1998
DOI: 10.1109/7.722708
|View full text |Cite
|
Sign up to set email alerts
|

Detection of interference/jamming and spoofing in a DGPS-aided inertial system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
74
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 93 publications
(74 citation statements)
references
References 8 publications
0
74
0
Order By: Relevance
“…For the case of a spoofing attack on a tracking receiver, the spoofing signal correlation peak should be located as close as possible to that of the authentic signal; therefore, the correlator output power is affected by the spoofing signals. As such, assuming that the receiver is initially locked into tracking the authentic peak, the correlator output amplitude can be written as follows [19]: are delay and frequency differences between the authentic and spoofing signals, respectively, and these parameters are generally functions of time. R(·) is the correlation function that is closely related to the choice of GPS signal subcarrier.…”
Section: Distribution Analysis Of the Correlator Outputmentioning
confidence: 99%
See 1 more Smart Citation
“…For the case of a spoofing attack on a tracking receiver, the spoofing signal correlation peak should be located as close as possible to that of the authentic signal; therefore, the correlator output power is affected by the spoofing signals. As such, assuming that the receiver is initially locked into tracking the authentic peak, the correlator output amplitude can be written as follows [19]: are delay and frequency differences between the authentic and spoofing signals, respectively, and these parameters are generally functions of time. R(·) is the correlation function that is closely related to the choice of GPS signal subcarrier.…”
Section: Distribution Analysis Of the Correlator Outputmentioning
confidence: 99%
“…These fluctuations cause the correlator output distribution to deviate from the expected χ 2 distribution. This feature can be used for detecting the presence of spoofing signals [19]. Figure 8 shows the correlator output distributions for different relative powers for authentic and spoofing signals.…”
Section: Distribution Analysis Of the Correlator Outputmentioning
confidence: 99%
“…18,19 To deal with this defect, some researchers developed the adaptive estimating techniques, which can be classified into three categories, namely, the multiple model-based adaptive estimation (MMAE), 20,21 the innovationbased adaptive estimation (IAE), 18,19,22 and the residue-based adaptive estimation (RAE). 23 Among these researches, some of them estimate the uncertain process noise and the measurements noise, 20,21,23 and some of them scale the noise covariance matrices by single or multiple factors to make the estimation robust. 18,19,22 However, as far as the authors know, all the robust filtering techniques are utilized by the traditional translational and rotational motion models and none of them have been introduced to the parameters estimations based on the novel dual quaternion modeling method.…”
Section: Introductionmentioning
confidence: 99%
“…However, some outlier values of measurements usually lead to filter divergence, and some modified Sage-Husa methods have then been introduced [7][8] . Also, a multiple-model-based adaptive method [9][10] that is different from the Sage-Husa adaptive filter is proposed to select the best state estimation from a bank of simultaneously operating Kalman filters, and the state estimation is produced as the average of the weighted elemental filter outputs. Additionally, to balance the contributions of process model information and measurements in state vector estimations, Yang et al [11] proposed a novel filter algorithm.…”
Section: Introductionmentioning
confidence: 99%