2016
DOI: 10.1109/jproc.2016.2530317
|View full text |Cite
|
Sign up to set email alerts
|

Coding Aspects of Secure GNSS Receivers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 28 publications
0
16
0
Order By: Relevance
“…It is proposed that this information might be exploited by an adversary to trigger short pulses of interference which are tightly aligned with certain portions of the navigation message of each satellite. Previous work has demonstrated that, a low duty-cycle pulsed interference, that is appropriately synchronized with the navigation message, can cause disruption to the receiver data recovery process, equivalent to that of an always-on interference [1]. This process requires that the pulse pattern be designed to specifically target weaknesses in the navigation message coding scheme, and it has been shown that for the case of convolutional encoding and block interleaving that a malicious adversary might inflict a denial-of-service (DOS) upon a naïve receiver, using an average interference power 10 to 20 dB lower than the continuous interference case.…”
Section: Problem Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…It is proposed that this information might be exploited by an adversary to trigger short pulses of interference which are tightly aligned with certain portions of the navigation message of each satellite. Previous work has demonstrated that, a low duty-cycle pulsed interference, that is appropriately synchronized with the navigation message, can cause disruption to the receiver data recovery process, equivalent to that of an always-on interference [1]. This process requires that the pulse pattern be designed to specifically target weaknesses in the navigation message coding scheme, and it has been shown that for the case of convolutional encoding and block interleaving that a malicious adversary might inflict a denial-of-service (DOS) upon a naïve receiver, using an average interference power 10 to 20 dB lower than the continuous interference case.…”
Section: Problem Definitionmentioning
confidence: 99%
“…The most relevant specifications for these two devices are in Tab. 1 Designing and building a sophisticated jammer would be a controversial research activity and would pass the message that synchronised jamming needs specialist expertise and skilled personnel, when instead it is relatively simple. Using a general purpose transceiver reading samples Such IF file can be played back in a loop for as long as the reference clock of the transceiver maintains good synchronisation with the navigation data bits to be jammed.…”
Section: Anatomy Of a Systematic Jammermentioning
confidence: 99%
“…However, a key part of GNSS receivers is the data demodulation stage, which allows recovering essential information. The latter has been long disregarded, with only a few articles [32][33][34][35] in the state-of-the-art, but may be a critical point under interference scenarios, being the principal object of this article.…”
Section: Introductionmentioning
confidence: 99%
“…The latter causes the symbol instantaneous variance σ 2 n to be altered. In [32], to compute the LLR under scenarios with interference, the variance was proposed to be symbol-wise estimated by the maximum likelihood (ML) principle. However, in general, this criterion is known to be computationally demanding and not accurate when a low number of samples per symbol are available.…”
Section: Introductionmentioning
confidence: 99%
“…GNSS is recognized to be the de facto system in outdoor environments when it is available. Under the assumption that its reception is not obstructed or jammed [2][3][4], there is no doubt that GNSS is the main enabler for location-based services (LBS). One of such situations is indoor positioning and tracking, where satellite signals are hardly useful (unless extremely large integration times are considered).…”
Section: Introductionmentioning
confidence: 99%