TY - GEN
T1 - GhostBuster
T2 - 21st IEEE Consumer Communications and Networking Conference, CCNC 2024
AU - Keizer, Mart
AU - Sciancalepore, Savio
AU - Oligeri, Gabriele
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024/1/9
Y1 - 2024/1/9
N2 - Remote ID (RID) regulations soon applicable world-wide force drones to broadcast plaintext wireless messages providing, among others, their current location. However, malicious drone operators who want to stay stealthy might disclose RID messages carrying out location spoofing attacks, i.e., report forged locations, different from the actual ones. In this paper, we investigate the feasibility of using wireless localization approaches to detect drones carrying out location spoofing attacks. To this aim, we propose GhostBuster, a modular solution for detecting misbehaving RID-enabled drones, and we evaluate its performance via an extensive experimental campaign based on open-source data from actual drone flights. Through the analysis of real data in an area of 1. 5km×2.5km, we show that systems integrating multiple receivers can take advantage of multiple RID messages to verify the location reported by RID-enabled drones with a success rate of 95% up to 364 meters with 12 receivers. We also show that channel conditions play a crucial role in defining the maximum achievable spoofing detection performance.
AB - Remote ID (RID) regulations soon applicable world-wide force drones to broadcast plaintext wireless messages providing, among others, their current location. However, malicious drone operators who want to stay stealthy might disclose RID messages carrying out location spoofing attacks, i.e., report forged locations, different from the actual ones. In this paper, we investigate the feasibility of using wireless localization approaches to detect drones carrying out location spoofing attacks. To this aim, we propose GhostBuster, a modular solution for detecting misbehaving RID-enabled drones, and we evaluate its performance via an extensive experimental campaign based on open-source data from actual drone flights. Through the analysis of real data in an area of 1. 5km×2.5km, we show that systems integrating multiple receivers can take advantage of multiple RID messages to verify the location reported by RID-enabled drones with a success rate of 95% up to 364 meters with 12 receivers. We also show that channel conditions play a crucial role in defining the maximum achievable spoofing detection performance.
KW - Drones Security
KW - Location Verification
KW - Mobile Security
UR - http://www.scopus.com/inward/record.url?scp=85189205730&partnerID=8YFLogxK
U2 - 10.1109/CCNC51664.2024.10454860
DO - 10.1109/CCNC51664.2024.10454860
M3 - Conference contribution
AN - SCOPUS:85189205730
T3 - Proceedings - IEEE Consumer Communications and Networking Conference, CCNC
SP - 324
EP - 332
BT - 2024 IEEE 21st Consumer Communications and Networking Conference, CCNC 2024
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 6 January 2024 through 9 January 2024
ER -