2022
DOI: 10.1016/j.comnet.2022.109230
|View full text |Cite
|
Sign up to set email alerts
|

GPS spoofing detection via crowd-sourced information for connected vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…Spread spectrum security code (e.g., [32]) System Navigation message authentication (e.g., [32,33]) L1/L2 power level comparison (e.g., [34,35]) L1/L2 power level code phase comparison (e.g., [34]) Hardware DOA monitoring (e.g., [36,37]) Synthetic antenna array (e.g., [38]) Signal strength monitoring (e.g., [17,39]) Doppler monitoring (e.g., [40,41]) Code and phase rates consistency check (e.g., [34]) TOA monitoring (e.g., [17,42]) PRN code and data bit latency (e.g., [43][44][45]) Auxiliary peak tracking APT (e.g., [18]) Signal quality monitoring (e.g., [46][47][48]) Firmware Distribution analysis of correlator output (e.g., [49,50]) C/N 0 Monitoring (CNM) (e.g., [34,39]) Physical Cross-Check (PCC) (e.g., [51][52][53][54]) Clock Drift Monitoring (CDM) (e.g., [8,18]) Ephemeris Data Validation (EDV) (e.g., [34,55]) Software Pairwise Distance Monitoring (PDM) (e.g., [7,56]) Notation: Effective ( ), semi-effective ( ), and ineffective ( ) GPS spoofing detection regarding individual attacker models defined in Section 3.2, cf. Figure 2.…”
Section: Spoofing Countermeasure Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Spread spectrum security code (e.g., [32]) System Navigation message authentication (e.g., [32,33]) L1/L2 power level comparison (e.g., [34,35]) L1/L2 power level code phase comparison (e.g., [34]) Hardware DOA monitoring (e.g., [36,37]) Synthetic antenna array (e.g., [38]) Signal strength monitoring (e.g., [17,39]) Doppler monitoring (e.g., [40,41]) Code and phase rates consistency check (e.g., [34]) TOA monitoring (e.g., [17,42]) PRN code and data bit latency (e.g., [43][44][45]) Auxiliary peak tracking APT (e.g., [18]) Signal quality monitoring (e.g., [46][47][48]) Firmware Distribution analysis of correlator output (e.g., [49,50]) C/N 0 Monitoring (CNM) (e.g., [34,39]) Physical Cross-Check (PCC) (e.g., [51][52][53][54]) Clock Drift Monitoring (CDM) (e.g., [8,18]) Ephemeris Data Validation (EDV) (e.g., [34,55]) Software Pairwise Distance Monitoring (PDM) (e.g., [7,56]) Notation: Effective ( ), semi-effective ( ), and ineffective ( ) GPS spoofing detection regarding individual attacker models defined in Section 3.2, cf. Figure 2.…”
Section: Spoofing Countermeasure Methodsmentioning
confidence: 99%
“…In this context, Oligeri et al [62] propose a GPS spoofing detection and localization approach that leverages the Public Land Mobile Network (PLMN) infrastructure of terrestrial mobile communication. In [54], the authors even extend their work to the use of WiFi networks and present a crowd-sourced approach. However, this promising work, which leverages the existence of existing land-based infrastructure, is not applicable at sea.…”
Section: Complementary Approachesmentioning
confidence: 99%
“…Misleading positioning information can result incorrect decisions by safety systems, leading to accidents or disruptions in traffic flow. As shown in Figure 12, the Spoofer generates fake GPS signals and transmit them to nearby vehicles, fooling their GPS receivers into calculating incorrect positions [174].…”
Section: Location Spoofingmentioning
confidence: 99%