“…Anti-spoofing technology based on data-level NMA [34], [95], [96], [97] PA [99], [100] NMA&PA [101], [102] SCA [103], [104], [105] SCE [106], [107] WT [41], [108] CA [1], [109], [110] NON-NMET [32], [111], [112] NMET…”
Section: Discussionmentioning
confidence: 99%
“…Method for positioning spoofer based on a spacetime doubledifference observation model [97] This method only needs a GNSS receiver and observes the spoofing signal to locate the spoofing party.…”
“…proposed a method to use the receiver to track the position of the spoofer. The method uses the time and ephemeris parameters of the spoofed satellite signal received by the receiver to replay the spoofed signal, thereby achieving the effect of tracking the spoofer [97]. The difficulty and implementation phases for the twelve types of spoofing detection or suppression methods introduced in this section and the concerns are different.…”
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have some vulnerability in responding to spoofing attack and jamming attack, because the format and modulation of GNSS civilian signals are public. Based on the concerns of existing GNSS spoofing scenarios, this paper reviews the research on GNSS anti-spoofing technologies from two aspects. In this paper, the strategies of spoofing attacks discovered at this stage are classified in detail, the protection effect and scheme implementation complexity of various anti-spoofing techniques against spoofing attacks are analyzed from the perspective of signal-level and data-level. More specifically, we comprehensively analyze the ability for the combined anti-spoofing methods at the signal-level and the data-level to protect from combinations of different spoofing attack. Finally, the future development trend and potential research direction of GNSS anti-spoofing technology are summarized and predicted.
“…Anti-spoofing technology based on data-level NMA [34], [95], [96], [97] PA [99], [100] NMA&PA [101], [102] SCA [103], [104], [105] SCE [106], [107] WT [41], [108] CA [1], [109], [110] NON-NMET [32], [111], [112] NMET…”
Section: Discussionmentioning
confidence: 99%
“…Method for positioning spoofer based on a spacetime doubledifference observation model [97] This method only needs a GNSS receiver and observes the spoofing signal to locate the spoofing party.…”
“…proposed a method to use the receiver to track the position of the spoofer. The method uses the time and ephemeris parameters of the spoofed satellite signal received by the receiver to replay the spoofed signal, thereby achieving the effect of tracking the spoofer [97]. The difficulty and implementation phases for the twelve types of spoofing detection or suppression methods introduced in this section and the concerns are different.…”
A large number of facts prove that Global Navigation Satellite System (GNSS) has certain security risks and is threatened by attacks. In particular, GNSS civilian signal receivers have some vulnerability in responding to spoofing attack and jamming attack, because the format and modulation of GNSS civilian signals are public. Based on the concerns of existing GNSS spoofing scenarios, this paper reviews the research on GNSS anti-spoofing technologies from two aspects. In this paper, the strategies of spoofing attacks discovered at this stage are classified in detail, the protection effect and scheme implementation complexity of various anti-spoofing techniques against spoofing attacks are analyzed from the perspective of signal-level and data-level. More specifically, we comprehensively analyze the ability for the combined anti-spoofing methods at the signal-level and the data-level to protect from combinations of different spoofing attack. Finally, the future development trend and potential research direction of GNSS anti-spoofing technology are summarized and predicted.
“…There are two types of spoofer localization techniques. The first one, proposed by Shang et al (2020), uses only one receiver, which is a major advantage. However, this technique can only deal with a meaconer, which is supposed to record and replay the satellite signals with relatively unchanged delay to produce unbiased spoofer position estimations.…”
Global navigation satellite systems (GNSS) can provide position and timing information and is widely utilized in modern life. However, the security and reliability of GNSSs have been challenged by spoofing attacks recently (Humphreys et al., 2008). Civil GNSS signals are very weak when arriving at the surface of the Earth, and their structures are public. These two facts make spoofing attacks feasible. The field tests in Bhatti and Humphreys (2017), Humphreys (2016a) demonstrate that, due to spoofing, GNSS users can derive falsified position and timing solutions without awareness.
Spoofing Detection TechniquesIn order to alarm victimized GNSS users, spoofing detection techniques have been studied extensively (
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.