Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 201 2019
DOI: 10.33012/2019.16987
|View full text |Cite
|
Sign up to set email alerts
|

Research on the Responses of GNSS Tracking Loop to Intermediate Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Further, to ensure that at least five authentic signals are received, a new receiver with multi‐peak acquisition ability is designed and realised [27, 28]. The inter‐mediate spoofing attack [31, 32] with four spoofing signals is generated and relevant experimental results are displayed. The false alarm rate of RAIM tests in the experiments is set to 1‰.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, to ensure that at least five authentic signals are received, a new receiver with multi‐peak acquisition ability is designed and realised [27, 28]. The inter‐mediate spoofing attack [31, 32] with four spoofing signals is generated and relevant experimental results are displayed. The false alarm rate of RAIM tests in the experiments is set to 1‰.…”
Section: Resultsmentioning
confidence: 99%
“…As shown in Fig. 10, an inter‐mediate spoofing attack is implemented, which is capable of converting the receiver's tracking loop from locking on authentic signals to spoofing signals by generating spoofing signals synchronised with authentic signals [31, 32]. The TMRAIM method runs on the new designed GPS receiver, and the final experimental results are uploaded to the computer for display.…”
Section: Resultsmentioning
confidence: 99%
“…Therefore, it is necessary to gradually pull the PVT results to make the variation within the allowable range of sensor error [10]. For example, intermediate spoofing can make the loop gradually controlled by spoofing signal without inter-rupting the tracking state of receiver [11], [12].…”
Section: Introductionmentioning
confidence: 99%