2020
DOI: 10.1109/jsen.2020.2984525
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous Lift-Off Spoofing on Satellite Navigation Receivers in the Signal Tracking Stage

Abstract: As Global Navigation Satellite System (GNSS) spoofing techniques are highly stealthy and pose a tremendous risk to targets using GNSS technology, studies on GNSS spoofing techniques have been in the spotlight. If the accurate position and velocity of the target receiver can be obtained, the target receiver can be covertly spoofed during the signal tracking stage using synchronous lift-off spoofing. However, it is often difficult to accurately obtain the position and velocity of a target in real GNSS spoofing s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…The induction process of induced spoofing can be demonstrated by the auto-correlation function (ACF) model of the authentic and spoofing signals [3,20]. Depending on the methods of code phase alignment, induced spoofings can be classified as synchronous and asynchronous [3,8,16,[21][22][23][24]. Figure 1 shows the induction processes of the two methods.…”
Section: Implementation Strategymentioning
confidence: 99%
See 3 more Smart Citations
“…The induction process of induced spoofing can be demonstrated by the auto-correlation function (ACF) model of the authentic and spoofing signals [3,20]. Depending on the methods of code phase alignment, induced spoofings can be classified as synchronous and asynchronous [3,8,16,[21][22][23][24]. Figure 1 shows the induction processes of the two methods.…”
Section: Implementation Strategymentioning
confidence: 99%
“…According to the technical complexity and the difficulty of detection, generative spoofing can be classified as simplistic spoofing, intermediate spoofing, and sophisticated spoofing [7][8][9]. In simplistic spoofing, the spoofing and authentic signals received by victims have asynchronous parameters including code phase, carrier phase and other parameters.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In GNSS and the inertial measurement unit (IMU) system, IMU constantly uses measurement information of GNSS to correct its own error. Slow spoofing can also spoof the GNSS/IMU system, for example, traction spoofing can take over the loop without destroying the tracking loop [12]. When the difference between the position velocity and time (PVT) and real PVT is large, the user can detect spoofing by comparing with the measurement results of other sensors.…”
Section: Introductionmentioning
confidence: 99%