On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions

Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and h...

Full description

Bibliographic Details
Main Authors: Shah Zahid Khan, Mujahid Mohsin, Waseem Iqbal
Format: Article
Language:English
Published: PeerJ Inc. 2021-05-01
Series:PeerJ Computer Science
Subjects:
Online Access:https://peerj.com/articles/cs-507.pdf
id doaj-402e53d2ad384e22aefd30ca503e9b3f
record_format Article
spelling doaj-402e53d2ad384e22aefd30ca503e9b3f2021-05-08T15:05:19ZengPeerJ Inc.PeerJ Computer Science2376-59922021-05-017e50710.7717/peerj-cs.507On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directionsShah Zahid Khan0Mujahid Mohsin1Waseem Iqbal2College of Aeronautical Engineering (CAE), National University of Sciences and Technology (NUST), Islamabad, PakistanCollege of Aeronautical Engineering (CAE), National University of Sciences and Technology (NUST), Islamabad, PakistanDepartment of Information Security, National University of Science and Technology, Islamabad, PakistanUnmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs’ demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks.https://peerj.com/articles/cs-507.pdfGPS spoofingSecurity threatsSurveyTaxonomyUAVsDrones
collection DOAJ
language English
format Article
sources DOAJ
author Shah Zahid Khan
Mujahid Mohsin
Waseem Iqbal
spellingShingle Shah Zahid Khan
Mujahid Mohsin
Waseem Iqbal
On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
PeerJ Computer Science
GPS spoofing
Security threats
Survey
Taxonomy
UAVs
Drones
author_facet Shah Zahid Khan
Mujahid Mohsin
Waseem Iqbal
author_sort Shah Zahid Khan
title On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_short On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_full On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_fullStr On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_full_unstemmed On GPS spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
title_sort on gps spoofing of aerial platforms: a review of threats, challenges, methodologies, and future research directions
publisher PeerJ Inc.
series PeerJ Computer Science
issn 2376-5992
publishDate 2021-05-01
description Unmanned Aerial Systems (UAVs, Drones), initially known only for their military applications, are getting increasingly popular in the civil sector as well. Over the military canvas, drones have already proven themselves as a potent force multiplier through unmanned, round-the-clock, long-range and high-endurance missions for surveillance, reconnaissance, search and rescue, and even armed combat applications. With the emergence of the Internet of Things (IoT), commercial deployments of drones are also growing exponentially, ranging from cargo and taxi services to agriculture, disaster relief, risk assessment and monitoring of critical infrastructures. Irrespective of the deployment sector, drones are often entrusted to conduct safety, time and liability critical tasks, thus requiring secure, robust and trustworthy operations. In contrast, the rise in UAVs’ demand, coupled with market pressure to reduce size, weight, power and cost (SwaP-C) parameters, has caused vendors to often ignore security aspects, thus inducing serious safety and security threats. As UAVs rely on Global Positioning System (GPS) for positioning and navigation, they can fall prey to GPS jamming and spoofing attacks. The vulnerability of GPS to spoofing has serious implications for UAVs, as victim drones using civil GPS can be misdirected or even completely hijacked for malicious intents, as already demonstrated in several academic research efforts using commercially available GPS spoofing hardware. Beside UAVs, GPS spoofing attacks are equally applicable to other GPS-dependent platforms, including manned aircraft, ground vehicles, and cellular systems. This paper conducts a comprehensive review of GPS spoofing threats, with a special focus on their applicability over UAVs and other GPS-dependent mobile platforms. It presents a novel taxonomy of GPS spoofing attacks and critically analyzes different spoofing techniques based upon placement of spoofing device, attack stealthiness, attack methodologies, and objectives of the attacker. We also discuss some of the recent experiments from open literature which utilized commercially available hardware for successfully conducting spoofing attacks.
topic GPS spoofing
Security threats
Survey
Taxonomy
UAVs
Drones
url https://peerj.com/articles/cs-507.pdf
work_keys_str_mv AT shahzahidkhan ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections
AT mujahidmohsin ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections
AT waseemiqbal ongpsspoofingofaerialplatformsareviewofthreatschallengesmethodologiesandfutureresearchdirections
_version_ 1721454917779980288