Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 201 2019
DOI: 10.33012/2019.17076
|View full text |Cite
|
Sign up to set email alerts
|

GNSS Spoofing Detection Techniques by Cellular Network Cross-check in Smartphones

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…As to the advent of the crowdsourcing technique, GNSS spoofing detection by a mobile phone was proposed in [33][34][35], where the reported GNSS positions or times are cross-checked with the reported cellular network positions or times. A spoofing alarm will be raised if these two reports of positions or times are dramatically different.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…As to the advent of the crowdsourcing technique, GNSS spoofing detection by a mobile phone was proposed in [33][34][35], where the reported GNSS positions or times are cross-checked with the reported cellular network positions or times. A spoofing alarm will be raised if these two reports of positions or times are dramatically different.…”
Section: Related Workmentioning
confidence: 99%
“…The large number and the wide spread of the receivers lead to the crowdsourcing method as an attractive approach for GNSS jammer monitoring and localization in a relatively large area [30][31][32], because it avoids the requirement of deploying dedicated devices to monitor the interference, thus greatly reducing the deployment costs of the system. The representative ones are the mobile phone raw measurements integrity method [33], the cross-checking between GNSS and cellular network measurements [34], and the generalized likelihood-ratio test algorithm based on multiple receivers' double differential pseudoranges (DP-GLRT) [39]. The crowdsourcing method can help authority organizations to find interference more efficiently and protect the GNSS usage for the public from spoofing harms, This paper presents a new spoofing detection method by exploiting the spatial diversity of the double differential pseudoranges of crowdsourcing receivers, which is named as double differential pseudorange spatial distribution (D 2 PS).…”
Section: Introductionmentioning
confidence: 99%
“…The estimated position is then used to cross-check the consistency of the vehicle's GPS position. The authors in [33] used the position estimates obtained by the data relative to the neighboring cells in order to check the validity of the GPS position of a smartphone. Different from the aforementioned solutions, the work in [34] considered the use of information received from 5G network to recognize spoofed UAV's GPS positions reported to UTM.…”
Section: Mobile Cellular Network Based Approachesmentioning
confidence: 99%
“…The work in [16] exploited the Receive Signals Strength (RSS) from 2G base stations to estimate the vehicle position and cross-check the vehicle's GPS position. In [17], the authors used the data relative to the neighboring cells to verify the GPS position. The authors in [18] considered the use of 5G network to infer the trust area where the GPS position should be located and recognize spoofed UAV's GPS positions.…”
Section: Introductionmentioning
confidence: 99%