Главная
Study mode:
on
1
Intro
2
Contributions
3
High-level Attack Overview
4
A Visual Representation
5
Graph Construction
6
Intuition for Spoof Routes Generation
7
Spoof Routes Generation Algorithm
8
Intuition for Escape Routes Generation
9
Escape Routes Generation Algorithm
10
Real World Spoofer Evaluation
11
Evaluation Methodology
12
Maximum Displacement from Intended Destination
13
Estimated Coverage Area of Escape Routes
14
Countermeasure. Secure Paths Algorithm
15
Summary & Questions?
Description:
Explore the vulnerabilities of GPS and INS-based location tracking systems for road transportation in this IEEE conference talk. Delve into algorithms that enable adversaries to travel to alternate locations undetected, despite INS-aided GPS monitoring. Examine the construction of graph models for road networks and the generation of spoofed routes that render gyroscope and accelerometer sensors ineffective. Learn about a real-time integrated GPS/INS spoofer that accounts for traffic conditions and dynamically generates spoofing signals. Analyze experimental results from ten different cities, revealing the potential for attackers to reach destinations up to 30 km away without detection. Discover proposed countermeasures to limit adversarial capabilities without hardware modifications. Gain insights into the security challenges facing location-based systems and potential solutions for enhancing their resilience against sophisticated attacks.

Security of GPS - INS Based On-Road Location Tracking Systems

IEEE
Add to list