Keywords

1 Introduction

Fig. 1.
figure 1

System model, principle actors and security layers

Vehicular Ad-hoc Network (VANET) [1], the wireless network of cars had boosted the driving experience of road users enormously via communication types like Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) [2], in addition to providing a bases for the Vehicle to Everything (V2X) [3] that serves as a core for the Internet of Vehicles (IoV) paradigm [4]. Moreover, location detection techniques such as Global Positioning System (GPS) [5], Road-side Unite (RSU)-aided and Location Based Service (LBS) [6] are getting much attention due to their high utility [7]. To avoid accidents and traffic jams, vehicles must broadcast safety-beacon messages [8] that contain the vehicle’s status [9] including its location which, as a consequence, forms an environment instantiation. This beaconing is done in a range of 300 m and up to 10 beacons per second [10].

1.1 Problematic and Research Motivation

Since the world is diving more and more into the technology, many serious cyber attacks and exploits are emerging each time [11]. This beaconing had opened location-privacy issues which were an incentive for the research community to find mitigation to these limitations [12]; using pseudonyms and changing them over time was accepted as a fair solution [6] and much schemes had emerged [13]. In spite of being these schemes benign to the IoV users’ location-privacy, they also open an attack vector to malicious vehicles as they can escape monitoring when modifying and/or encrypting such spatio-related beacons from the Law Enforcement Authority (LEA) [14] without a defending mechanism, in addition for giving the option to launch Sybil attacks [15]. Localization techniques are becoming a must in such a case. Generally speaking, much cryptography and trust-based mechanisms [16, 17] were proposed and used to cope with the emerging security threats but they do not treat all kinds of security gaps. Another reason for the necessity of location techniques may be noticed when considering the critical vulnerability of the GPS technique [18]; we are talking about the GPS-spoofing attack [19]. The GPS-spoofing attack is defined as forging a falsified spatio-temporal data to the receiving devices using GPS-mimicker devices that aim at emitting a GPS signal but this later is falsified and coming from a malicious source and is hard to get verified [20, 21]. With this said, we give a high importance to checking the transmitted location by vehicles to their vicinity where our assumed spoofer is considered to be a set of Unmanned-Aircraft-Vehicles (UAVs) [22] controlled by an attacker who aims at wreaking havoc on the system functioning. The exact scenario and used mechanisms are explained later on. Moreover, the used abbreviations in this paper are provided in Table 1.

1.2 Contributions and Paper Organization

The contributions of the paper are stated as follows:

  • Introducing our system model that leverages the power and financial abilities of the Law-Side Authority to monitor and protect against the resulting vector attacks.

  • Giving and shedding-light to a GPS-spoofing mechanism that exploits the possession of a UAV system to let vehicles send falsified locations.

  • Recalling and formulating the used triangulation technique to detect a node (vehicle) by its Received Signal Strength Indicator (RSSI) and the nearby monitoring stations.

  • Providing our proposed Security-Aware Monitoring Approach (SAMA) that estimates the location of potential malicious vehicles and explaining the used c++ map and multimap data-structures in addition to giving the pseudo-code of SAMA protocols and its results.

The remaining paper parts are presented as follows: Sect. 2, sheds light on legitimate privacy-schemes that encrypt beacon fields in conjunction with the GPS-spoofing attacks that let vehicles send falsified locations and discuss the localization-related state of the art. Next, the system model and coverage modes are described in Sect. 3. Then, the proposed SAMA approach is explained in details in Sect. 4. After that, Sect. 5 shows the location precision and collection per type results. Section 6 is consecrated for discussing the obtained results and potential future enhancements to the technique. Finally, Sect. 7 concludes this research.

Table 1. List of abbreviations

2 Related Work

This section is three folds; (a) the used techniques to encrypt location data included in beacons, (b) the GPS spoofing problem that leads to sending a wrong geo-location data by vehicles and (c) the location detection techniques deployed for wireless networks:

(a) altering the safety-messages format (for good) was highly debated in the previous years. Freudiger et al. had proposed the Cryptographic MIX-zones (CMIX) scheme [23] that aims at encrypting beacon messages in some areas (mix-zones) to defend against unauthorized overhearing of these beacons, thus, having an opportunity to confuse the attacker when leaving the CMIX zones. Similarly, Wasef and Shen had presented the random encryption periods (REP) scheme [24] . REP lets vehicles encrypt their beacon messages in a group manner using a group key \(k_g\). This is done after one of the group members (called coordinator) launches the random encryption process that is followed by a certificate updating to confuse the tracker. Ying et al. [25] had provided another mix-zone based scheme that uses the encryption but the mix-zones here are created on the fly (dynamically) according to the vehicle’s predicted location and other parameters.

