2020
DOI: 10.1109/tsp.2020.3028752
|View full text |Cite
|
Sign up to set email alerts
|

Spatial GNSS Spoofing Against Drone Swarms With Multiple Antennas and Wiener Filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 23 publications
0
9
0
Order By: Relevance
“…However, the concept of swarm formation plays a vital role in this case as transmitting a signal relative to any individual drone in the swarm might create obvious changes in the FANET's shape. This observation is considered by Ceccato et al [56] in 2020 to design a spoofing tool against FANET to divert the routes of the entire swarm without disrupting the formation. This is called 'Spatial Spoofing', where FANETs move in the spoofed area in formation as if they are moving in their real target area.…”
Section: A Gps Spoofing Attack Mechanisms In Uavsmentioning
confidence: 99%
“…However, the concept of swarm formation plays a vital role in this case as transmitting a signal relative to any individual drone in the swarm might create obvious changes in the FANET's shape. This observation is considered by Ceccato et al [56] in 2020 to design a spoofing tool against FANET to divert the routes of the entire swarm without disrupting the formation. This is called 'Spatial Spoofing', where FANETs move in the spoofed area in formation as if they are moving in their real target area.…”
Section: A Gps Spoofing Attack Mechanisms In Uavsmentioning
confidence: 99%
“…From ( 1) and (7), it is clear that both expressions are identical except for notational differences. Therefore, if the number of spoofers and the number of visible satellites are equal, both hypotheses are identical and the detector presented in this work cannot differentiate between them.…”
Section: System Modelmentioning
confidence: 99%
“…However, GNSS technology may be vulnerable to malicious attacks, notably jamming, meaconing, replaying/relaying, and spoofing [3]- [7]: Jamming can prevent navigation signal acquisition and degrade or deny positioning and synchronization altogether. Meaconing/replaying and spoofing can manipulate the position (and the time correction) computed by the victim GNSS receivers.…”
Section: Introductionmentioning
confidence: 99%
“…To solve the first limitation, we first sort and list the key techniques of GNSS spoofing (i.e. a relatively easily achieved generative spoofing [20], a more complex generative spoofing [7], and forwarding spoofing [21]) and anti‐spoofing (i.e. the anti‐spoofing technologies based on the encryption and authentication of navigation signals [22], the signal characteristics [23], and the auxiliary information [24]) and their features (i.e.…”
Section: Introductionmentioning
confidence: 99%