2013 IEEE Global Conference on Signal and Information Processing 2013
DOI: 10.1109/globalsip.2013.6736854
|View full text |Cite
|
Sign up to set email alerts
|

A combined symmetric difference and power monitoring GNSS anti-spoofing technique

Abstract: Civil Global Navigation Satellite System (GNSS) signals are vulnerable to spoofing attacks that deceive a victim receiver into reporting counterfeit position or time information. The primary contribution of this paper is a non-cryptographic GNSS anti-spoofing technique that "sandwiches" a spoofer between a correlation function distortion monitor and a total in-band power monitor. The defense exploits the difficulty of mounting an effective spoofing attack that simultaneously maintains a low-enough counterfeit … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
27
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 47 publications
(28 citation statements)
references
References 9 publications
(10 reference statements)
1
27
0
Order By: Relevance
“…Besides NMA, a number of promising methods are currently being developed to defend against civil GNSS spoofing attacks [5]- [10]. Nonetheless, NMA is unique in imposing minimal burden on a low-cost receiver: no hardware modifications are required and the increase in processing demands is negligible.…”
Section: Introductionmentioning
confidence: 99%
“…Besides NMA, a number of promising methods are currently being developed to defend against civil GNSS spoofing attacks [5]- [10]. Nonetheless, NMA is unique in imposing minimal burden on a low-cost receiver: no hardware modifications are required and the increase in processing demands is negligible.…”
Section: Introductionmentioning
confidence: 99%
“…Other signal processing techniques are based on the distribution analysis of the correlator output [30]. There exist also signal quality monitoring techniques, which aim at detecting distortions in the correlation function via the use of ratio metric tests [31,32,33,34,35]. Other techniques are based on the time of arrival and other consistency checks.…”
Section: Types Of Spoofing Attacks and Countermeasuresmentioning
confidence: 99%
“…Spoofing attack is detected if this distribution considerably deviates from the standard form. The combined technique "sandwiches" an attacker between a correlation function distortion monitoring and a total in-band power monitoring (Wesson et al, 2013).…”
Section: Prior Anti-spoofing Methods On Tracking Loopmentioning
confidence: 99%