2018
DOI: 10.1109/taes.2017.2765258
|View full text |Cite
|
Sign up to set email alerts
|

GNSS Signal Authentication Via Power and Distortion Monitoring

Abstract: Abstract-We propose a simple low-cost technique that enables civil Global Positioning System (GPS) receivers and other civil global navigation satellite system (GNSS) receivers to reliably detect carry-off spoofing and jamming. The technique, which we call the Power-Distortion detector, classifies received signals as interference-free, multipath-afflicted, spoofed, or jammed according to observations of received power and correlation function distortion. It does not depend on external hardware or a network con… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
88
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 129 publications
(110 citation statements)
references
References 26 publications
1
88
0
Order By: Relevance
“…Spoofing signals are designed to mislead GNSS receivers by generating fabricated synchronized navigation signals leading to fake navigation solutions [1,2,3]. Hence, detection and mitigation of spoofing attacks is critical for emerging applications such as autonomous vehicle navigation, environmental monitoring and forensic applications [4,5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Spoofing signals are designed to mislead GNSS receivers by generating fabricated synchronized navigation signals leading to fake navigation solutions [1,2,3]. Hence, detection and mitigation of spoofing attacks is critical for emerging applications such as autonomous vehicle navigation, environmental monitoring and forensic applications [4,5].…”
Section: Introductionmentioning
confidence: 99%
“…Consistency checks can be performed in different ways including intra-system, inter-system, multi-frequency and multi-sensor approaches. In the intra-system consistency check, the presence of spoofing signals can be detected by monitoring the consistency of the code and carrier Doppler or by monitoring the carrier-to-noise ratio [1,13]. The emergence of different civilian GNSS constellations has led to the availability of multi-constellation receivers.…”
Section: Introductionmentioning
confidence: 99%
“…A plethora of countermeasures have been designed to make the receivers robust against more sophisticated attacks [9], [15], [17]- [19], [21]- [25], [27], [28], [33]- [35]. Vector tracking exploits the signals from all satellites jointly and feedbacks the predicted position, velocity, and time (PVT) to the internal lock loops [23], [24], [33].…”
Section: A Spoofing Detection Techniques In the Literaturementioning
confidence: 99%
“…The attack on the pseudoranges suddenly appears at t = 30 s and perturbs the pseudoranges by 8000 m. The equivalent attack on pseudorange rates is a Dirac delta function. • Type II: The spoofer gradually manipulates the authentic signals and changes the clock bias through time [11], [17], [19], [28], [29], [41]. This attack can be modeled by where sρ andṡρ are respectively called distance equivalent velocity and distance equivalent acceleration of the attack.…”
Section: Modeling Time Synchronization Attacksmentioning
confidence: 99%
See 1 more Smart Citation