]. To fully integrate UAVs into
of the market must be accompanied by the improvement of solid today’s airspace, it is necessary to work on autonomous
principles of decision-making, security, and technologies. They monitoring and management technologies that are resistant to
must continually adapt to face missions where they deal with attacks to provide the essential security for the aircraft and the
unforeseen problems. The increase in advanced functionality and environment.
the demand for computational capacity exposes UAVs to different
security vulnerabilities. These vulnerabilities are growing not The increase in functionality and the demand for computing
only in number but also in sophistication. Failures in UAVs
can endanger the safety of people and the environment. The capacity exposes UAVs to different security vulnerabilities.
vulnerability of GPS systems has been a significant concern for These vulnerabilities are growing not only in number but also
civil aviation. It is the most recurrent failure, has a low level of in sophistication. Failures in UAVs can endanger the safety of
complexity of exploration, and leads to a compromise of missions people and the environment.
through the possibility of theft and even the destruction of the
vehicle after a fall. Based on that, this work proposes to carry The vulnerability of GPS systems has been a major concern
out three studies involving GPS attacks in UAVs. The first will be for military and civil aviation. It is the most recurrent failure
a case study to validate two proposed metrics for detecting GPS
fraud. The second will be using a free app for counterfeiting GPS [6], has a low level of complexity of exploration, and leads
on a real UAV and, finally, the implementation of two metrics, to compromised missions through the possibility of vehicle
one for security and one for module’s health that can be coupled theft and even destruction after a fall. In [7], it is claimed
to UAV architectures, enabling these vehicles to be able to detect that GPS counterfeiting has been recognized as a serious
the GPS attack. threat to critical infrastructure applications that depend on
Index Terms—Security and Safety for UAVs, GPS Spoofing in
UAVs. the public GPS signal. They say it will take some years for
these technologies to mature and be implemented on a large
I. I NTRODUCTION scale and that there is a complete absence of any commercial
With technological progress in electronic and avionic sys- defense against a counterfeit GPS drone attack.
tems, mainly aimed at miniaturization and cost reduction, Based on the facts mentioned above, this work proposes
it has leveraged academic and economic performance and three studies involving GPS attacks in UAVs. The first will be
interest in these aircraft. The exponential growth in the a case study to analyze a situation where a UAV is subjected
unmanned aerial vehicle market is pointed out in recent to a GPS Spoofing attack and what actions should be taken.
reports, as can be seen in current research and reports [1]– The first will be a case study to analyze how the two metrics
[3]. According to Market, in 2022, UAVs will represent the proposed in this work behave when exposed to two situations,
global market’s largest share [4]. Therefore, rapid and growing one in a normal flight situation and the other where UAV is
market evolution must be accompanied by the improvement of subjected to GPS fraud. The second will be using a free app
solid principles of decision-making, security, and technologies. for counterfeiting GPS on a real drone, thus showing how easy
These vehicles must continually adapt to face missions where it is to exploit this vulnerability on civilian drones. Finally, the
they face unforeseen problems. third contribution of this work will be the implementation and
The improvement of these vehicles must consider the ob- testing of two metrics, one of security and the other of health,
jective of the mission and the adaptation of the actions. In which can be coupled to UAVs architecture, allowing these
other words, the actions that the drone must follow must be vehicles to detect the attack of GPS. This third study was
coupled and validated within the mobility and security-based
978-0-7381-1153-7/20/$31.00 ©2020 IEEE data communication architecture (HAMSTER) [8].
II. R ELATED W ORK and secondary. Primary modules correspond to the crucial
One of the main attacks and which reflects major threats to components of the aircraft to fly, to be aware of its location
vehicles and systems of unmanned aircraft is the falsification and to be able to make an emergency landing safely. Examples
of GPS [9]. In the case of military signals, this type of attack of these modules are GPS receiver, Autopilot, Radar, etc. The
is more difficult to occur because the signal is encrypted, metrics developed will be coupled within the SPHERE.
however, the civil GPS signal, on the other hand, is considered SPHERE is implemented by three modules: (1) CSU, (2)
publicly and easily predictable because it is not encrypted. SMU, and (3) SPMU.