Despite being the location-privacy preserving schemes an addition to the privacy level, they also entail the use of such techniques for subversion purposes; i.e., encrypting the location for the bad. (b) Similarly, and indirectly, a vehicle may send wrong geo-location data due to a wrong GPS signal reception; we point out to the GPS-spoofing attack [26] that is by definition: leading the receiver GPS device to believe receiving a legit GPS signal while in fact it is falsified and forged from another malicious source. The powerfulness and usability of GPS-spoofing is shown to be a fact as stated in [27] where J. Noh et al. demonstrated the exploit of the Unmanned-Aircraft-Vehicles UAV safe-hijacking using the GPS spoofing technique for the good (defending against terrorist UAVs). Another work by Y. Guo et al. that investigated a covert spoofing algorithm [28] in the UAV context had shown the applicability of such spoofing techniques. This just proves the possibility of exploiting the GPS spoofing attacks on other fields; spoofing the location of vehicles. As a result, vehicles are expected to send falsified location data upon receiving forged GPS signals and from here the necessity of detecting such an odd behavior becomes a must.

With all of this said, finding mechanisms to deter such abusing becomes a must. (c) Location detection techniques are considered to be a plausible direction against such threats. In the context of location detection inside buildings, Bahl and Paramvir had suggested the use of a radio-frequency (RF) based system made for locating and tracking users inside buildings and was called An In-Building RF-based User Location and Tracking System (RADAR) [29]. RADAR gets benefit from the recorded and processed signal strength information received by multiple base stations situated at the area of interest. Their real world experiment showed that despite the signal’s nature and the environment obstacles, they could achieve a precision ranging from 2 to 3 m which in fact can correctly pinpoint a room inside a building. In the same context, Youssef et al. [30] had investigated a WLAN location determination technique called (the Joint Clustering technique). They base on the signal strength probability distributions and the clustering of locations in their scheme. The scheme’s best advantage is the complexity reducing as it uses cluster based techniques and can be applied indoor and outdoor environments. The scheme can be applied as a helping tool to other context-aware applications. In [31], Svečko et al. had evaluated a particle filter algorithm used for the distance estimation via multiple antennas that are attached to the receiver. They had conducted the study on a real world environment and their proposed particle filter achieved better results than other propagation models (e.g., the ground reflection propagation model) which permits it to be a reliable distance estimator.

Besides being the transmitted signal a mean to reduce the IoV users’ location privacy, they also can defend against location abusing and data encryption used by attackers.

3 System Model

Fig. 2.
figure 2

GPS spoofing illustration using UAV technonology

In this section, we give our network and threat models. Then, we demonstrate our adversary’s GPS spoofing technique that bases on UAVs. Additionally, we describing the security model and the used coverage modes.

3.1 Network Model

It consists of (a) the vehicles set S that is defined as \(S= \{v_1, v_2, ...v_n\}\) where n represents the vehicles number and they communicate using the 802.11p standard (explained in [32]) via their On-Board-Units (OBUs) [33]. and (b) the infrastructure that allows the use of different provided services via Road-Side-Units (RSUs) [34], cellular towers and across the Internet to explore the V2X feature. This is illustrated in Fig. 1.

3.2 Threat Model

It refers to the malicious entity in the network. The main actor is (a) the attacker that possesses and controls (b) a set of vehicles \(S_a\) where \(S_a\in S\). The attacker [35] is responsible for spreading malicious and suspicious messages that, for example, use unknown encryption algorithms and encrypting indispensable message fields. The trigger for spreading this kind of messages is supposed to be done via UAVs by giving UAV-missions [36] to deliver malicious orders. This is also illustrated in Fig. 1.

3.3 UAV GPS-Spoofing Attack

This kind of attacks is foreseeable with the advent of UAVs, their cheapness and their availability. Our scenario, which is illustrated in Fig. 2, consists of three levels:

  • Level 2 : that is the origin of the legit GPS signal. Normally, vehicles take their locations by receiving the emitted GPS signal from the satellites to help determining their whereabouts.

  • Level 1: that is the exploited point by the adversary who aims at emitting a stronger and faked GPS signal to mislead the vehicles on their location/whereabouts. The taken scenario considers two kind of attacks (a) zone targeting and (b) vehicles set targeting and in both of them, a set of UAVs are used to emit the falsified GPS signal.

  • Level 0: that is the lower level where vehicles operate. When those vehicles are targeted, their sensing of the location are likely to be tricked especially that detecting a legit GPS signal from a fake one is still a big challenge to the research community; the GPS-spoofing attack [37].

By being the attacker able to forge falsified location and execute the GPS-spoofing attack, the targeted vehicles are expected to begin sending wrong geo-location data. Sending a wrong geo-location data may also be intentional in the case of attacker vehicles but considering the scenario of the GPS-spoofing attack, we do not want to instantly judge the behavior of the vehicle. Either way, comparing what is sent to where the vehicles is really at becomes mandatory to deal with such a possible attack scenario.

