2017
DOI: 10.1049/iet-rsn.2015.0409
|View full text |Cite
|
Sign up to set email alerts
|

Sensitivity analysis of the vestigial signal defence‐based civil GNSS spoofing detection method

Abstract: The vestigial signal defense (VSD) method is widely used for detecting intermediate spoofing attacks via monitoring the vestigial signals within the receiver. It is popular and promising for two reasons. One is that it is one of the most effective methods against intermediate spoofing attacks unless the spoofer could suppress the authentic signals. The other is that it is easy to implement as it is totally softwaredefined and receiver-autonomous. Though VSD is promising, it can be vulnerable to spoofing signal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…2) Multi-Correlator Banks [136]- [139]: The apparent similarity of a counterfeit signal with a signal replica generated by a multipath reflection is the reason for the adaptation of multipath mitigation techniques, such as multi-correlator banks to spoofing detection and monitoring. Examples of multicorrelator bank-based algorithms include the multiple tracking loops proposed in [137], the Spoofing Estimating Delay Lock Loop (SEDLL) [136] or the vector tracking loops investigated in [138].…”
Section: Detection Techniques At Post-correlation or Link Levelmentioning
confidence: 99%
See 1 more Smart Citation
“…2) Multi-Correlator Banks [136]- [139]: The apparent similarity of a counterfeit signal with a signal replica generated by a multipath reflection is the reason for the adaptation of multipath mitigation techniques, such as multi-correlator banks to spoofing detection and monitoring. Examples of multicorrelator bank-based algorithms include the multiple tracking loops proposed in [137], the Spoofing Estimating Delay Lock Loop (SEDLL) [136] or the vector tracking loops investigated in [138].…”
Section: Detection Techniques At Post-correlation or Link Levelmentioning
confidence: 99%
“…Probability of false alarm: the probability of raising an interference alarm when no interferer is active, which must be kept below a target limit to guarantee system availability above a minimum level of quality of service (P fa , e.g., used in [139], [249]- [251], see Eq. ( 16));…”
Section: A Performance Metricsmentioning
confidence: 99%
“…The traditional solution for positioning process in UAVs in the condition of the GPS spoofing attack is to detect the GPS spoofing [13] and using the back‐up systems such as Loran‐C or INS/Loran‐C. In this case, the accuracy of positioning solution is approximately equal to the accuracy of the Loran‐C system that is about 100 m or more [14].…”
Section: Introductionmentioning
confidence: 99%
“…However, the performance of this algorithm may deteriorate when the code phase differences between authentic signals and spoofing signals are <1.5 chips and the Doppler frequency differences between authentic signals and spoofing signals are relatively small. Sensitivity models have been formulated that include a vestigial signal-to-interference and noise ratio (SINR) that is quantified and characterized to detect the probability of a false alarm [13].…”
Section: Introductionmentioning
confidence: 99%