Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427254
|View full text |Cite
|
Sign up to set email alerts
|

DeepSIM: GPS Spoofing Detection on UAVs using Satellite Imagery Matching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(14 citation statements)
references
References 36 publications
0
14
0
Order By: Relevance
“…In this case, the drawbacks are the same as the previous method; additionally, this method relies on two sensors: the camera and IMU. A deep learning-based solution which uses images from satellites and compares them to images from a drone's camera to determine whether the locations match was proposed by [11]; its disadvantage is that it requires initial preparation in the flight area. Moreover, every GPS point in the area must be covered, a requirement which increases the size of the precompiled database significantly.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this case, the drawbacks are the same as the previous method; additionally, this method relies on two sensors: the camera and IMU. A deep learning-based solution which uses images from satellites and compares them to images from a drone's camera to determine whether the locations match was proposed by [11]; its disadvantage is that it requires initial preparation in the flight area. Moreover, every GPS point in the area must be covered, a requirement which increases the size of the precompiled database significantly.…”
Section: Related Workmentioning
confidence: 99%
“…The significance of our method with respect to the methods proposed in related work is as follows. Our method (1) relies on existing hardware: in contrast to methods presented in other studies (e.g., [1], [4], and [9]), our method does not involve the use of additional hardware which makes the method also costeffective; (2) is database independent: in contrast to methods presented in other studies (e.g., [11]) which use a precompiled database, our method does not rely on a precompiled database or a map of the drone's flight area; and (3) our method offers flexibility: unlike other methods, it can be implemented either on the drone or at the ground control station used to control the drone (i.e., on the drone's controller). In addition (4), we empirically evaluate the accuracy of our method and determine the level of security for a situation in which the spoofed location is an average of 2.5 meters away from the actual location, an aspect that was not evaluated in related studies.…”
Section: Introductionmentioning
confidence: 99%
“…Zeng et al [62] demonstrate the insecurity of road navigation systems via a stealthy manipulation based on GPS spoofing. Considering multiple sensors, countermeasures exist for the detection of GPS spoofing attacks [20], [58], [61] and also for spoofer localization [19], [61]. However, these countermeasures depend on ground-based sensors and do not exploit the network volatility.…”
Section: Related Workmentioning
confidence: 99%
“…The significance of our method with respect to the methods proposed in related work is as follows: Our method relies on existing hardware: in contrast to methods presented in other studies (e.g., [ 2 , 3 , 4 ]), our method does not involve the use of additional hardware, which also makes it cost-effective; Our method is database independent: in contrast to methods presented in other studies (e.g., [ 5 ]) which use a precompiled database, our method does not rely on a precompiled database or a map of the drone’s flight area; Our method offers flexibility: unlike other methods, it can be implemented on the drone itself or from the ground control station used to control the drone (i.e., on the drone’s controller); We empirically evaluate the accuracy of our method and determine the level of security for a situation in which the spoofed location is an average of 2.5 m away from the actual location, an aspect that was not evaluated in related studies. …”
Section: Introductionmentioning
confidence: 98%
“…Our method is database independent: in contrast to methods presented in other studies (e.g., [ 5 ]) which use a precompiled database, our method does not rely on a precompiled database or a map of the drone’s flight area;…”
Section: Introductionmentioning
confidence: 99%