3.4 Types of Signal Receptions

When communicating, the sending vehicle emits a signal. Now when trying to receive that signal by a reception device, four main scenarios may occur: (a) an unsuccessful eavesdropping or reception with no collection at all, (b) single or mono-reception, (c) due-reception and a successful reception by getting the sent signal with at least three devices; that is the triangulation technique. Figure 3 shows the aforementioned scenarios.

Fig. 3.
figure 3

The different reception scenarios of an emitted signal by a moving car

3.5 Security Model and Coverage Modes

It is the law-side entity that aims at ensuring road-safety and data-security by only allowing legitimate vehicles to be present in the network. Thus, keeping an eye on the potential malicious and suspicious vehicles (also mislead vehicles; the GPS-spoofing attack victims) is its main task. For this purpose, the use of many security monitoring stations ms(s) becomes a must. These ms(s) are meant to collect the suspicious messages and reporting them to a security tracking module, also defined as Central Module (CM), and this later is responsible for performing the triangulation to pinpoint the monitored vehicle (\(mv_i\))’s whereabouts. A LEA is connected to the system to make decisions (e.g., excluding an entity if proven to be guilty). The supposed available coverage modes are illustrated in Fig. 4. The densities are supposed to be applicable, we justify this by being the LEA a part of the government, hence, having both (a) the financial and (b) the reachability to deploy such a massive ms(s) implanting would not be a problem (unlike for individual persons [38]).

Fig. 4.
figure 4

The assumed and used coverage modes

4 The Proposed Approach: SAMA

Fig. 5.
figure 5

SAMA implementation and functioning illustration

SAMA bases on the different received signal strengths from the proximal vehicles to the ms(s). For the implementation, we use two c++ data-structures namely: map and multimap [39] and the detailed working is explained in the next point. Figure 5 shows the modus-operandi of SAMA.

4.1 Description and Motivation

The adversary is able to use UAVs either to give orders for data encryption; hiding his vehicle(s)’ location or using his UAVs in order to execute the GPS-spoofing attack; misleading the targeted vehicles. Thus, location protection. In light of this, finding a counter-mechanism is a fair motivation. Benefiting from the location detection techniques serves to protect, expose and thwart such malicious acts substantially.

4.2 The Techniques’ Principles

SAMA bases on two depending steps: (a) a prior distance estimation then (b) location estimation using the calculate distances afterward. The two steps are explained as follows:

Distance Estimation. One of the most simplified and used distance estimation formulas is given in Eq. 1. Where Pt is the transmission power in (dBm) and d is the distance between the sender and the receiver in meter (m) [40]:

$$\begin{aligned} RSSI = Pt - 10n * log_{10}(d) \end{aligned}$$
(1)

This allows to find and calculate the distance d as follows (Eq. 2):

(2)

Location Estimation via the Triangulation Technique. The distance d is at hand, what is remaining is just applying the geometric method to determine a location from three points knowing that each point \(P_i\) is represented by the triple location (\(x_i\), \(y_i\), \(z_i\)) where \(i \in \{1,2,3\}\) and their three distances a, b and c from the target point respectively. It is done via the equations set 3, 4 and 5:

figure a

By expanding and combining the equations (3 and 4) then (3 and 5), we get the equations set :

figure b

We assume and define the following (the set 8):

(8)

This results in a one more step to the final solution:

figure c

Finally, the obtained location, in terms of x and y (assuming z is identical) coordinates, is gotten as follows:

figure d

4.3 SAMA Implemented Protocols

In this part, the on message reception by a monitoring station and on message reception by the central module protocols are explained in details with additional pseudo-algorithms as follows:

On message reception by a monitoring station each \(ms_i\) is devoted to collect the nearby messages and supposed to be integrating a lightweight calculation module dedicated to find a distance d from a gotten RSSI value of the received message. A report is sent next to the central module. This is shown in kind of a pseudo-algorithm; Algorithm 1.

figure e

On message reception by the central module upon receiving a report from \(ms_i\), CM proceeds to treating the obtained information like the distance between \(ms_i\) and the target vehicle in addition to the coordinates of \(ms_i\) which will be stored in the database of CM to be used next to calculate the vehicle’s estimated location. The pseudo-code is given in Algorithm 2.

figure f

5 Simulation Runs and Results

Table 2. Density details and achieved precision for Obstacle and Obstacles-Free scenarios

5.1 Simulation Setup

For the evaluation, the following tools are used: SUMO as the mobility simulator, Omnet++ as the network simulator and Veins [41] as the vehicular extension that acts as a bridge between SUMO and Omnet++. The used environment is an urban map consists of Munich city central taken by the Open-Street-Map tool. The exact model is found in [42]. As for the vehicles generation, we use the inter-arrival rate of 2.61 seconds per vehicle in a total simulation time of 300 s which leads to a generation of 115 vehicles. A variation of monitoring scenarios is also exploited and shown in Table 2. Additionally, we modified the PREXT [42] extension; that is a privacy extension, to integrate the central module and to add the triangulation technique to locate a specific node. For a holistic evaluation, we monitor every vehicle to measure the performances of SAMA under the toughest possible case with a frequency of one message per second. Thus, the case of only a set of targeted vehicles that are receiving the GPS-spoofing attack alone are not considered, but, all vehicles are considered.

