MIT Sloan AI Adoption: Build a Playbook That Drives Real Business ROI
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the vulnerabilities of GPS and INS-based location tracking systems for road transportation in this IEEE conference talk. Delve into algorithms that enable adversaries to travel to alternate locations undetected, despite INS-aided GPS monitoring. Examine the construction of graph models for road networks and the generation of spoofed routes that render gyroscope and accelerometer sensors ineffective. Learn about a real-time integrated GPS/INS spoofer that accounts for traffic conditions and dynamically generates spoofing signals. Analyze experimental results from ten different cities, revealing the potential for attackers to reach destinations up to 30 km away without detection. Discover proposed countermeasures to limit adversarial capabilities without hardware modifications. Gain insights into the security challenges facing location-based systems and potential solutions for enhancing their resilience against sophisticated attacks.
Syllabus
Intro
Contributions
High-level Attack Overview
A Visual Representation
Graph Construction
Intuition for Spoof Routes Generation
Spoof Routes Generation Algorithm
Intuition for Escape Routes Generation
Escape Routes Generation Algorithm
Real World Spoofer Evaluation
Evaluation Methodology
Maximum Displacement from Intended Destination
Estimated Coverage Area of Escape Routes
Countermeasure. Secure Paths Algorithm
Summary & Questions?
Taught by
IEEE Symposium on Security and Privacy
Tags
Reviews
5.0 rating, based on 1 Class Central review
Showing Class Central Sort
-
Review:
The presentation on Security of GPS-INS Based On-Road Location Tracking Systems clearly explains how integrating GPS with inertial navigation systems improves accuracy and reliability in vehicle tracking. It also highlights important security challenges such as signal spoofing and system vulnerabilities. The talk is informative, technically detailed, and useful for understanding how modern transportation tracking systems can be protected from cyber threats.