Signal Characteristic Analysis and Anomaly Detection for GPS Spoofing Mitigation
DOI:
https://doi.org/10.71346/utj.v1i1.7Keywords:
GPS spoofing attack, Position estimation, Bayesian networks, Watchdog model, Signal authenticationAbstract
This research addresses the critical issue of GPS spoofing attacks in Vehicular Ad-hoc Networks (VANETs), which pose significant threats to the safety and reliability of intelligent transportation systems. The study investigates effective strategies for detecting, tolerating, and managing these attacks, focusing on the unique challenges presented by the dynamic and distributed nature of VANETs. A novel hybrid machine learning approach, combining Bayesian Networks and a Watchdog Model, was developed to enhance anomaly detection in real-time GPS and network data. The methodology also incorporated advanced cryptographic techniques, signal characteristic analysis, and network intrusion detection systems to create a multi-layered defense mechanism. Experimental results, including data from a live spoofing event, demonstrated the effectiveness of the proposed methodology in accurately identifying and mitigating spoofing attacks, even in complex scenarios. The research findings have significant implications for enhancing the resilience of GPS-enabled VANETs against spoofing threats, paving the way for safer and more efficient transportation systems. Future research directions include refining the measurement models, exploring additional data sources, and developing more sophisticated attack scenarios to further strengthen the security of VANETs.
References
Z. Yang et al., “Anomaly Detection Against GPS Spoofing Attacks on Connected and Autonomous Vehicles Using Learning From Demonstration,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 9, pp. 9462–9475, Sep. 2023, doi: 10.1109/tits.2023.3269029.
A. Priyadharshini, S. Dannana, A. S. Rajasekaran, and A. Maria, “An efficient key agreement and anonymous privacy preserving scheme for vehicular ad‐hoc networks with handover authentication,” Concurrency and Computation, vol. 36, no. 7, pp. 1–13, Dec. 2023, doi: 10.1002/cpe.7979.
S. Mazhar et al., “State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey,” Vehicular Communications, vol. 2024, pp. 0–37, May 2024, doi: 10.1016/j.vehcom.2024.100804.
A. Novák, K. Kováčiková, B. Kandera, and A. N. Sedláčková, “Global Navigation Satellite Systems Signal Vulnerabilities in Unmanned Aerial Vehicle Operations: Impact of Affordable Software-Defined Radio,” Drones, vol. 8, no. 3, pp. 1–19, Mar. 2024, doi: 10.3390/drones8030109.
M. Sohail et al., “Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey,” Internet of Things, vol. 23, p. 100837, Oct. 2023, doi: 10.1016/j.iot.2023.100837.
J. Belzer and F. Van Graas, “Detection of GPS C/A Code Self-Interference: Monitor Overview and Applicability,” Navigation, vol. 70, no. 1, pp. 1–22, Jan. 2023, doi: 10.33012/navi.559.
K.-F. Chu and W. Guo, “Multi-agent Reinforcement Learning-based Passenger Spoofing Attack on Mobility-as-a-Service,” IEEE Transactions on Dependable and Secure Computing/IEEE Transactions on Dependable and Secure Computing, vol. EA, pp. 1–17, Mar. 2024, doi: 10.1109/tdsc.2024.3379283.
B. Niu, X. Zhuang, Z. Lin, and L. Zhang, “Navigation spoofing interference detection based on Transformer model,” Advances in Space Research, vol. EA, p. 100539, Jul. 2024, doi: 10.1016/j.asr.2024.07.016.
P. Jiang, H. Wu, and C. Xin, “DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network,” Digital Communications and Networks, vol. 8, no. 5, pp. 791–803, Oct. 2022, doi: 10.1016/j.dcan.2021.09.006.
G. Oligeri, S. Sciancalepore, O. A. Ibrahim, and R. Di Pietro, “GPS spoofing detection via crowd-sourced information for connected vehicles,” Computer Networks, vol. 216, p. 109230, Oct. 2022, doi: 10.1016/j.comnet.2022.109230.
C. Vitale et al., “CARAMEL: results on a secure architecture for connected and autonomous vehicles detecting GPS spoofing attacks,” EURASIP Journal on Wireless Communications and Networking, vol. 2021, no. 1, May 2021, doi: 10.1186/s13638-021-01971-x.
S. Prabakeran and T. Sethukarasi, “Optimal solution for malicious node detection and prevention using hybrid chaotic particle dragonfly swarm algorithm in VANETs,” Wireless Networks, vol. 26, no. 8, pp. 5897–5917, Jul. 2020, doi: 10.1007/s11276-020-02413-0.
K. Rashid, Y. Saeed, A. Ali, F. Jamil, R. Alkanhel, and A. Muthanna, “An Adaptive Real-Time Malicious Node Detection Framework Using Machine Learning in Vehicular Ad-Hoc Networks (VANETs),” Sensors, vol. 23, no. 5, p. 2594, Feb. 2023, doi: 10.3390/s23052594.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Usman Tariq, Billal Tariq

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors retain copyright for all articles published in CrossLink Studies journals. These articles are made freely available under a Creative Commons CC BY-SA 4.0, which allows unrestricted downloading and reading by the public.