Spoofer Chain: Detecting CAV Location Spoofing with Blockchain and Quantum Cryptography

Abstract

Connected and Autonomous Vehicles (CAVs) are a category of vehicles that combine connectivity, automation, and advanced technologies to enhance transportation efficiency, safety, and convenience. A CAV GPS spoofing attack refers to a type of cybersecurity threat aimed at Connected and Autonomous Vehicles (CAVs) by manipulating their Global Positioning System (GPS) navigation data. GPS spoofing involves transmitting fake GPS signals to mislead CAVs' onboard GPS receivers, causing them to make incorrect location and navigation decisions. This form of attack can have serious consequences, including altering the vehicle's route, causing it to deviate from its intended path, or even leading to accidents or safety issues. One of the primary challenges is the continual evolution of spoofing methods, with attackers employing increasingly sophisticated techniques. This constant innovation makes it difficult for existing algorithms to effectively detect and prevent GPS spoofing. The project aims to tackle these challenges by integrating blockchain technology for data integrity, LSTM algorithms for analysing GPS time series data, and quantum cryptography for secure communication. Through this integration, the goal is to detect and prevent location spoofing attacks and establish a secure and trustworthy framework for CAVs in a world where reliable GPS data is essential for their operation. This project introduces a multifaceted solution that combines cutting-edge technologies to safeguard CAVs from location spoofing attacks. The integration of blockchain technology ensures the integrity of GPS data by creating a tamper-resistant ledger of information. Long Short-Term Memory (LSTM) algorithms are employed to analyze GPS time series data, enhancing the system's ability to detect anomalies and attacks. Furthermore, the project leverages the power of quantum cryptography to establish secure and unbreakable communication channels between CAVs and data processing centers. Quantum cryptography utilizes the principles of quantum mechanics to encrypt and transmit data in a way that is practically immune to eavesdropping and hacking. By amalgamating these elements into the SpooferChain framework, the project aims to provide a holistic and resilient defense against location spoofing attacks on CAVs. This not only ensures the safety of passengers and the proper functioning of autonomous vehicles but also paves the way for a more secure and trustworthy environment for CAVs in the future.

Country : India

1 M.Shankar2 K.Deepan3 P.V.Dinesh4 A.Karthikeyan

  1. Assistant Professor, Department of Computer Science and Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India
  2. Student, Department of Computer Science and Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India
  3. Student, Department of Computer Science and Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India
  4. Student, Department of Computer Science and Engineering, Erode Sengunthar Engineering College, Perundurai, Erode, Tamilnadu, India

IRJIET, Volume 8, Issue 3, March 2024 pp. 344-353

doi.org/10.47001/IRJIET/2024.803053

References

  1. S. Filippou, A. Achilleos, S. Z. Zukhraf, C. Laoudias, K. Malialis, M. K. Michael, and G. Ellinas, ‘‘A machine learning approach for detecting GPS location spoofing attacks in autonomous vehicles,’’ in Proc. IEEE 97th Veh. Technol. Conf., Jun. 2023, pp. 1–7.
  2. N. Souli, P. Kolios, and G. Ellinas, ‘‘Online relative positioning of autonomous vehicles using signals of opportunity,’’ IEEE Trans. Intell. Vehicles, vol. 7, no. 4, pp. 873–885, Dec. 2022.
  3. H. Sathaye, G. LaMountain, P. Closas, and A. Ranganathan, ‘‘SemperFi: Anti-spoofing GPS receiver for UAVs,’’ in Proc. Netw. Distrib. Syst. Secur. Symp. (NDSS), 2022, pp. 1–17.
  4. D. Y. Jeon, T. Gaybullaev, J. H. Noh, J. M. Joo, S. J. Lee, and M.-K. Lee, ‘‘Performance analysis of authentication protocols of GPS, Galileo and BeiDou,’’ J. Positioning, Navigat., Timing, vol. 11, no. 1, pp. 1–9, 2022.
  5. M. Jayaweera, ‘‘A novel deep learning GPS anti-spoofing system with DOA time-series estimation,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2021, pp. 1–6.
  6. E. Basan, A. Basan, A. Nekrasov, C. Fidge, N. Sushkin, and O. Peskova, ‘‘GPS-spoofing attack detection technology for UAVs based on Kullback–Leibler divergence,’’ Drones, vol. 6, no. 1, p. 8, Dec. 2021.
  7. E. Ranyal and K. Jain, ‘‘Unmanned aerial vehicle’s vulnerability to GPS spoofing a review,’’ J. Indian Soc. Remote Sens., vol. 49, no. 3, pp. 585–591, Mar. 2021, doi: 10.1007/s12524-020-01225-1.
  8. Z. Wu, Y. Zhang, and R. Liu, ‘‘BD-II NMA&SSI: An scheme of antispoofing and open BeiDou II D2 navigation message authentication,’’ IEEE Access, vol. 8, pp. 23759–23775, 2020.
  9. Y. Dang, C. Benzaïd, Y. Shen, and T. Taleb, ‘‘GPS spoofing detector with adaptive trustable residence area for cellular based-UAVs,’’ in Proc. IEEE Global Commun. Conf. (GLOBECOM), Dec. 2020, pp. 1–6.
  10. S. Semanjski, I. Semanjski,W. DeWilde, and A. Muls, ‘‘Use of supervised machine learning for GNSS signal spoofing detection with validation on real-world meaconing and spoofing data—Part I,’’ Sensors, vol. 20, no. 4, p. 1171, Feb. 2020.
  11. W. Liang, K. Li, and Q. Li, ‘‘Anti-spoofing Kalman filter for GPS/rotational INS integration,’’ Measurement, vol. 193, Apr. 2022, Art. no. 110962. 48
  12. S.-H. Seo, G.-I. Jee, and B.-H. Lee, ‘‘Spoofing signal generation based on manipulation of code delay and Doppler frequency of authentic GPS signal,’’ Int. J. Control, Autom. Syst., vol. 19, no. 2, pp. 1026–1040, Feb. 2021.
  13. N. Linty, A. Farasin, A. Favenza, and F. Dovis, ‘‘Detection of GNSS ionospheric scintillations based on machine learning decision tree,’’ IEEE Trans. Aerosp. Electron. Syst., vol. 55, no. 1, pp. 303–317, Feb. 2019.
  14. Chao Sun;, Joon Wayn Cheong;,” GNSS Spoofing Detection Using Static or Rotating Single-Antenna of a Static or Moving Victim”, IEEE Trans, GPS, Nov 2022.
  15. Garima Chopra; Rakesh Kumar Jha;” TPA: Prediction of Spoofing Attack Using Thermal Pattern Analysis in Ultra Dense Network for High-Speed Handover Scenario”, IEEE, Trans, intel vehicle, Jun 2021.