2016
DOI: 10.3390/s16122187
|View full text |Cite
|
Sign up to set email alerts
|

A Method of Detections’ Fusion for GNSS Anti-Spoofing

Abstract: The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a measurement that the receiver has obtained. The method based on a single detector is insufficient against spoofing attacks in some scenarios. How to fuse multiple detections together is a problem that concerns the performance of GNSS anti-spoofing. Scholars have put for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2025
2025

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Each consistency check provides its own soft output that can then be combined to return a unique hard output as a flag stating that a potential threat is present. The idea is to use a method based on Dempster-Shafer theory (DST) to fuse multiple detectors as done in [15].…”
Section: Fusion Techniquementioning
confidence: 99%
“…Each consistency check provides its own soft output that can then be combined to return a unique hard output as a flag stating that a potential threat is present. The idea is to use a method based on Dempster-Shafer theory (DST) to fuse multiple detectors as done in [15].…”
Section: Fusion Techniquementioning
confidence: 99%
“…Pre–correlation time-frequency (TF) domain analysis, mainly focusing on jamming signals, is adopted in [37,38,39]. Targeting specifically spoofing detection, works in [40,41] propose post–correlation approaches based respectively on a new particle filter for the positioning computation and detections’ fusion based on correlators output monitoring and Doppler consistency check. A subspace projection-based spoofing mitigation algorithm, relying on code delay and Doppler information, is detailed in [42].…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…In the signal features method, the features of the spoofing signal are quite similar to those of the actual signal and there is no sudden change in the transition process; but still, the signal feature method has not proven to work well. In addition, some crossing methods were proposed to detect spoofing, for instance machine learning [32], maximum likelihood estimation [33], and cooperation of multiple detections [34]. However, these methods are still dependent on prior information or actual signal features [35].…”
Section: Introductionmentioning
confidence: 99%