2020
DOI: 10.1109/lcsys.2019.2922497
|View full text |Cite
|
Sign up to set email alerts
|

Tuning-Free, Low Memory Robust Estimator to Mitigate GPS Spoofing Attacks

Abstract: The operation of critical infrastructures such as the electrical power grid, cellphone towers, and financial institutions relies on precise timing provided by stationary GPS receivers. These GPS devices are vulnerable to a type of spoofing called Time Synchronization Attack (TSA), whose objective is to maliciously alter the timing provided by the GPS receiver. The objective of this paper is to design a tuning-free, low memory robust estimator to mitigate such spoofing attacks. The contribution is that the prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…It is desirable to develop techniques that rely on readily available data at the navigation domain in the receiver, such as pseudoranges, pseudorange rates, and satellite-related information. Navigation domain countermeasures exploit statistics in pseudorange residuals or carrier-to-noise (CNR) ratio [26], [27], [28], drift-monitoring [29], sparsity characteristics of realistic spoofing profiles [21], [30], and robust estimation based on pseudoranges and pseudorange rates [31].…”
Section: A Prior Artmentioning
confidence: 99%
See 2 more Smart Citations
“…It is desirable to develop techniques that rely on readily available data at the navigation domain in the receiver, such as pseudoranges, pseudorange rates, and satellite-related information. Navigation domain countermeasures exploit statistics in pseudorange residuals or carrier-to-noise (CNR) ratio [26], [27], [28], drift-monitoring [29], sparsity characteristics of realistic spoofing profiles [21], [30], and robust estimation based on pseudoranges and pseudorange rates [31].…”
Section: A Prior Artmentioning
confidence: 99%
“…The works in [27], [29] focus mostly on developing spoofing detection schemes and do not readily yield corrected PVT estimates. The works in [21], [30], [31] focus on spoofing detection and mitigation of TSAs only. However, when spoofing attacks target both time and position domains, the aforementioned algorithms [21], [30], [31] are not generally capable of isolating and mitigating the TSA impact even for a static receiver.…”
Section: A Prior Artmentioning
confidence: 99%
See 1 more Smart Citation
“…Lift-off spoofing prevent the receiver from losing lock, which allows to remain concealed [12]. Since lift-off spoofing has become an important direction for the development of spoofing techniques, it is of practical importance to study how covert spoofing could be executed on target receivers during tracking stage [13].…”
Section: Introductionmentioning
confidence: 99%
“…Another effective resilient state estimator has been proposed in [26], where the impacts of perturbations to the impedance of transmission lines in power systems have been analysed. In [27], robust dynamic state estimation (DSE) against spoofing cyber‐attacks has been fulfilled in global positioning systems. In [28–30], the KF has been used for detection of the cyber‐attacks in the DSE process.…”
Section: Introductionmentioning
confidence: 99%