2016
DOI: 10.3390/s16101771
|View full text |Cite
|
Sign up to set email alerts
|

GNSS Spoofing Network Monitoring Based on Differential Pseudorange

Abstract: Spoofing is becoming a serious threat to various Global Navigation Satellite System (GNSS) applications, especially for those that require high reliability and security such as power grid synchronization and applications related to first responders and aviation safety. Most current works on anti-spoofing focus on spoofing detection from the individual receiver side, which identifies spoofing when it is under an attack. This paper proposes a novel spoofing network monitoring (SNM) mechanism aiming to reveal the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 28 publications
(24 citation statements)
references
References 14 publications
0
24
0
Order By: Relevance
“…• Using multiple GNSS receivers to detect the presence of a spoofer, exploiting the fact that all GNSS receivers show the same position while being spoofed [37][38][39][40][41][42]. • Range measurements may be used directly to detect the spoofing attack [43][44][45][46][47]. More specifically, [43] considers multiple vehicles where each of them is equipped with a GNSS receiver and a range measurement sensor.…”
Section: Methods That Use Multiple Gnss Receiversmentioning
confidence: 99%
“…• Using multiple GNSS receivers to detect the presence of a spoofer, exploiting the fact that all GNSS receivers show the same position while being spoofed [37][38][39][40][41][42]. • Range measurements may be used directly to detect the spoofing attack [43][44][45][46][47]. More specifically, [43] considers multiple vehicles where each of them is equipped with a GNSS receiver and a range measurement sensor.…”
Section: Methods That Use Multiple Gnss Receiversmentioning
confidence: 99%
“…Such a setup for the spoofed case has been adopted in Ref. for anti‐spoofing performance validation purposes.…”
Section: Validationmentioning
confidence: 99%
“…Refs focus on the spoofing simulation techniques while Refs mainly dealing with spoofing detection. The contributions made toward the detection of spoofing can be categorized into four classes, namely, encrypted signal based, cryptographic based, correlation peak anomaly monitoring and signal consistency monitoring . The first class described in Refs is effective, but it requires a high bandwidth network connection between the trusted and user receivers to transfer a great number of intermediate frequency (IF) GNSS signals continuously.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations