GPS Spoofing Attacks in FANETs: A Systematic Literature Review

被引:16
|
作者
Altaweel, Ala [1 ]
Mukkath, Hena [1 ]
Kamel, Ibrahim [1 ]
机构
[1] Univ Sharjah, Coll Comp & Informat, Dept Comp Engn, Informat & Network Secur Res Grp, Sharjah, U Arab Emirates
来源
IEEE ACCESS | 2023年 / 11卷
关键词
Drones; unmanned ariel vehicle (UAV); Flying Ad-Hoc NETwork (FANET); GPS spoofing attack; wireless network security; systematic literature review; DRONE; ALGORITHM;
D O I
10.1109/ACCESS.2023.3281731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flying Ad-Hoc Networks (FANETs) are groups of UAVs connected in an Ad-Hoc manner to accomplish a common mission. The widespread acceptance of UAVs due to their low cost and high efficiency has attracted malicious security attacks against them. These attacks cannot be easily prevented due to UAVs' limited computational power, short battery life, and inability to execute complex algorithms. FANETs rely on the Global Positioning System (GPS) for localization. GPS Spoofing, an easy-to-launch attack, is one of the main challenges in FANETs. In which, the legitimate and not-encrypted civilian GPS signals are overridden by counterfeit signals to deceive the UAVs to collide or to be hijacked. Researchers proposed various countermeasures to address GPS Spoofing attacks in FANETs. To further assist future research, this paper provides a systematic literature review on GPS Spoofing attacks in FANETs and their defense mechanisms. After formulating eight research questions and applying well-defined inclusion/exclusion criteria and quality assessment tools, 70 research articles were extracted. The existing defense mechanisms were classified based on their objectives (i.e., detection, mitigation, and/or prevention) and according to their basis (i.e., relying on readings from various drones' devices/sensors, processing the signals received by various sensors, employing machine learning algorithms, relying on game theory, or leveraging cryptographic techniques to authenticate and protect the confidentiality of GPS signals). The defense mechanisms were also analyzed to identify the attacker models, impacts of the attack, and detection performance. This study found that most of the proposed methods are detection approaches, rather than mitigation or prevention. Also, almost all papers used simulation experiments rather than a proof-of-concept implementation, which does not demonstrate a convincing performance under realistic mobility and propagation models. Moreover, most solutions addressed GPS Spoofing for a single UAV. Only eight articles addressed multiple UAV scenarios and none of them provided a proof-of-concept evaluation.
引用
收藏
页码:55233 / 55280
页数:48
相关论文
共 50 条
  • [21] Detection of Time Spoofing Attacks on GPS Synchronized Phasor Measurement Units
    Mattei, Andrew K.
    Grady, W. Mack
    Caspary, P. Jay
    McBride, Scott A.
    2016 69TH ANNUAL CONFERENCE FOR PROTECTIVE RELAY ENGINEERS (CPRE), 2016,
  • [22] SPARSE ERROR CORRECTION FOR PMU DATA UNDER GPS SPOOFING ATTACKS
    De Silva, Shashini
    Hagan, Travis
    Kim, Jinsub
    Cotilla-Sanchez, Eduardo
    2018 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2018), 2018, : 902 - 906
  • [23] A Comparative Analysis of the Ensemble Models for Detecting GPS Spoofing attacks on UAVs
    Gasimova, Aydan
    Khoei, Tala Talaei
    Kaabouch, Naima
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 310 - 315
  • [24] Security attacks in Opportunistic Mobile Networks: A systematic literature review
    Altaweel, Ala
    Aslam, Sidra
    Kamel, Ibrahim
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 221
  • [25] Mitigation strategies against the phishing attacks: A systematic literature review
    Naqvi, Bilal
    Perova, Kseniia
    Farooq, Ali
    Makhdoom, Imran
    Oyedeji, Shola
    Porras, Jari
    COMPUTERS & SECURITY, 2023, 132
  • [26] Web Services Attacks and Security- A Systematic Literature Review
    Mouli, Varsha R.
    Jevitha, K. P.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS, 2016, 93 : 870 - 877
  • [27] DDoS attacks in IoT networks: a comprehensive systematic literature review
    Yahya Al-Hadhrami
    Farookh Khadeer Hussain
    World Wide Web, 2021, 24 : 971 - 1001
  • [28] DDoS attacks in IoT networks: a comprehensive systematic literature review
    Al-Hadhrami, Yahya
    Hussain, Farookh Khadeer
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (03): : 971 - 1001
  • [29] Re-identification attacks-A systematic literature review
    Henriksen-Bulmer, Jane
    Jeary, Sheridan
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (06) : 1184 - 1192
  • [30] Hardware-In-the-Loop GPS and PMU Integrated Datasets for the Power Grid Under GPS Spoofing Attacks
    Chauhan, Shubhendra Vikram Singh
    Gao, Grace Xingxin
    PROCEEDINGS OF THE 33RD INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2020), 2020, : 1556 - 1565