2020
DOI: 10.1007/s10707-020-00412-z
|View full text |Cite
|
Sign up to set email alerts
|

Mitigating Spoofed GNSS Trajectories through Nature Inspired Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 30 publications
0
2
0
Order By: Relevance
“…A large variety of means have been used to detect GNSS spoofing attacks. Approaches use either PHY-layer information ( [53], [58]- [61], [64], [65], [67]- [70], [73], [74], [76]- [79], [82], [84]), or additional communication technologies ( [26], [56], [57], [62], [63], [66]), or techniques based on Machine Learning (ML) over heterogeneous data ( [75]- [79], [83], [84]). All these techniques share the basic consideration that the bitstrings in GNSS signals cannot be modified to be more secure before being transmitted.…”
Section: B Anti-spoofing Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…A large variety of means have been used to detect GNSS spoofing attacks. Approaches use either PHY-layer information ( [53], [58]- [61], [64], [65], [67]- [70], [73], [74], [76]- [79], [82], [84]), or additional communication technologies ( [26], [56], [57], [62], [63], [66]), or techniques based on Machine Learning (ML) over heterogeneous data ( [75]- [79], [83], [84]). All these techniques share the basic consideration that the bitstrings in GNSS signals cannot be modified to be more secure before being transmitted.…”
Section: B Anti-spoofing Schemesmentioning
confidence: 99%
“…Technology. While some works focused on a generic SATCOM technology, most were more specific, and analyzed Statistics Approach [58] HF Antenna Motion & Carrier-Phase [59] Phase-Only Analysis of Variance [60] Symmetric Difference Autocorrelation Distortion Monitor and a Total in-band Power Monitor [53] Meteor Burst Communications [56] Cellular Network [61] Cross-Check Receivers [62] Multilateration Phasor Measurement Units in Smart Grids [63] Cross-Correlation and Cooperative Authentication [64], [65] Carrier-Phase Measurements [66] Code Signals Correlation [67] Total Signals Energy Measurement [68] Time Authentication [69] Multi-Receiver Hybrid Communication Network for Power Grid Timing Verification [70] Fraction Parts of Double-difference Carrier Phases [71], [72] Channel Gain / Estimation Noise [73] Least Absolute Shrinkage and Selection Operator [74] Chips-Message Robust Authentication [75] Neural Network [76]- [78] Maximum-Likelihood [79] K-mean clustering [80] Control Theory (IMU sensor) in UAVs [81] Cooperative Receivers Positions [82] Semi-Codeless Receiver [83] Genetic Algorithm, Shortest Path and Pattern Matching [84] Supervised Machine Learning [26] IRIDIUM Ring Alert the jamming issue in GNSS ( [101], [103], [105], [107], [113], [114], [118]) and Military SATCOM constellations. Others were even more focused, proposing anti-jamming schemes tailored to the specific GNSS technology, such as the Chinese Beidou (…”
Section: Anti-jamming Strategiesmentioning
confidence: 99%