Todd Humphrey’s demonstrated that a GPS counterfeiting • CSU: is responsible for the authentication and confiden-
attack could be commanded in mid-flight, pointing out that tiality mechanisms of the transmitted data.
vulnerabilities in GPS and communication signals can lead • SMU: is responsible for managing the registration, dis-
an attacker to hijack an aircraft completely [10]. For this, covery, and forecasting of services, considering the secu-
there are devices such as Commercial Off The Shelf (COTS), rity policies of sensitivity, and data trust among devices.
responsible for falsifying and relaying authentic GPS signals • SPMU: is responsible for monitoring the integrity of the
to deceive air vehicles [11]. modules.
According to Anthony Spears [7], GPS currently represents
a single common point of failure in many UAV systems and
IV. S AFETY AND SECURITY METRICS
also presents the need for a redundant positioning system.
The positioning system is indicated to improve the accuracy One of the concerns in the design and development of UAV
of the GPS sensor, thus improving the detection of errors systems has been to ensure safety requirements. However,
or falsification of positions and redundancies in the event of since these vehicles communicate with external entities, some
loss of signals. In [12], the researchers demonstrated that a architectures designed to provide safety requirements can
GPS spoofer defined by inexpensive portable software could present security flaws. Similarly, security requirements can
be built from ready-to-use components, highlighting the threat have safety flaws. Therefore, it is necessary to investigate
of forgery. and treat safety and security in UAV together. Based on that,
In [7] the authors claim that GPS counterfeiting has been this paper investigates the incorporation of security and safety
recognized as a severe threat to many critical infrastructure ap- metrics as a unified concept in the development of UAVs.
plications that rely heavily on the public GPS signal. Besides, 1) Security metric: The metric used to guarantee security
they say it will still be a few years before these technologies in this work is located within CSU, a SPHERE module
mature and are implemented on a large scale. In other words, which is responsible for the authentication and confidentiality
there is a complete absence of any commercial defense against mechanisms of the transmitted data. The metric is divided
a GPS counterfeiting attack. into three phases: (1) Gathering information, (2) Haversine
III. H AMSTER formula, and (3) Verifying the integrity of the transmitted data.
HAMSTER is a data communication architecture designed When collecting information, the drone station is responsi-
for improving mobility, security and safety of the overall ble for informing the CSU what data is being received, such
system [8]. The HAMSTER is divided into three categories: as GPS positioning (Latitude and Longitude) and when the
(1) Flying HAMSTER for air vehicles, (2) Swimming HAM- action occurred (hour and minute).
STER for aquatic vehicles, and (3) Running HAMSTER for After the data is collected for the CSU, the Haversine
land vehicles. HAMSTER integrates four platforms: (1)NIM- formula is applied. The Haversine formula is an equation used
BLE: platform handles the external communication of vehicles in navigation to provide distance between points on a sphere,
through the use of two modules, ADHOC, and INFRA; from the collection of its geographical coordinates (Latitudes
(2)NCI: platform is responsible for determining the priority of and Longitudes). It is used to calculating the distance of the
nodes in the network through an index; (3) NP: The NP plat- large circle between two points, i.e. the shortest distance on
form is used to manage the navigation phases; (4)SPHERE: the earth’s surface, giving a distance “like the crow” between
The SPHERE platform is focused on architectural security the points (ignoring any hills they fly).
and safety issues. This paper will cooperate with SPHERE The formula works as follows: two points on a sphere (of
platform. Therefore, the next section is dedicated to SPHERE radius R) with Latitudes Lat1 and Lat2 , Latitude separation:
details. FinalLatitude = Lat2 − Lat1 , and separation of Longitude:
FinalLongitude = Long2 − Long1 , where the angles are in
A. SPHERE radians. The distance D can be obtained either by the simple
Security and safety Platform for HEteRogeneous systEms application of the inverse Haversine or by the use of the
(SPHERE) is a safety and security platform. Unmanned ve- arccosine function (inverse of the sine).
