Investigation of Suitable Anti Spoofing Algorithm for GNSS Receivers
Keywords:
Anti spoofing algorithms, GNS Spoofing, GPS receivers, Adaptive Kalaman Filter, Automatic gain controlAbstract
In an era driven by transformative technologies like 5G and the Internet of things (IoT), the Global position system vulnerability)-based navigation systems to spoofing attacks has become a paramount concern. Various techniques have been proposed to enable detections .This paper explains about anti –spoofing algorithms such as adaptive Kalman filter for dynamic positions and in GPS navigation, situations may arise where GPS receivers lack a clear line of sight to enough satellites ,such as when they are inside buildings .tunnels ,or aircraft with limited sky view .To tackle this challenge ,there is a techniques for initializing GPS receivers’ to rapidly and effectively track signals once they are regain access to a clear sky vie .Furthermore ,in the context of unmanned aerial vehicles (UAVs) vulnerable to deliberate interference like spoofing attacks ,we present a comprehensive solution for GPS Spoofing detection and mitigation. This approach involves distributed radar ground stations equipped with local trackers .connected to fusion node
Downloads
References
Ding, W. R. And L. Yun, “A Gps Receiver Adaptive Digital Beamforming Interference Suppres?Sion Algorithm Based On Kalman Filter,” Chinese Journal Of Electronics, Vol. 22, No. 2, 433–436, 2013
Chan, Z. And M. L. Wei, “Application Of Extended Kalman Filter For Tracking High Dynamic Gps Signal,” 2016 Ieee International Conference On Signal And Image Processing (Icsip), 503–507, 2016
Singh, A., “An Improvement Over Kalman Filter For Gps Tracking,” 2016 3rd International Conference On Computing For Sustainable Global Development (Indiacom), Ieee, 923–927, 2016
Wang, Y., “Position Estimation Using Extended Kalman Filter And Rts-Smoother In A Gps Receiver,” 2012 5th International Congress On Image And Signal Processing (Cisp), Ieee, 1718–1721, 2012
Humphreys Te, Ledvina Bm, Psiaki Ml, O’hanlon Bw, Kintner Pm (2009) Assessing The Spoofing Threat. Gps World 20(1):28–39
[6].Akos Dm (2012) Who’s Afraid Of The Spoofer? Gps/Gnss Spoofing Detection Via Automatic Gain Control (Agc). J Inst Navig 59(4)
Caparra G, Ceccato S, Sturaro S, Laurenti N (2017) A key management architecture forGNSS open service navigation message authentication. In: Proceedings of European navigation conference (ENC), Lausanne, Switzerland, pp 287–297
Humphreys TE (2013) UT Austin researchers spoof supery-acht at Sea. The University of Texas at Austin. [Online]. Available: http://www.engr.utexas.edu/features/superyacht-gps-spo ofing
Shi, Chen S, Liu Z (2017) Analysis and optimizing of time-delay in GPS repeater deception.J Chongqing Univ Posts Telecommun (Natural Sci. Edition) 29(1):56–61
Lo S, Lorenzo DD, Enge P, Akos D, Bradley P (2009) Signal authentication, a secure civil GNSS for today. Inside GNSS 4(5):30–39
Psiaki ML,Humphreys TE (2016) GNSS spoofing and detection. Proc IEEE 104(6):1258–1270 Gao Z, Meng F (2011) Principle and simulation research of GPS repeater deception jamming.J Telemetry Tracking Command 32(6):44–47
Jiang, Chen S, Chen Y, Bo Y, Xia Q, Zhang B (2018) Analysis of the baseline data basedGPS spoofing detection algorithm. In: Proceedings of IEEE/ION position, location navigation symposium (PLANS), Monterey, CA, USA, pp 397–403
Scott L (2003) Anti-spoofing & authenticated signal architectures for civil navigation systems.In: Proceedings of the 16th international technical meeting of the satellite division of the institute of navigation (ION GPS/GNSS), Portland, OR, USA, pp 1543–1552 97
Humphreys TE (2013) Detection strategy for cryptographic GNSS anti-spoofing. IEEE Trans Aerosp Electron Syst 49(2):1073–1090
Humphreys TE, Ledvina BM, Psiaki ML, O’Hanlon BW, Kintner PM (2009) Assessing the spoofing threat. GPS World 20(1):28–39
Dai, Xiao M, Huang S (2017) GPS spoofing and inducing model of UAV. Commun Technol 50(3):496–501
He L, Li W, Guo C (2016) Study on GPS generated spoofing attacks. Appl Res Comput 33(8):2405–2408
Shi M, Chen S, Wu H, Mao H (2015) A GPS spoofing pattern based on denial environment. JAir Force Eng Univ (Natural Sci. Edition) 16(6):27–31
Broumandan A, Jafarnia-Jahromi A, Dehghanian V, Nielsen J, Lachapelle G (2012) ‘GNSSspoofing detection in handheld receivers based on signal spatial correlation. In: Proceedingsof IEEE/ION position, location navigation symposium, Myrtle Beach, SC, USA, pp 479–487
Curran JT, O’Driscoll C (2016) Message authentication, channel coding & anti-spoofing. In 29th International technical meeting
D. Margaria, B. Motella, M. Anghileri, J.-J. Floch,I. Fernández-Hernández, and M. Paonni, ``Signal structure-basedauthentication for civil GNSSs: Recent solutions and perspectives,''IEEE Signal Process. Mag., vol. 34, no. 5, pp. 2737, Sep. 2017.
L. Huang, Z. Lv, and F. Wang, ``Spoong pattern research on GNSS Receivers,'' J. Astronaut., vol. 33, no. 7, pp. 884890, Jul. 2012
M. Sun, L. Zhang, J. Bao, and Y. Yan, ``RF ngerprint extraction forGNSS anti-spoong using axial integrated wigner bispectrum,'' J. Inf. Secur. Appl., vol. 35, pp. 5154, Aug. 2017.
L. Zhao, Z. Miao, B. Zhang, B. Liu, G. Li, and X. Zhou, ``A novel spoong attack detection method in satellite navigation tracking phase,''J. Astronaut., vol. 36, no. 10, pp. 11721177, Oct. 2015
M. Yuan, Z. Lv, H. Chen, J. Li, and G. Ou, ``An implementation ofnavigation message authentication with reserved bits for civil BDS antispoofng,'' in Proc. China Satell. Navigat. Conf. (CSNC), vol. 2, 2017,pp. 6980
X. Liu and L. Zhang, ``Research and implementation of GNSS antispoong interference positioning algorithm based on multiple antennas,''in Proc. 12th Signal Intell. Inf. Process. Appl. Nat. Academic Conf., Hangzhou, China, Apr. 2018, pp. 14.
A. Khalajmehrabadi, N. Gatsis, D. Akopian, and A. F. Taha, Real time rejection and mitigation of time synchronization attacks on the global positioning system,'' IEEE Trans. Ind. Electron., vol. 65, no. 8, pp. 64256435, Aug. 2018.
M. Sun, L. Zhang, J. Bao, and Y. Yan, ``RF ngerprint extraction forGNSS anti-spoong using axial integrated wigner bispectrum,'' J. Inf.Secur. Appl., vol. 35, pp. 5154, Aug. 2017.
Downloads
Published
How to Cite
Issue
Section
License
![Creative Commons License](http://i.creativecommons.org/l/by-sa/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.