Proceedings of the 31st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 201 2018
DOI: 10.33012/2018.15912
|View full text |Cite
|
Sign up to set email alerts
|

Which GNSS Tracking Loop Configuration is Most Robust Against Spoofing?

Abstract: received his M.Sc. in electrical engineering from RWTH Aachen University in 2017. He completed his Master thesis in the field of GNSS spoofing detection and mitigation. In November 2017 he joined the Institute of Communications and Navigation of the German Aerospace Center (DLR) in Oberpfaffenhofen and began his doctorate studies at RWTH Aachen University. His main research interest lies on the development of robust and precise multi-antenna GNSS receivers focused on the signal processing layer. Manuel M. Appe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Regarding control loop parametrization to force spoofers to synchronize with the authentic signals, an investigation aimed at evaluating robust configurations (i.e. requiring a higher level of synchronization of the spoofer in terms of frequency offset and time delay) of the receiver loops can be found in [30].…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding control loop parametrization to force spoofers to synchronize with the authentic signals, an investigation aimed at evaluating robust configurations (i.e. requiring a higher level of synchronization of the spoofer in terms of frequency offset and time delay) of the receiver loops can be found in [30].…”
Section: Countermeasuresmentioning
confidence: 99%
“…In the last decade, spoofing has been demonstrated on multiple occasions for academic and research purposes [27] and several references provide an overview of some potential spoofing threats and countermeasures, including mathematical representations [28] (which is focusing on the observable and positioning layer and describing authentication schemes, however synchronization aspects are not explicitly handled) and attack and detection techniques based on current spoofer and receiver capabilities [29]. Investigations aiming at the assessment and design recommendations of a GNSS receiver's signal processing layer are shown in [30] and [31], the latter particularizing the spoofing detection requirements, environments and possible countermeasures to the aviation domain.…”
mentioning
confidence: 99%