hicles have different peripherals and modules, so they require The Haversine central angle can be calculated between two
different levels of safety, thus leading to the need to classify points with R as the radius of the earth, D as the distance
modules according to their importance and criticality. Catego- between two points Latitude (Lat1 and Lat2 ) and Longitude
rization is done in modules regarding their criticality: primary (Long1 and Long2 ) using the following Equation 1:
of SPHERE, at SMU. The N CImSaf i will be used as a safety
 
D metric to measure the health of the module. The N CImSaf i
Haversine = haversine(Lat2 − Lat1 ) + cos(Lat1 )· of a module can be found by calculating the average between
R
the health index and the moduleP riority index, as shown
cos(Lat2 ) · haversine(Long2 − Long1 ) (1) in Equation 4. Health represents a score between [0,1] that
To calculate the distance between two geographical coordi- indicates the health status of a module. The moduleP riority
nates, the Haversine formula must be derived as follows: is a score [0,1] that identifies the importance of a module for
the overall security of the system.
 
2 LatDif f erence
A = sin + cos (Lat1 ) · cos (Lat2 )·

2
 N CImSaf
i = average(healthi , moduleP riorityi ) (4)
LongDif f erence
sin2 V. R ESULTS
2
√ √ A. Case study on an organ transplant scenario
C = 2 · arctan ( A, 1 − A)
R = 6371 The main contribution of this work was the development
and validation of a security metric and a health metric so
D =R·C that UAVs can detect GPS spoofing attacks. Therefore, a
(2) case study was carried out to assess how these metrics could
Where, improve security in an organ transplant mission. The metrics
• LatDif f erence = Lat1 − Lat2 (latitude difference); are applied experimentally in different scenarios to allow
• LongDif f erence = Long1 − Long2 (longitude differ- discussions about the likely implications. The development of
ence); this study comprised the realization of tasks divided into six
• R is the radius of the earth, that is, 6,371 km; stages, which are: (1) Choice of mission, (2) Choice of test
• D is the calculated distance between two points. cases, (3) Choice of aircraft models, (4) Stipulation of values
Finally, after applying Haversine, the time collected cal- (5) Generation of results and (6) Analysis of results.
culates the average drone speed along with the distance. • Choice of mission: Transport logistics in organ transplan-
From that, we have the instant (hour and minute) information, tation processes is often a complicated process. It usually
distance, and speed, whose metrics are used in this paper to involves expensive flights, depends on commercial flight
verify the security of GPS in the UAV. For example, a drone schedules, and the time of viability of an organ, for
travels at a maximum of 80 km/h. In a given time, the station example. Implantation can hinder donation among people
passes on data that, after calculating Haversine and the average in distant locations. To remedy this problem, UAVs are
speed (Equation 3), concludes that the drone is advancing at being used as an organ delivery system. In [13], a kidney
an average speed 200 km/h. Then, CSU can detect a supposed was delivered via a UAV to a patient who was waiting
problem (GPS spoofing) and send it to the decision-making for eight years. The drone was not only delivered, but
module. The decision-making module is planned for future it also monitored and maintained the appropriate kidney
work and will be the next step in this work. temperature. Drones, when used in transporting organs,
are faster and more economical to face the challenge of
Distance(d) time for organ transplant feasibility since many organs
Speed(s) = (3)
T ime(t) are not implanted due to the delay in displacement.
