2021
DOI: 10.1109/jsen.2021.3105404
|View full text |Cite
|
Sign up to set email alerts
|

GNSS Spoofing Jamming Detection Based on Generative Adversarial Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(20 citation statements)
references
References 23 publications
0
14
0
Order By: Relevance
“…That is, (9) shall meet the following constraints: (11) where According to (9), the spoofer calculates the measurement deviation required for spoofing according to the system deviation of the GNSS/IMU required for a single epoch and estimated gain matrix K i . The position constraint in (10) is taken as the objective function of the product of gain matrix K i and measured value deviation; (11) is taken as the constraints to solve the optimal measured value deviation.…”
Section: Avoiding Parameter Rationality Checkmentioning
confidence: 99%
See 1 more Smart Citation
“…That is, (9) shall meet the following constraints: (11) where According to (9), the spoofer calculates the measurement deviation required for spoofing according to the system deviation of the GNSS/IMU required for a single epoch and estimated gain matrix K i . The position constraint in (10) is taken as the objective function of the product of gain matrix K i and measured value deviation; (11) is taken as the constraints to solve the optimal measured value deviation.…”
Section: Avoiding Parameter Rationality Checkmentioning
confidence: 99%
“…At present, there are many spoofing detection methods based on the single GNSS module [9,10], but any method is difficult when dealing with all spoofing methods [11]. In GNSS and the inertial measurement unit (IMU) system, IMU constantly uses measurement information of GNSS to correct its own error.…”
Section: Introductionmentioning
confidence: 99%
“…Countermeasures for jamming and spoofing threats have been extensively discussed and proposed in the literature [11], and, as far as spoofing is concerned and targeted by our test campaign, a brief review will be covered in this article. As recalled later on, many of the proposed spoofing detection techniques require the implementation of sophisticated algorithms that need to have access to the low-level signal processing stages of the GNSS receiver in order to be effective against simplistic to advanced spoofing attacks [12]- [17].…”
Section: Introductionmentioning
confidence: 99%
“…These methods include received power monitoring (RPM) [9], signal quality monitoring (SQM) [10], [11], carrier-to-noise ratio (C/N0) monitoring [12], and carrier Doppler monitoring [13], [14]. Techniques based on artificial neural networks (NNs) are another recent novel approach for detecting spoofing attacks [15], [16]. In [16], a generative adversarial network was proposed for spoofing detection based on the characteristics of the counterfeit signals in the acquisition results.…”
Section: Introductionmentioning
confidence: 99%
“…Techniques based on artificial neural networks (NNs) are another recent novel approach for detecting spoofing attacks [15], [16]. In [16], a generative adversarial network was proposed for spoofing detection based on the characteristics of the counterfeit signals in the acquisition results. However, the abovementioned techniques can only detect counterfeit attacks, but cannot mitigate spoofing.…”
Section: Introductionmentioning
confidence: 99%