Wide-Area GNSS Spoofing and Jamming Detection Using AIS-Derived Spatiotemporal Integrity Monitoring

This paper proposes a three-stage framework that filters communication-layer defects from AIS data to reliably detect and classify wide-area GNSS spoofing and jamming events, achieving a 98.6% reduction in false alarms compared to naive clustering methods.

Sanghyeon Park, DeukJae Cho, Pyo-Woong Son

Published Fri, 13 Ma
📖 4 min read☕ Coffee break read

Imagine the ocean is a giant, busy highway, and every ship is a car equipped with a GPS and a radio. The radio (called AIS) constantly shouts out the ship's location, speed, and direction so everyone else can see them on a map. This system is crucial for safety.

However, there's a problem: the GPS signal can be tricked (spoofed) or blocked (jammed) by bad actors, making ships think they are somewhere they aren't, or stopping them from reporting their location entirely.

The problem is, the radio system itself is messy. Sometimes ships shout the same ID number by mistake, or the radio repeats old messages with the wrong time stamp. These "radio glitches" look exactly like GPS tricks on a map, causing a lot of false alarms.

This paper introduces a smart detective system that filters out the radio noise to find the real GPS attacks. Here is how it works, using simple analogies:

1. The "Noise Filter" (Cleaning the Radio)

Before looking for attacks, the system first cleans up the radio chatter.

  • The "Twin ID" Glitch: Imagine two different cars accidentally using the same license plate number. On a map, it looks like one car instantly teleported from New York to London. The system spots this "impossible jump" and realizes, "Ah, this isn't a teleportation; it's just two ships sharing a wrong ID." It throws this data away.
  • The "Echo Chamber" Glitch: Sometimes, a radio repeats an old message with a new time stamp. It's like a bad echo where you hear someone say "Hello" from 10 seconds ago, but the clock says "Now." This makes the ship look like it's moving backward. The system spots these "time-traveling" echoes and deletes them.

2. The "Bodyguard" (Checking the Ship's Movement)

Once the radio noise is gone, the system watches how the ships move. It uses a smart bodyguard (called an IMM filter) that knows the laws of physics.

  • The "Impossible Turn": If a massive cargo ship suddenly turns 90 degrees in a split second or accelerates like a rocket, the bodyguard raises a red flag.
  • The "Silent Car": If a ship suddenly stops sending messages for a long time (when it should be talking), the bodyguard notes it as a "silence anomaly."

3. The "Crowd Detective" (The Final Verdict)

This is the most clever part. The system asks: "Is this happening to just one ship, or to the whole neighborhood?"

  • Scenario A: The "Sick Ship" (Sensor Fault)
    If one ship is acting weird (jumping around or going silent) while all its neighbors are driving normally, the system says, "That's just that ship's GPS broken." It's like one person in a crowd stumbling; the crowd isn't tripping, just that one person. The system ignores this as a local error.

  • Scenario B: The "Magic Carpet" (Spoofing)
    If ten ships in the same area suddenly all jump 50 miles to a fake location at the exact same time, the system screams, "This is a Spoofing Attack!" It's like a magician making a whole group of people vanish and reappear in a different spot. Since they all moved together, it must be an external force messing with their GPS.

  • Scenario C: The "Blackout" (Jamming)
    If ten ships in the same area all suddenly go silent at the exact same time, the system says, "This is a Jamming Attack!" It's like someone turned off the lights in a whole room. Since they all went dark together, it's not a broken bulb; it's a power outage caused by an attacker.

Why This Matters

In the past, researchers looked at the data and saw thousands of "weird events," but most were just radio glitches or broken ship sensors. This new system acts like a high-tech sieve:

  1. It catches the "radio glitches" (MMSI duplicates, time delays).
  2. It catches the "broken sensors" (single ships acting weird).
  3. It only keeps the "real attacks" (groups of ships acting weird together).

The Result:
When they tested this on nearly 1 billion messages from Korean waters, they found that the old methods were screaming "Attack!" 98.6% of the time when there was no attack at all. This new system cleaned up that noise, finding only the real attacks (17 spoofing events and 343 jamming events) and ignoring the rest.

In short: This paper teaches us how to stop confusing a broken radio with a terrorist attack, ensuring that when we see a group of ships acting strangely, we know it's a real threat and not just a glitch.