2) Safety metric: The metric used to ensure safety in However, to ensure that UAVs are indeed safe when using
this work will be the Node Criticality Index (NCI) [8]. The organ transport, safety and security requirements must
NCI is the specification of a formal criticality classification be intensively studied and improved, thus avoiding fatal
responsible for determining the priority of the nodes in the problems, such as organ theft.
network through an index. The reason for choosing this metric • Choice of test cases: This study consists of a test where
is twofold: 1) NCI guarantees the quality of service, safety, and an aircraft is arranged in two case scenarios. In the first
security for the nodes that make up the network and 2) NCI case, an aircraft acquires the data normally, without prob-
provides valuable information to the system that can influence lems. In the second scenario, the aircraft is subjected to a
the decision-making of tasks. Therefore, each module must be GPS attack and requires decision making. GPS spoofing
assigned with safety scores. is considered to be one of the most recurring threats
Scoring is carried out first during a configuration phase to UAVs [14]. The principle behind the GPS spoofing
and then automatically updated as a result of changes and attack is that, by sending the drone’s false geographic
events during system operation. The score assignment must coordinates to the control system, it is possible to trick
be a number within a range from 0 to 1, meaning common the on board system that hijacks the vehicle in a different
and critical data, respectively. location for which it is commanded.
The N CImSaf i will be the safety metric for a module i of • Choice of aircraft models: The aircraft model deter-
this architecture and will be located in the secondary module mined was the 3DR Solo Quadcopter. The reason for
choosing the aircraft is that it has an autopilot, ideal for TABLE II
organ transplantation cases. S CENARIO 1: N ORMAL OPERATION - S AFETY
• Stipulation of values: The data load used for the analysis
NCI Safety
of the security metric was collected with the 3DR Solo Module
health priority total
in São Carlos - SP. In the case of the safety metric, GPS 0 1 0.5
the fact that the NCI requires human intervention is not IMU 0 0.5 1
necessarily a problem, as it is executed only once before Camera 0 0 0
starting the operation of the unmanned vehicle. Scoring Autopilot 0 0.5 0.25
is performed first during a configuration phase and then Motor 0 0 0
automatically updated due to changes and events during Wifi 0 0.5 0.25
the operation of the system. This study’s score assignment
was a number within a range of 0 to 1, which means
common and critical data, respectively. hospital (São Carlos, SP) to the Santa Casa hospital (São
• Generation and analysis of results: In this step, the Carlos, SP). However, when trying to carry out the mission, it
values were assigned to their respective formulas for has a GPS flaw. It requires a decision from a human operator
security and safety. who monitors the entire operation, or from a drone decision-
1) Scenario 1: Normal operation: In this scenario, the 3DR making module.
Solo is used to transplant a heart from UFSCar University If there is a sudden change in location, and if the drone
hospital (São Carlos, SP) to Santa Casa hospital (São Carlos, travels at a distance in an undue period, as shown in Table
SP). The ground communicates with a base station via a III, then a GPS spoofing alert is issued to the station. The
WiFi transmitter. The Solo has an Inertial Measurement Unit decision-making module is invoked. A new mission is then
(IMU) and a GPS to identify its location and capture images. automatically defined for the damaged 3DR Solo to maintain
This autopilot also powers the camera, motors, and WiFi communication as long as possible with the central station.
transmitter/receiver. Now, if we assume that the change of location is not sudden
In Table I we have the test case for a normal transplant and the drone is in an acceptable time range, however, it did
operation. Latitude and longitude corresponding to the starting not follow the informed route. Then, an alert is issued by the
point (at 13:31), the median distance point (at 13:35), and the SMU with the NCI, reporting that the GPS has a malfunction,
arrival point (at 13:38). After converting the angles for radians, not following the predefined route. This case will be better
applying Haversine, and collecting time, we have the result explained below, but it is possible to notice the importance
of the average speeds. The 3DR Solo reaches 80km/h, so it of the safety and security modules working together from this
is concluded that the flight is stable, that is, in an acceptable case.
