2022
DOI: 10.1109/maes.2021.3100844
|View full text |Cite
|
Sign up to set email alerts
|

GPS Spoofing Detection by Neural Network Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…These approaches utilize features extracted from standard GNSS receivers' acquisition, tracking, and Position-Velocity-Time (PVT) modules as input for training various supervised ML models in classification tasks. For instance, Bose et al [25] employed an FCNN that incorporated features such as C/N 0 , pseudorange, carrier phase, and Doppler shift to identify spoofing attempts. Similarly, Aissou et al [9] used a set of 13 features extracted from tracking and PVT solution blocks to train multiple ML classifiers.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…These approaches utilize features extracted from standard GNSS receivers' acquisition, tracking, and Position-Velocity-Time (PVT) modules as input for training various supervised ML models in classification tasks. For instance, Bose et al [25] employed an FCNN that incorporated features such as C/N 0 , pseudorange, carrier phase, and Doppler shift to identify spoofing attempts. Similarly, Aissou et al [9] used a set of 13 features extracted from tracking and PVT solution blocks to train multiple ML classifiers.…”
Section: A Related Workmentioning
confidence: 99%
“…However, it's worth noting that some works, such as [9], [11], [25], [31], incorporate PVT solutions as features. However, this inclusion can introduce additional detection delays since PVT solutions are acquired over a look-back sample window.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, given the peculiarities of the power supply of low-orbit satellites, we can conclude that the intruder satellite does not have enough energy coming from the solar panels to effectively block the signal transmission through the radio channel. Therefore, the most likely destructive impact on the LOSIS is the imposition of relay spoofing interference [54,55]. To impose a relay spoofing interference, an intruder satellite must do the following.…”
mentioning
confidence: 99%