Loading [MathJax]/extensions/MathMenu.js
Authenticated UWB-Based Positioning of Passive Drones | IEEE Conference Publication | IEEE Xplore

Authenticated UWB-Based Positioning of Passive Drones


Abstract:

Drones can be downed by spoofing attacks. As a countermeasure, the European Space Agency has adopted a broadcast authentication protocol called Timed Efficient Loss-toler...Show More

Abstract:

Drones can be downed by spoofing attacks. As a countermeasure, the European Space Agency has adopted a broadcast authentication protocol called Timed Efficient Loss-tolerant Authentication (TESLA) in the European Global Navigation Satellite System (GNSS), Galileo. In this work, we will assess the potential of using TESLA for indoor positioning systems that are based on ultra-wideband (UWB) technology. The initial findings from our experiments indicate that authentication methods based on TESLA can provide protection to an UWB-based indoor positioning system against signal spoofing,
Date of Conference: 26-28 April 2023
Date Added to IEEE Xplore: 07 June 2023
ISBN Information:

ISSN Information:

Conference Location: Pavia, Italy

Funding Agency:

References is not available for this document.

I. Motivation

Indoor Positioning Systems (IPS) are becoming increasingly important as they enable location estimation within enclosed spaces where GNSS-based positioning, such as the Global Positioning System (GPS), performs poorly due to signal degradation [1]. IPSs that employ UWB technology are currently in high demand for Industrial Internet of Things (IIoT) applications, particularly in transportation and warehouses [2], [3]. However, these systems can be vulnerable to security threats, especially spoofing attacks. Spoofing attacks in positioning systems are a fundamental problem that can severely impact communication networks and are studied on global and local levels [4]. Simply put, a spoofing attack is the transmission of fake signals that receivers accept as authentic ones [5]. It is widely recognized that even a sophisticated positioning system such as the GPS can be vulnerable to spoofing attacks [6]. An example of a spoofing attack can be seen in Fig. 1. In 2011, Iran “captured” a classified U.S. spy Unmanned Aerial Vehicle (UAV) over its territory, mostly undamaged, using a GPS-spoofing method [7]. The cost of capturing a drone using a spoofing method can be assumed as low as $1000 [8]. Besides UAVs, civil GPS spoofing also poses a danger to manned aircraft, maritime craft, communications systems, banking and finance institutions, and power grid [9]. Recently, spoof-resilient measures have been introduced as part of the European GNSS, Galileo, that enable authenti-cation of the source using a protocol called Timed Efficient Stream Loss-tolerant Authentication (TESLA) [11]–[13]. As the name suggests, the TESLA protocol is an authentication protocol designed exclusively for broadcast settings. When used in navigation, it can enable the authenticity of navigation messages (e.g., messages are trusted to be sent by satellites and unforged) such that breaking it is computationally infeasible. It does so by using cryptographic hash functions and delaying the release of keys for authentication in the channel.