distance covered in the indicated time range. Besides, the NCI
TABLE III
indicated in the SMU did not alert you to any problem in S CENARIO 2: FAILED OPERATION - S ECURITY
GPS’s health in Table II. It is worth mentioning that the safety
and security modules will be communicating all the time. Time
Security Metric for GPS
Latitude Longitude Haversine Km/h
TABLE I 15:31:00 -022.00.07.7 -047.54.15.4 0 0
S CENARIO 1: N ORMAL OPERATION - S ECURITY 15:31:30 -021.59.45.3 -047.54.17.1 691 meters 82.92 km/h
15:31:52 -022.00.07.1 -047.54.14.3 675 meters 110.45 k/h
Security Metric for GPS
Time
Latitude Longitude Haversine Km/h
15:31 -022.00.07.7 -047.54.15.4 0 0 In this case of GPS failure in Table IV, it results in a change
15:35 -021.59.45.3 -047.54.17.1 691 meters 10.37 km/h in the health value of the damaged GPS to 1, which is reflected
15:38 -022.00.07.1 -047.54.14.3 675 meters 13.5km/h in its end, which increases to 1. As a consequence, this affects
the NCI and creates an alert to prioritize communication.
In Table II, the IMU and autopilot manipulate data related Therefore, a new mission is defined for the damaged 3DR Solo
to the Solo positioning, so their priority is set to 0.5. If Solo is to maintain communication as long as possible. Consequently,
forced to fall, it is necessary to establish WiFi communication the WiFi transmitter/receiver’s priority is changed to 1, raising
to locate and retrieve the UAV, which justifies its value of 0.5 its NCI to 0.5.
as priority. The GPS is responsible for sending the location As seen above, the NCI is an index that can be applied to
signals, in this case, of paramount importance for the mission, prioritize communication and for safety purposes due to its
so its priority is 1. The remaining modules do not deal with sub-indices. For example, prioritizing communications due to
any data that could be considered risky for the UAV, so they a failure in an entity can be dealt with quickly, as in scenario
are defined with priority 0. Regarding safety, all modules are 2, where there was a failure in the mechanism. An alert was
working correctly in regular operation, so health is set to 0. issued to prioritize its communication. On the other hand,
2) Scenario 2: Failed operation: In this case, 3DR Solo when it comes to ensuring the safety of an entity, SPHERE
is used to transplanting a heart from the UFSCar University SMU can take the appropriate measures based on the increase
TABLE IV This concludes that a malicious person emitting a signal
S CENARIO 2: FAILED OPERATION - S AFETY with a simple smartphone could falsify the real location of
NCI Safety a drone like the 3DR Solo. It can be concluded, then, that
Module techniques that help UAVs to detect and mitigate this type
health priority total
GPS 1 1 1 of attack are still absent in many aerial vehicle architectures,
IMU 0.8 0.5 0.65 although they are essential to guarantee the completion of a
Camera 0 0 0 mission. Applying the security metric mentioned earlier, this
Autopilot 0.8 0.5 0.65 drone would have been able to verify the sudden change of
Motors 0 0 0 route and would be able to detect GPS Spoofing. Or, if the NCI
Wifi 0 1 0.5 had been applied, the integrity of the module containing the
GPS would reflect this variation, increasing the health score
to the value of 1 [min: 0, m1/ax: 1]. The value 1 represents
in the health index. Although very specific, this case study the most critical value. Therefore, an alert would be issued in
can be seen in many unmanned vehicle applications, and this the architecture and the appropriate action should take place.
validation can be extended to other scenarios.
C. Security and safety metrics implemented in the Hamster
B. GPS Spoofing attack architecture
There are GPS spoofers that are devices that create false Both metrics were implemented in the C++ language in
GPS signals to trick receivers into thinking they are in a the HAMSTER architecture. To validate these metrics, a test
different location or at other times. In this study, we used Fake scenario consists of UAVs that authenticate with their central
GPS Location, an application for Android phones that falsifies unit and provide telemetry data. The public station requests the
the position by rewriting the location. Fake GPS Location was UAV data on a server that is accessed by another client. Then
used in this work to analyze how a malicious person can easily the customer can receive telemetry data from UAV. The UAV
exploit the GPS spoofing attack. station’s communication links are managed by the HAMSTER
The aircraft model chosen was the 3DR Solo Quadcopter. Platform, while the data exchange is done by Message Queue
This model was determined for this attack because GPS is Telemetry [15]. As a means of validating safety (at CSU) and
of great importance for Solo 3DR because it has an autopilot. security (at SMU) metrics, we performed the test scenario
For the attack, first, the Fake GPS application was installed on mentioned above through concrete implementations of the
a smartphone with Android operating system. Then the 3DR HAMSTER abstractions. The codes and full implementation
Solo drone was connected to the smartphone via WiFi. The project are available on Github
location indicated in the drone’s GPS was correct and was the The main implementation section of the safety and security
same as the initial of the smartphone in the city of São Carlos, metrics can be seen below.
