2022
DOI: 10.3390/rs14194826
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of GNSS Spoofing and Anti-Spoofing Technology

Abstract: With the development of satellite navigation technology, the research focus of GNSS has shifted from improving positioning accuracy to expanding system application and improving system performance. At the same time, improving the survivability of satellite navigation systems has become a research hotspot in the field of navigation, especially with regard to anti-spoofing. This paper first briefly analyzes the common interference types of satellite navigation and then focuses on spoofing. We analyze the charact… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 71 publications
0
17
0
Order By: Relevance
“…Figures 7k and 7l illustrate normalized deviations spread in GPS parameters of jamming with the spoofing setting with respect to normal setting. The deviation in each parameter can be calculated using (1), where param js is a parameter observed in jamming with spoofing setting and param n is the corresponding parameter value observed in the normal setting. The difference between these values is divided by the maximum observed value to get the normalized parameter deviation.…”
Section: Software Configurationmentioning
confidence: 99%
See 1 more Smart Citation
“…Figures 7k and 7l illustrate normalized deviations spread in GPS parameters of jamming with the spoofing setting with respect to normal setting. The deviation in each parameter can be calculated using (1), where param js is a parameter observed in jamming with spoofing setting and param n is the corresponding parameter value observed in the normal setting. The difference between these values is divided by the maximum observed value to get the normalized parameter deviation.…”
Section: Software Configurationmentioning
confidence: 99%
“…Unmanned Aerial Vehicles (UAVs) have revolutionized the way we perceive aviation. The UAV industry, particularly the utilization of low-cost UAVs has been on a constant rise and is projected to increase further [1]. This rapid ascent in demand is due to numerous factors, such as the integration of advanced technologies, cost-effectiveness, and the ability to perform autonomous tasks without human intervention [2] [3].…”
Section: Introductionmentioning
confidence: 99%
“…GNSS is a satellite-based system that can provide positioning, navigation and timing (PVT) services for users on the ground worldwide. Today, major countries are vigorously developing their own GNSS systems, such as Global Positioning System (GPS) in the United States, BeiDou navigation satellite system (BDS) in China, Galileo in Europe, and the Global Navigation Satellite System (GLONASS) in Russia [13]. GNSS is, in principle, vulnerable to kinds of attacks, especially spoofing attacks, like SATCOM systems.…”
Section: Authentication In Gnssmentioning
confidence: 99%
“…However, they only focused on the physical layer and did not take authentication into consideration. Studies in [11], [12], and [13] present comprehensive investigations of spoofing attacks and the adopted solutions for Global Navigation Satellite Systems (GNSSs). However, none of them considered satellite-based communication (SATCOM) systems.…”
Section: Introductionmentioning
confidence: 99%
“…Attackers use a suitable SDR to generate spoofing or jamming signals, disrupting the UAV's regular operation and causing it to deviate from its intended course. These attacks can have serious consequences, as they can cause the UAV to drift away from the actual course or may even malfunction, resulting in a crash [1] [2].…”
Section: Introductionmentioning
confidence: 99%