2012
DOI: 10.1109/taes.2012.6324665
|View full text |Cite
|
Sign up to set email alerts
|

A Spoofing Detection Method for Civilian L1 GPS and the E1-B Galileo Safety of Life Service

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…GPS signal security is an important aspect for the presented solution and is an active research topic [28]- [30]. Forays into GPS signal security are out of the scope of this paper and for the purposes of the solution we assume that the setup is capable to detect GPS spoofing attempts, as described in [28], [30].…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…GPS signal security is an important aspect for the presented solution and is an active research topic [28]- [30]. Forays into GPS signal security are out of the scope of this paper and for the purposes of the solution we assume that the setup is capable to detect GPS spoofing attempts, as described in [28], [30].…”
Section: Security Analysismentioning
confidence: 99%
“…Forays into GPS signal security are out of the scope of this paper and for the purposes of the solution we assume that the setup is capable to detect GPS spoofing attempts, as described in [28], [30]. However, we consider GPS security at application level, to ensure that daemon D is not tampered and it reads the location data from an interface which is connected to a valid, physical navigation device.…”
Section: Security Analysismentioning
confidence: 99%
“…All environmental conditions and interferences have a significant effect on ACF 8 . These conditions and interferences can be identified using SQM techniques 9 . In Wesson et al, 10 many SQM techniques are discussed in terms of their performance for particular uses like Delta Metric, Early–Late Phase Metric, and Magnitude Difference Metric, among others.…”
Section: Introductionmentioning
confidence: 99%
“…Spoofing are performed by generating signals that strongly resemble genuine GNSS signals, or by repeating real GNSS signals. Target receiver mistakes the spoofing signal for a real signal, and tracks this signal, thereby outputting either erroneous positioning solutions or no information [8]. Spoofing carry the greatest potential for damage among all GNSS interference techniques [9].…”
Section: Introductionmentioning
confidence: 99%