2022
DOI: 10.1088/1361-6501/ac672a
|View full text |Cite
|
Sign up to set email alerts
|

GNSS spoofing detection technology based on Doppler frequency shift difference correlation

Abstract: Global Navigation Satellite System (GNSS) spoofing interference poses a great threat to the security of end users. Based on the same propagation path characteristics of the spoofing signals transmitted by a single antenna spoofing device, this paper proposes a method against single antenna spoofing jamming utilizing the Fréchet distance of Doppler frequency difference. When the receiver moves, the Doppler data in a window are fitted via the leastsquares method, and the Fréchet distance between the two satellit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 30 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…Spread spectrum security code (e.g., [32]) System Navigation message authentication (e.g., [32,33]) L1/L2 power level comparison (e.g., [34,35]) L1/L2 power level code phase comparison (e.g., [34]) Hardware DOA monitoring (e.g., [36,37]) Synthetic antenna array (e.g., [38]) Signal strength monitoring (e.g., [17,39]) Doppler monitoring (e.g., [40,41]) Code and phase rates consistency check (e.g., [34]) TOA monitoring (e.g., [17,42]) PRN code and data bit latency (e.g., [43][44][45]) Auxiliary peak tracking APT (e.g., [18]) Signal quality monitoring (e.g., [46][47][48]) Firmware Distribution analysis of correlator output (e.g., [49,50]) C/N 0 Monitoring (CNM) (e.g., [34,39]) Physical Cross-Check (PCC) (e.g., [51][52][53][54]) Clock Drift Monitoring (CDM) (e.g., [8,18]) Ephemeris Data Validation (EDV) (e.g., [34,55]) Software Pairwise Distance Monitoring (PDM) (e.g., [7,56]) Notation: Effective ( ), semi-effective ( ), and ineffective ( ) GPS spoofing detection regarding individual attacker models defined in Section 3.2, cf. Figure 2.…”
Section: Spoofing Countermeasure Methodsmentioning
confidence: 99%
“…Spread spectrum security code (e.g., [32]) System Navigation message authentication (e.g., [32,33]) L1/L2 power level comparison (e.g., [34,35]) L1/L2 power level code phase comparison (e.g., [34]) Hardware DOA monitoring (e.g., [36,37]) Synthetic antenna array (e.g., [38]) Signal strength monitoring (e.g., [17,39]) Doppler monitoring (e.g., [40,41]) Code and phase rates consistency check (e.g., [34]) TOA monitoring (e.g., [17,42]) PRN code and data bit latency (e.g., [43][44][45]) Auxiliary peak tracking APT (e.g., [18]) Signal quality monitoring (e.g., [46][47][48]) Firmware Distribution analysis of correlator output (e.g., [49,50]) C/N 0 Monitoring (CNM) (e.g., [34,39]) Physical Cross-Check (PCC) (e.g., [51][52][53][54]) Clock Drift Monitoring (CDM) (e.g., [8,18]) Ephemeris Data Validation (EDV) (e.g., [34,55]) Software Pairwise Distance Monitoring (PDM) (e.g., [7,56]) Notation: Effective ( ), semi-effective ( ), and ineffective ( ) GPS spoofing detection regarding individual attacker models defined in Section 3.2, cf. Figure 2.…”
Section: Spoofing Countermeasure Methodsmentioning
confidence: 99%
“…These observations include more details such as carrier-to-noise density ratio (C/N 0 ), signal spectrum, Doppler shift, pseudorange, carrier phase, satellite health indicator, real-time position data and dilution of precision (DOP), etc. Study anti-jamming and anti-spoofing mechanisms: The observations of the receiver in three scenarios can be used to investigate malicious attacks in different GNSS systems [1] , develop techniques for identification and detection GNSS spoofing or jamming [ 2 , 3 ], formulate strategies to eliminate the impact caused by spoofing or jamming [4] , and restore reliable positioning. Develop GNSS Monitoring system: These data can be used to analyze navigation satellite operation rules, satellite covering time above the receiver, satellite overhead time prediction and GNSS monitoring system construction [5] .…”
Section: Value Of the Datamentioning
confidence: 99%
“…Study anti-jamming and anti-spoofing mechanisms: The observations of the receiver in three scenarios can be used to investigate malicious attacks in different GNSS systems [1] , develop techniques for identification and detection GNSS spoofing or jamming [ 2 , 3 ], formulate strategies to eliminate the impact caused by spoofing or jamming [4] , and restore reliable positioning.…”
Section: Value Of the Datamentioning
confidence: 99%
“…Another approach is signal consistency monitoring, which detects spoofing signals by inspecting the code, carrier, and Doppler consistency. Recently, Li et al [81] proposed a method against single antenna spoofing jamming utilizing the Fréchet distance of Doppler frequency shift difference (DFSD). When the receiver moves randomly, the correlation between two authentic satellite signals is small, while the spoofing signals are with a high correlation.…”
Section: B Signal-level Authenticationmentioning
confidence: 99%