2014 IEEE/ION Position, Location and Navigation Symposium - PLANS 2014 2014
DOI: 10.1109/plans.2014.6851499
|View full text |Cite
|
Sign up to set email alerts
|

Vestigial signal defense through signal quality monitoring techniques based on joint use of two metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 32 publications
(21 citation statements)
references
References 4 publications
0
19
0
Order By: Relevance
“…Signal quality monitoring (SQM) can also be used for detecting spoofed signals [127], [128]. This technique is based on Neyman Pearson (NP) detection theory.…”
Section: Signal Statistic Analyzing Methodsmentioning
confidence: 99%
“…Signal quality monitoring (SQM) can also be used for detecting spoofed signals [127], [128]. This technique is based on Neyman Pearson (NP) detection theory.…”
Section: Signal Statistic Analyzing Methodsmentioning
confidence: 99%
“…The SQM technique has been proposed in many different papers for detection of distortions in the GPS correlation peak. It was initially thought of as a multipath detection technique [26], and following, was introduced as an effective spoofing detection algorithm [15]- [17]. It has also been combined with other measurements in order to distinguish between multipath and spoofing [18], [19], [21].…”
Section: Signal Quality Monitoringmentioning
confidence: 99%
“…Other signal processing techniques are based on the distribution analysis of the correlator output [30]. There exist also signal quality monitoring techniques, which aim at detecting distortions in the correlation function via the use of ratio metric tests [31,32,33,34,35]. Other techniques are based on the time of arrival and other consistency checks.…”
Section: Types Of Spoofing Attacks and Countermeasuresmentioning
confidence: 99%
“…It has been proven that the SQMT using RM works well detecting distortions in the correlation function [14,33]. Unfortunately, these techniques are not able to estimate the delay of the spoofing signal or mitigate the errors caused by these signals in the position and time solution.…”
Section: Using Ecadll Information For Spoofing Detectionmentioning
confidence: 99%