2018
DOI: 10.1007/s10291-018-0779-x
|View full text |Cite
|
Sign up to set email alerts
|

Efficient spoofing identification using baseline vector information of multiple receivers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…x vec = H vec θ vec + w vec (12) where x vec Ω 1/2 x vec , H vec Ω 1/2 H vec and w vec Ω 1/2 w vec with covariance cov(w vec ) = σ 2 vec I [15]. The hypothesis test (5) is then used on the pre-whitened model (12), with C = I 2(R−1) and b = 0 2(R−1)×1 . H 0 denotes that all measurements in the test are from spoofing signals and H 1 = ¬H 0 .…”
Section: R1mentioning
confidence: 99%
See 1 more Smart Citation
“…x vec = H vec θ vec + w vec (12) where x vec Ω 1/2 x vec , H vec Ω 1/2 H vec and w vec Ω 1/2 w vec with covariance cov(w vec ) = σ 2 vec I [15]. The hypothesis test (5) is then used on the pre-whitened model (12), with C = I 2(R−1) and b = 0 2(R−1)×1 . H 0 denotes that all measurements in the test are from spoofing signals and H 1 = ¬H 0 .…”
Section: R1mentioning
confidence: 99%
“…Carrier phase double differences are used in [11] to classify spoofing signals based on the time invariance of the double differences in spoofing scenarios with one spoofing transmit antenna, which then are estimated and subtracted from the input signal, leaving authentic signals that can be used for Position, Velocity, and Time (PVT) computations. Spoofing signals are identified using multiple receivers and carrier phase double differences in [12] where both authentic and spoofed signals are acquired and tracked. The signals are divided into two groups based on navigation solution residual tests and carrier phase double differences are then used to identify the authentic and spoofing signal groups.…”
Section: Introductionmentioning
confidence: 99%
“…For example, carrier phase differences can be used to estimate this direction of arrival [22,25,27]. • One may exploit that counterfeit signals from a single spoofing source are spatially correlated and measure the spatial correlation between the received signals from different satellites [32][33][34]. The work [34] uses correlation at multiple receivers to separately classify authentic and spoofing signals; then, double differences of carrier phase measurements are used to detect the spoofer.…”
Section: Spatial Signal Processing Techniquesmentioning
confidence: 99%
“…• One may exploit that counterfeit signals from a single spoofing source are spatially correlated and measure the spatial correlation between the received signals from different satellites [32][33][34]. The work [34] uses correlation at multiple receivers to separately classify authentic and spoofing signals; then, double differences of carrier phase measurements are used to detect the spoofer. • Using rotating antennas to measure the spatial correlation of the received GNSS signals [35,36].…”
Section: Spatial Signal Processing Techniquesmentioning
confidence: 99%
“…Comparatively, the signal processing‐based methods only require software upgrades at a low cost. Amongst this type of spoofing‐detection approaches, the single‐antenna‐based ones are principally simpler and more economically desirable than those based on the phased array antenna and multiple antennas or users [7–10].…”
Section: Introductionmentioning
confidence: 99%