Detecting Maritime GPS Spoofing Attacks Based on NMEA Sentence Integrity Monitoring

被引:9
|
作者
Spravil, Julian [1 ,3 ]
Hemminghaus, Christian [1 ]
von Rechenberg, Merlin [1 ,2 ]
Padilla, Elmar [1 ]
Bauer, Jan [1 ]
机构
[1] Fraunhofer FKIE, Cyber Anal & Def, Fraunhoferstr 20, D-53343 Wachtberg, Germany
[2] Univ Bonn, Inst Comp Sci 4, Friedrich Hirzebruch Allee 8, D-53115 Bonn, Germany
[3] Fraunhofer IAIS, NetMedia, Schloss Birlinghoven 1, D-53757 St Augustin, Germany
关键词
GPS spoofing; anomaly detection; NMEA-0183; Maritime Cyber Security; GNSS; cyber and electromagnetic activities; NAVIGATION SYSTEMS; GNSS; DOPPLER; POWER;
D O I
10.3390/jmse11050928
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
Today's maritime transportation relies on global navigation satellite systems (GNSSs) for accurate navigation. The high-precision GNSS receivers on board modern vessels are often considered trustworthy. However, due to technological advances and malicious activities, this assumption is no longer always true. Numerous incidents of tampered GNSS signals have been reported. Furthermore, researchers have demonstrated that manipulations can be carried out even with inexpensive hardware and little expert knowledge, lowering the barrier for malicious attacks with far-reaching consequences. Hence, exclusive trust in GNSS is misplaced, and methods for reliable detection are urgently needed. However, many of the proposed solutions require expensive replacement of existing hardware. In this paper, therefore, we present MAritime Nmea-based Anomaly detection (MANA), a novel low-cost framework for GPS spoofing detection. MANA monitors NMEA-0183 data and advantageously combines several software-based methods. Using simulations supported by real-world experiments that generate an extensive dataset, we investigate our approach and finally evaluate its effectiveness.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Navigation Message Authentication Based on One-Way Hash Chain to Mitigate Spoofing Attacks for GPS L1
    Kh. Ghorbani
    N. Orouji
    M. R. Mosavi
    Wireless Personal Communications, 2020, 113 : 1743 - 1754
  • [42] Navigation Message Authentication Based on One-Way Hash Chain to Mitigate Spoofing Attacks for GPS L1
    Ghorbani, Kh.
    Orouji, N.
    Mosavi, M. R.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (04) : 1743 - 1754
  • [43] Detecting integrity attacks in IoT-based Cyber Physical Systems: a case study on Hydra testbed
    Battisti, Federica
    Bernieri, Giuseppe
    Carli, Marco
    Lopardo, Michela
    Pascucci, Federica
    2018 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS), 2018, : 98 - 103
  • [44] SLAM-based Integrity Monitoring Using GPS and Fish-eye Camera
    Bhamidipati, Sriramya
    Gao, Grace Xingxin
    PROCEEDINGS OF THE 32ND INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2019), 2019, : 4116 - 4129
  • [45] A study on GPS integrity monitoring algorithms based on ultra-tight integration system
    School of Automation Science and Electrical Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100191, China
    Proc. IEEE Conf. Ind. Electron. Appl., ICIEA, (596-600):
  • [46] NoiSense Print: Detecting Data Integrity Attacks on Sensor Measurements Using Hardware-based Fingerprints
    Ahmed, Chuadhry Mujeeb
    Mathur, Aditya P.
    Ochoa, Martin
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (01)
  • [47] A Study on GPS Integrity Monitoring Algorithms Based on Ultra-Tight Integration System
    Li Fu
    Yongquan Zhu
    2011 6TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2011, : 596 - 600
  • [48] Roll forward validation based decision tree classification for detecting data integrity attacks in industrial internet of things
    Madhawa, Surendar
    Balakrishnan, P.
    Arumugam, Umamakeswari
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (03) : 2355 - 2366
  • [49] Detecting Version Number Attacks in RPL-based Networks using a Distributed Monitoring Architecture
    Mayzaud, Anthea
    Badonnel, Remi
    Chrisment, Isabelle
    2016 12TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT AND WORKSHOPS(CNSM 2016), 2016, : 127 - 135
  • [50] Detecting anomalies and attacks in network traffic monitoring with classification methods and XAI-based explainability
    Wawrowski, Lukasz
    Michalak, Marcin
    Bialas, Andrzej
    Kurianowicz, Rafal
    Sikora, Marek
    Uchronski, Mariusz
    Kajzer, Adrian
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2259 - 2268