2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014 2014
DOI: 10.1109/plans.2014.6851501
|View full text |Cite
|
Sign up to set email alerts
|

Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers

Abstract: Abstract-The vulnerability against interference, spoofing, and jamming of GNSS receivers is considered nowadays a major security concern. This security threat is exacerbated with the existing market availability of GPS jamming and spoofing equipment sold at reasonable prices. If jamming is the main issue faced at present, spoofing, which allows hijacking someone from the expected path, may lead to even worse consequences. Even with the latest security measures that are going to be deployed on the Galileo PRS s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(20 citation statements)
references
References 7 publications
0
16
0
Order By: Relevance
“…Therefore, GPS receivers will ignore the true signal. These attacks can be detected by various techniques, such as statistical properties [107], a Kalman filter [108] and phase delay measurements [109]. Based on the vulnerabilities in the Bluetooth-enabled system [110] and keyless entry code, close proximity vulnerability attacks can be used to interfere with the vehicle's engine control units or gain access to a vehicle.…”
Section: Cyber-security Issuesmentioning
confidence: 99%
“…Therefore, GPS receivers will ignore the true signal. These attacks can be detected by various techniques, such as statistical properties [107], a Kalman filter [108] and phase delay measurements [109]. Based on the vulnerabilities in the Bluetooth-enabled system [110] and keyless entry code, close proximity vulnerability attacks can be used to interfere with the vehicle's engine control units or gain access to a vehicle.…”
Section: Cyber-security Issuesmentioning
confidence: 99%
“…Even though we separately saved the keys for mounting the FS2 in the in-depth file system, this problem also affects the FS1. Fortunately, there have been some approaches related to anti-GPS spoofing [22] already and by the collaboration of the in-depth file system and those anti-GPS spoofing technologies the problem can be mitigated. Another option for mitigating the risk of GPS spoofing is to obtain the GPS coordinates from a designated device such as a smartphone and realize the integration by using public key cryptography.…”
Section: Gps Spoofingmentioning
confidence: 99%
“…where l is the vertical alert limit, and T 2 is pre-defined threshold for detection which is the same as that in (19).…”
Section: B Spoofing Integrity Riskmentioning
confidence: 99%
“…As a result, the trajectory of the target user can be controlled through the fake broadcast signals [12]. Numerous anti-spoofing techniques have been developed and vulnerability of these existing methods have been discussed in [18,19]. These include cryptographic authentication techniques employing modified GNSS navigation data [20][21][22], spoofing discrimination using spatial processing by antenna arrays and automatic gain control schemes [23][24][25], GNSS signal direction of arrival comparison [26], code and phase rate consistency checks [27], high-frequency antenna motion [13], and signal power monitoring techniques [28,29].…”
Section: Introductionmentioning
confidence: 99%