2017
DOI: 10.33012/2017.15193
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility of Fault Exclusion Related to Advanced RAIM for GNSS Spoofing Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…A significant effort to improve security against different types of attackers, such as GNSS repeaters and spoofers, has been a central focus for both industry and the research community. GNSS vulnerabilities have been investigated in several works, e.g., [1] and [3]- [6], and different countermeasures have been analyzed and evaluated [7]- [16]. Contributions towards protecting GNSS receivers can be divided into two main categories: countermeasures on the receiver side and on the system side.…”
Section: Introductionmentioning
confidence: 99%
“…A significant effort to improve security against different types of attackers, such as GNSS repeaters and spoofers, has been a central focus for both industry and the research community. GNSS vulnerabilities have been investigated in several works, e.g., [1] and [3]- [6], and different countermeasures have been analyzed and evaluated [7]- [16]. Contributions towards protecting GNSS receivers can be divided into two main categories: countermeasures on the receiver side and on the system side.…”
Section: Introductionmentioning
confidence: 99%
“…Under spoofing attacks, the GNSS position and timing results are unavailable. Receiver autonomous integrity monitoring (RAIM) can suppress one or several spoofed satellites by checking the abnormal residuals in pseudoranges [17], but fails when most visible satellites are spoofed.…”
Section: Introductionmentioning
confidence: 99%
“…As these attacks represent an increasing threat to GNSS users, several anti-spoofing techniques have been proposed over the past years to be embedded into the receiver [7]- [14]. These countermeasures include, among others, spatial signal processing using multiple antennas, signal power monitoring, correlator output monitoring and consistency checks.…”
Section: Introductionmentioning
confidence: 99%
“…For example, a receiver can implement power monitoring and consistency checks (e.g. using a RAIM/ARAIM approach [14]). Such combination enables to detect relatively simple spoofing attacks, which are characterized by an increase in power as well as inconsistencies among the measurements, as only some of them are spoofed.…”
Section: Introductionmentioning
confidence: 99%