SP, at 17:32, as shown in the Figure 1 (A). 1 /* NCI Code for Safety */
2 void ReceiveDataHealth (sample::FlightData DataHealth){
A minute later, at 17:33, the GPS location in the Fake GPS 3 double modulePriority = healthData.get_priority_GPS();
application was changed to Pará, located in northern Brazil, as 4 double health=DataHealth.get_health();
5 average(modulePriority, health);
shown in the Figure 1 (B). It was then verified that 3DR Solo 6 }
also indicated that it was in Pará, i.e. if this were real, it would 7 void average(double modulePriority, double health){
8 double nci_safety = ((health+modulePriority)/2);
have moved a distance of 2,350 km in one minute. However, 9 cout << "\t NCI safety: " << nci_safety << endl;
no alerts to the drone’s central command were issued. The 10 }
video of the attack can be seen on Youtube .
1 /* Haversine Code for Security */
2 int firstTime = ((hr1*60)+min1);
3 int secondTime = ((hr2*60)+min2);
4 totalTime = secondTime - firstTime;
5 //conversion to degree
6 lat1 = ((lat1 * pi)/180.0);
7 long1 = ((long1 * pi)/180.0);
8 lat2 = ((lat2 * pi)/180.0);
9 long2 = ((long2 * pi)/180.0);
10
11 double Lat = lat2 - lat1;
12 double Long = long2 - long1;
13 double val1 = 6371;
14 //Calculates the angle and the derivative
15 double val2 = sin(Lat/2)*sin(Lat/2)+cos(lat1)*cos(lat2)*
sin(Long/2)*sin(Long/2);
16 val2 = 2 * atan2(sqrt(val2), sqrt(1 - val2));
17 dist = val1 * val2;
18 avgSpeed = (dist/totalTime);
Fig. 1. (A) Solo 3DR (B) Fake GPS
Available Code (No Identification for Review): http://bit.ly/Gps-spoofing-
Demo Attack (No Identification for Review): https://youtu.be/hjs-9yuA71I Lars-2020
Communication and interface abstraction is implemented
using a TCP sockets network. All HAMSTER units use
elliptical curve encryption algorithms implemented by the
RELIC [16] version 0.3.3 toolkit built with a 160-bit key.
The test environment consists of a station (HAMSTER Su-
per Entity) and one HAMSTER Entity (UAV1), an autopilot,
and a unit sensor. HAMSTER units were implemented as
different processes on a Windows 10 desktop, communicating
over TCP sockets on localhost. Ethernet also communicates
the station with an instance of the MQTT Mosquitto broker
(MQTT).
When connecting to the Station, the UAV sends its ID and
a public cryptographic key. The Station connects to the UAV
in the same way, creating a bidirectional connection. After the
link is completed, UAV sends REQ ENTITY ACCESS with
its authorization information, and the CSU and SMU modules
that contain the metrics are invoked, as illustrated in the Figure Fig. 3. UAV HAMSTER
2.
If the data was plausible and the GPS is working correctly
during the whole trip, the Station responds with the message VII. R EFERENCES
ENTITY ACC GRANTED and presents the flight history.
Otherwise, the SMU or CSU alerts the central Station that
GPS spoofing is taking place, as illustrated in the Figure 3. [1] DroneIndustry, “The european drone industry,” https://www.droneii.com/
wp-content/uploads/2018/06/The-European-Drone-Industry-v1.1.pdf,
Then, the Station prioritizes communication through the wifi 2018, accessed: 2019-11-23.
transmitter and informs the decision-making module that an [2] A. Meola, “Drone market shows positive outlook with strong
action must be taken. industry growth and trends,” https://www.businessinsider.com/
drone-industry-analysis-market-trends-growth-forecasts-2017-7, 2017,
accessed: 2019-11-22.
