2020
DOI: 10.1049/iet-rsn.2019.0366
|View full text |Cite
|
Sign up to set email alerts
|

GNSS intermediate spoofing detection via dual‐peak in frequency domain and relative velocity residuals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 14 publications
(19 reference statements)
0
2
0
Order By: Relevance
“…They used the method of fast Fourier transform to detect the doublet and extract the Doppler difference of the doublet. In addition, they derived the relative velocity residual based on the Doppler difference through the above process, and compared it with the corresponding threshold to determine whether it was spoofed [60]. The analysis and summary for the spoofing detection methods based on Doppler shift is shown in Table VIII.…”
Section: A Equations Spoofing Detection Methods Based On Doppler Shiftmentioning
confidence: 99%
“…They used the method of fast Fourier transform to detect the doublet and extract the Doppler difference of the doublet. In addition, they derived the relative velocity residual based on the Doppler difference through the above process, and compared it with the corresponding threshold to determine whether it was spoofed [60]. The analysis and summary for the spoofing detection methods based on Doppler shift is shown in Table VIII.…”
Section: A Equations Spoofing Detection Methods Based On Doppler Shiftmentioning
confidence: 99%
“…A typical synchronous spoofing intrusion process includes scenarios such as initial synchronization, power increasing, and code phase pull-off [1], [4]. In the real world, inevitable synchronization errors, variations in the SSR, code phase and carrier phase of the spoofing signal, and the target receiver settings impact the spoofing success rate [7], especially when appropriate antispoofing signal processing methods are employed by the target receiver.…”
Section: Introductionmentioning
confidence: 99%