5.2 Obstacles and Obstacles-Free Scenarios

In these two scenarios, we are interested on evaluating the effects of the Simple Obstacle Shadowing mode; that is an Analogue Model used to model the physical characteristics of the wireless medium. Thus, we consider the Obstacles scenario model when we are taking the obstacles’ effect during the communication into account and when we are not, we consider that as an Obstacles-Free Scenario.

5.3 Simulation Results

For the Obstacles Scenario Figure 6 shows that the monitoring stations could only collect about half of the sent message in the network when applying the basic density and they were just mono-receptions. However, the collection was increased to \(100\%\) in the other densities and the triangulations achieved their pick (more than 18k message) when in the absolute density.

Fig. 6.
figure 6

The sent messages number and the different reception types in the Obstacles scenario

For the Obstacles-Free scenario as shown in Fig. 7, the almost same results happened, but, with a remarkable powerful messages collection than that of the previous scenario. The better collection of sent messages in the basic density is an example for that in addition to the approximate \(100\%\) of successful triangulations in the absolute density.

Fig. 7.
figure 7

The sent messages number and the different reception types in the Obstacles-Free scenario

The achieved location precision which is the difference between the real and the estimated location. Three parameters are taken per each scenario: the average, the best and the worst precision. From Table 2, the Simple Obstacle Shadowing mode had affected the triangulation method enormously letting it be only feasible for the high and the absolute densities in the Obstacles scenario. Additionally, the obtained average is ranging in the order of 20 to 25 m which is not so precise, however, still gives a hint about the zone of the monitored vehicle \(mv_i\). For the Obstacles-Free, the triangulation method was successful in all density modes but the basic density. This is due to the absence of the Simple Obstacle Shadowing mode that used to affect the communications, not just for that, but it also enhanced the average precision that is, in all three densities, less than the order of \(3*10^{-2}\). This, gives the security bodies a very accurate location of the \(mv_i\).

6 Discussion and Future Work

A set of observation can be drawn: (a) the different density modes influence the amount of collected messages, the collection per type and the achieved precision. Also, (b) when considering the Simple Obstacle Shadowing mode, a lot of messages do not reach the monitoring stations appropriately leading to few receptions and less triangulations, hence, thwarting the location estimation. Additionally, (c) in the absolute density model, the dense overlapping stations, despite them giving higher number of triangulations, they unfortunately also degrade the achieved precisions. Finally, (d) when moving from the lowest (base) to the highest (absolute) density, the dominant type of collection will be that of the triangulations which is so natural as, theoretically, the intense implementation of monitoring stations leads to higher triangulation chances.

Even though being the Simple Obstacle Shadowing mode a real world effect that influences the precision of the monitoring stations considerably, it still gives some degree of precision which can be given as an entry to other location detection techniques. Moreover, the road map restriction can be used to infer the exact location of a monitored vehicle by excluding the non-common locations with the help of the different time instants and the moving context as shown in Fig. 8. This emphasizes a possible promising work direction with just mono-receptions instead of the reliance on triangulation for the location detection task.

Fig. 8.
figure 8

Exploiting the road restriction and time instances to eliminate false samples in just a mono-reception scenario

7 Conclusion

The location data hampering via encrypting and sealing the location fields in messages or launching GPS-spoofing attacks on a set of targeted vehicles can be seen as a serious security breach. In this work, we recalled the possibility of blurring the location by legitimate privacy schemes which highlight the negative effect if used maliciously in addition to the location misleading possibility resulted from the GPS-spoofing attacks. Fortunately, a set of location detection techniques does also exist; the set that uses the transmission signal as an indicator to the location. Among the applications, there is the triangulation method, explained and used on our proposed Security-Aware Monitoring Approach (SAMA). A malicious attacker that gives an order to his controlled vehicles and/or uses GPS-spoofing attacks via UAV-assisted missions in where, and for an extreme evaluation, we suppose that the orders are given to all present vehicles in the map which exposes the performances of SAMA under the worst possible situation. Two scenarios are considered: Obstacles and Obstacles-Free in addition to four density modes: basic, moderate, high and absolute. The obtained results are discussed in Sect. 6 where it showed the precision and the feasibility of SAMA, especially in the Obstacles-Free scenario.