Select All
1.
G. M. Mendoza-Silva, J. Torres-Sospedra and J. Huerta, "A meta-review of indoor positioning systems", Sensors, vol. 19, no. 20, 2019.
2.
P. S. Farahsari, A. Farahzadi, J. Rezazadeh and A. Bagheri, "A Survey on Indoor Positioning Systems for IoT-Based Applications", IEEE Internet of Things Journal, vol. 9, no. 10, pp. 7680-7699, 2022.
3.
J. Mier, A. Jaramillo-Alcázar and J. J. Freire, "At a glance: indoor positioning systems technologies and their applications areas", Information Technology and Systems: Proceedings of ICITS 2019, pp. 483-493, 2019.
4.
D. Roy, T. Mukherjee, A. Riden, J. Paquet, E. Pasiliao and E. Blasch, "GANSAT: A GAN and SATellite Constellation Fingerprint-Based Framework for GPS Spoof-Detection and Location Estimation in GPS Deprived Environment", IEEE Access, vol. 10, pp. 45485-45507, 2022.
5.
GPS receivers can be 'spoofed’ say researchers, [online] Available: https://phys.org/news/2008-09-gps-spoofed.html.
6.
B. W. O'Hanlon, M. L. Psiaki, J. A. Bhatti, D. P. Shepard and T. E. Humphreys, "Real-Time GPS Spoofing Detection via Correlation of Encrypted Signals", NAVIGATION, vol. 60, no. 4, pp. 267-278, 2013.
7.
Exclusive: Iran hijacked US drone says Iranian engineer, [online] Available: https://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer.
8.
A. J. Kerns, D. P. Shepard, J. A. Bhatti and T. E. Humphreys, "Unmanned aircraft capture and control via GPS spoofing", Journal of Field Robotics, vol. 31, no. 4, pp. 617-636, 2014.
9.
T. Humphreys, Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing, University of Texas at Austin, pp. 1-16, July 2012.
10.
X. Wei, C. Sun, M. Lyu, Q. Song and Y. Li, "ConstDet: Control Semantics-Based Detection for GPS Spoofing Attacks on UAVs", Remote Sensing, vol. 14, no. 21, 2022.
11.
Galileo Open Service Navigation Message Authentication, [online] Available: https://gssc.esa.int/navipedia/index.php/Galileo_Open_Service_Navigation_Message_Authentication.
12.
S. Z. Khan, M. Mohsin and W. Iqbal, "On GPS spoofing of aerial platforms: a review of threats challenges methodologies and future research directions", PeerJ Computer Science, vol. 7, pp. e507, 2021.
13.
A. Perrig, R. Canetti, J. Tygar and D. Song, "Efficient authentication and signing of multicast streams over lossy channels", Proceeding 2000 IEEE Symposium on Security and Privacy. S P 2000, pp. 56-73, 2000.
14.
Z. Sahinoglu, S. Gezici and I. Güvenc, Position estimation techniques, Cambridge University Press, pp. 63-100, 2008.
15.
W. Zhao, A. Goudar, X. Qiao and A. P. Schoellig, "UTIL: An Ultra-wideband Time-difference-of-arrival Indoor Localization Dataset", arXiv e-prints, Mar. 2022.
16.
A. Perrig, R. Canetti, D. Song and J. D. Tygar, "Efficient and secure source authentication for multicast", Network and Distributed System Security Symposium NDSS, vol. 1, no. 2001, pp. 35-46, 2001.
17.
K. Grover and A. Lim, "A survey of broadcast authentication schemes for wireless networks", Ad Hoc Networks, vol. 24, pp. 288-316, 2015.
18.
B. Preneel, Hash Functions, Boston, MA:Springer US, pp. 543-553, 2011.
19.
D. He, S. Chan and M. Guizani, "Communication Security of Unmanned Aerial Vehicles", IEEE Wireless Communications, vol. 24, no. 4, pp. 134-139, 2017.
20.
D. Basin, S. Capkun, P. Schaller and B. Schmidt, "Formal reasoning about physical properties of security protocols", ACM Transactions on Information and System Security (TISSEC), vol. 14, no. 2, pp. 1-28, 2011.
21.
Y. Zhang, W. Liu, Y. Fang and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks", IEEE Journal on Selected areas in communications, vol. 24, no. 4, pp. 829-835, 2006.
22.
D. Qiu, "Security analysis of geoencryption: A case study using Loran", Proceedings of the 20th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2007), pp. 1146-1154, 2007.
23.
D. Qiu, S. Lo, P. Enge, D. Boneh and B. Peterson, "Geoencryption using Loran", Proceedings of the 2007 National Technical Meeting of The Institute of Navigation, pp. 104-115, 2007.
24.
G. T. Becker, S. Lo, D. De Lorenzo, D. Qiu, C. Paar and P. Enge, "Efficient authentication mechanisms for navigation systems-a radio-navigation case study", Proceedings of the 22nd International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2009), pp. 901-912, 2009.
25.
X. Guo and J. Zhu, "Research on security issues in Wireless Sensor Networks", Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology, pp. 636-639, 2011.
26.
M. A. Alawami and H. Kim, "LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics", Computers & Security, vol. 89, pp. 101683, 2020.
27.
D. Prashar, M. Rashid, S. T. Siddiqui, D. Kumar, A. Nagpal, A. S. AlGhamdi, et al., "SDSWSN—A Secure Approach for a Hop-Based Localization Algorithm Using a Digital Signature in the Wireless Sensor Network", Electronics, vol. 10, no. 24, pp. 3074, 2021.
28.
"Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction", RFC 4082, Jun. 2005.
29.
M. Stocker, J. Kowalczyk, C. A. Boano and K. Römer, "Towards Secure Multicast Ranging with Ultra-Wideband Systems" in Proceedings of the 2022 INTERNATIONAL CONFERENCE ON EMBEDDED WIRELESS SYSTEMS AND NETWORKS ser. EWSN '22, New York, NY, USA:Association for Computing Machinery, pp. 256-261, 2023.
30.
D. Coppens, A. Shahid, S. Lemey, B. Van Herbruggen, C. Marshall and E. De Poorter, "An Overview of UWB Standards and Organizations (IEEE 802.15.4 FiRa Apple): Interoperability Aspects and Future Research Directions", IEEE Access, vol. 10, pp. 70219-70241, 2022.

Contact IEEE to Subscribe

References

References is not available for this document.