Nowadays, Global Navigation Satellite Systems are the main source for high accuracy positioning and timing. For this reason, they are essential both for everyday activities and services, and for the industrial and critical infrastructure sectors. Moreover, the spread of increasingly autonomous vehicles results in strict accuracy and integrity requirements. This leads to the need for additional infrastructure to send corrections to the end users and mitigate the measurement errors, the Augmentation Networks. However, due to the increasing exploitation of localization functionalities, the Augmentation Networks could become a primary target for attackers resulting in a high financial and safety cost. Among the possible attacks, spoofing, that is the generation of a fake satellite signal which is seen as genuine by the receiver, is one of the most powerful and tricky. In this contribution, a detection and mitigation strategy for Augmentation Network spoofing attacks is proposed. We introduce two attack models and present a technique based on K-means clustering to counteract them. More in details, our approach is based on the computation of the number of clusters formed by the Augmentation Network corrections. Starting from the hypothesis that under nominal conditions only one cluster is present, the effects of the attacks on the clustering procedure are analyzed, and several attack simulations are performed to evaluate the algorithm performances. The proposed method has been compared both to an Augmentation Network attack detection technique, and to a receiver-level spoofing mitigation approach, showing comparable or better performances. Moreover, to the best of our knowledge, this is the first work addressing mitigation for spoofing attacks which target an Augmentation Network.

Baldoni, S., Battisti, F., Neri, A. (2020). On the Use of Differential Correction Clustering for Facing Spoofing Attacks to GNSS Augmentation Networks. IEEE ACCESS, 8, 219903-219922 [10.1109/ACCESS.2020.3042469].

On the Use of Differential Correction Clustering for Facing Spoofing Attacks to GNSS Augmentation Networks

Baldoni S.;Battisti F.;Neri A.
2020-01-01

Abstract

Nowadays, Global Navigation Satellite Systems are the main source for high accuracy positioning and timing. For this reason, they are essential both for everyday activities and services, and for the industrial and critical infrastructure sectors. Moreover, the spread of increasingly autonomous vehicles results in strict accuracy and integrity requirements. This leads to the need for additional infrastructure to send corrections to the end users and mitigate the measurement errors, the Augmentation Networks. However, due to the increasing exploitation of localization functionalities, the Augmentation Networks could become a primary target for attackers resulting in a high financial and safety cost. Among the possible attacks, spoofing, that is the generation of a fake satellite signal which is seen as genuine by the receiver, is one of the most powerful and tricky. In this contribution, a detection and mitigation strategy for Augmentation Network spoofing attacks is proposed. We introduce two attack models and present a technique based on K-means clustering to counteract them. More in details, our approach is based on the computation of the number of clusters formed by the Augmentation Network corrections. Starting from the hypothesis that under nominal conditions only one cluster is present, the effects of the attacks on the clustering procedure are analyzed, and several attack simulations are performed to evaluate the algorithm performances. The proposed method has been compared both to an Augmentation Network attack detection technique, and to a receiver-level spoofing mitigation approach, showing comparable or better performances. Moreover, to the best of our knowledge, this is the first work addressing mitigation for spoofing attacks which target an Augmentation Network.
2020
Baldoni, S., Battisti, F., Neri, A. (2020). On the Use of Differential Correction Clustering for Facing Spoofing Attacks to GNSS Augmentation Networks. IEEE ACCESS, 8, 219903-219922 [10.1109/ACCESS.2020.3042469].
File in questo prodotto:
File Dimensione Formato  
09281300.pdf

accesso aperto

Tipologia: Versione Editoriale (PDF)
Licenza: Creative commons
Dimensione 2.2 MB
Formato Adobe PDF
2.2 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/382632
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact