62 / 2021-12-06 17:49:04
A Practical Evaluation on GPS Spoofing
GNSS Spoofing and protection; V2X; ICV; security; network
终稿
CuiXiaotong / Chongqing University of Posts and Telecommunications
With the development of advanced driving assis-tance systems (ADAS) and 5G technologies, intelligent connected vehicles (ICVs) are expected to obtain widespread application in future. Based on V2X architecture (including vehicle-to-vehicle, vehicle-to-infrastructure, vehicle-to-network, vehicle-to-person, etc.), these ICVs, however, face security threats such as privacy disclosure, network attacks, etc., as well as conventional networks. What is worse, attacks within a V2X environment pose more serious threats to life and property as cars could be manipulated to cause accidents. In this paper, we investigate vulnerabilities of the in-vehicle navigation system, which relies greatly on global navigation satellite system (GNSS). We first carefully design a GPS spoofing attack, which is then used to evaluate whether the in-vehicle navigation system can resist the attack. Simulation experiments are presented to verify the effectiveness of the GPS spoofing attack. Then we give suggestions to protect vehicles from being deceived.
重要日期
  • 会议日期

    12月11日

    2021

    12月12日

    2021

  • 08月18日 2021

    注册截止日期

主办单位
中国计算机学会
承办单位
中国计算机学会容错计算专业委员会
同济大学软件学院
历届会议
移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询