[3] FrostSullivan, “Analysis of the global commercial uas
market to 2020,” https://ww2.frost.com/event/calendar/
analysis-global-commercial-uas-market-2020/?eID=1606, 2017,
accessed: 2019-11-23.
[4] Markets and Markets, “Le cabinet marketsandmarkets annonce de belles
perspectives de croissance annuelle pour ce marché mondial dans les 5
ans à venir, prévoyant notamment la multiplication rapide des applica-
tions commerciales,” http://www.mesures.com/vision-industrielle/item/
13721-une-croissance-proche-de-20-sur-le-marche-des-drones, 2017,
accessed: 2019-11-25.
[5] M. Alwateer, S. W. Loke, and A. Zuchowicz, “Drone services: issues
in drones for location-based services from human-drone interaction to
information processing,” Journal of Location Based Services, vol. 13,
no. 2, pp. 94–127, 2019.
[6] A. Eldosouky, A. Ferdowsi, and W. Saad, “Drones in distress: A game-
Fig. 2. Station HAMSTER
theoretic countermeasure for protecting uavs against gps spoofing,” IEEE
Internet of Things Journal, vol. 7, no. 4, pp. 2840–2854, 2019.
[7] A. Spears, L. Hunt, M. Abdulrahim, A. Sanders, and J. Grzywna, “A
trusted,” in A TRUSTED AUTOPILOT ARCHITECTURE FOR GPS-
DENIED AND EXPERIMENTAL UAV OPERATIONS, 2016.
VI. C ONCLUSION [8] D. F. Pigatto, “Hamster healthy, mobility and security-based data
communication architecture for unmanned systems,” Ph.D. dissertation,
Universidade de São Paulo, 2017.
This research presents two metrics, one for security and one [9] R. M. Fouda, “Security vulnerabilities of cyberphysical unmanned
for safety, coupled in the HAMSTER architecture to detect aircraft systems,” IEEE Aerospace and Electronic Systems Magazine,
vol. 33, no. 9, pp. 4–17, 2018.
GPS spoofing in UAVs. A case study of both metrics was [10] T. Humphrey’s, “Demonstration of a remote unmanned aerial
presented, an attack using a free app for smartphones, and vehicle hijacking via gps spoofing,” 2012. [Online]. Available:
the HAMSTER architecture’s implementation and validation. https://www.youtube.com/watch?v=6qQXVUze8oE
As can be seen in the results, the NCI is an index that can be [11] N. Frymann and M. Manulis, “Securing fleets of consumer drones at
low cost,” arXiv preprint arXiv:1912.05064, 2019.
applied not only to prioritize communication but also for safety [12] T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O’Hanlon,
purposes due to its sub-indices. Haversine, on the other hand, and P. M. Kintner, “Assessing the spoofing threat: Development of a
is an ally for calculating the distance and verifying sudden portable gps civilian spoofer,” in Radionavigation laboratory conference
proceedings, 2008.
changes in location. As future work, we intend to continue [13] Veja, “Uber de órgãos faz primeira entre de
with the development of the decision-making module. transplante de rim,” https://veja.abril.com.br/saude/
uber-de-orgaos-drone-faz-primeira-entrega-de-rim-para-transplante/,
2019.
[14] J. Gaspar, R. Ferreira, P. Sebastião, and N. Souto, “Capture of uavs
through gps spoofing,” in 2018 Global Wireless Summit (GWS). IEEE,
2018, pp. 21–26.
[15] M. Rodrigues and K. R. L. J. C. Branco, “Cloud–sphere: Towards secure
uav service provision,” Journal of Intelligent & Robotic Systems, vol. 97,
no. 1, pp. 249–268, 2020.
[16] RELIC, “Relic toolkit,” https://github.com/relic-toolkit, 2018.

View publication stats

You might also like