2018
DOI: 10.1016/j.mex.2018.10.004
|View full text |Cite
|
Sign up to set email alerts
|

Synthetic GNSS spoofing data generation using field recorded signals

Abstract: Graphical abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The measured threshold ( γ m ) that produces specific P FA is used in the detector. The spoofing period has been considered to be from the onset of spoofing until the end of the dataset, as given by the spoofing delay profile (spoofer delaying/advancing the spoofing signal compared with authentic signal) as described by Humphreys et al (2012) and Lemmenes et al (2016), and synthetic data delay profile as described by Khan et al (2018).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The measured threshold ( γ m ) that produces specific P FA is used in the detector. The spoofing period has been considered to be from the onset of spoofing until the end of the dataset, as given by the spoofing delay profile (spoofer delaying/advancing the spoofing signal compared with authentic signal) as described by Humphreys et al (2012) and Lemmenes et al (2016), and synthetic data delay profile as described by Khan et al (2018).…”
Section: Resultsmentioning
confidence: 99%
“…The spoofing dataset was comprised of the TEXBAT dataset and the synthetic spoofing data (Khan et al, 2018). TEXBAT is the battery of recorded spoofing cases compiled by researchers at the University of Texas, Austin.…”
Section: Introductionmentioning
confidence: 99%
“…Also by contrasting 9 and 10, it can be seen that the proposed threshold factor is dependent on the P FA and the pdf of the noise in the correlator output. dataset contains synthetic generated spoofing data 15 and the TEXBAT dataset. 20 The spoofing data are used for calculation of detection rate.…”
Section: Proposed Methods Of Spoofing Detectionmentioning
confidence: 99%
“…The clean data are used for false alarm rate calculation. The spoofing dataset contains synthetic generated spoofing data 15 and the TEXBAT dataset 20 . The spoofing data are used for calculation of detection rate.…”
Section: Datasetmentioning
confidence: 99%
See 1 more Smart Citation