The open nature of the global navigation satellite system (GNSS) civil signals makes them very vulnerable to counterfeit and ill-intended interferences like jamming and spoofing attacks. Spoofing of GNSS signal refers to the transmission of a counterfeit GNSS-like signal, with the goal of deceiving the receiver, making it compute erroneous navigation solutions. In this paper, an evolved version of the signal quality monitoring techniques is presented where a spoofer detection algorithm is discussed. The quality of the correlation function is assessed through the joint use of two metrics which are based on the ratio metric and a pair of extra-correlators in order to detect vestigial signal presence. The results show that the joint use of two provides advantages in the detection of matched-power spoofer attacks.
Vestigial Signal Defense Through Signal Quality Monitoring Techniques Based on Joint use of Two Metrics / Ali, Khurram; GARBIN MANFREDINI, Esteban; Dovis, Fabio. - ELETTRONICO. - (2014), pp. 1240-1247. (Intervento presentato al convegno IEEE/ION PLANS 2014 tenutosi a Monterey, CA (USA) nel May 5 - 8, 2014) [10.1109/PLANS.2014.6851499].
Vestigial Signal Defense Through Signal Quality Monitoring Techniques Based on Joint use of Two Metrics
ALI, KHURRAM;GARBIN MANFREDINI, ESTEBAN;DOVIS, Fabio
2014
Abstract
The open nature of the global navigation satellite system (GNSS) civil signals makes them very vulnerable to counterfeit and ill-intended interferences like jamming and spoofing attacks. Spoofing of GNSS signal refers to the transmission of a counterfeit GNSS-like signal, with the goal of deceiving the receiver, making it compute erroneous navigation solutions. In this paper, an evolved version of the signal quality monitoring techniques is presented where a spoofer detection algorithm is discussed. The quality of the correlation function is assessed through the joint use of two metrics which are based on the ratio metric and a pair of extra-correlators in order to detect vestigial signal presence. The results show that the joint use of two provides advantages in the detection of matched-power spoofer attacks.Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.
https://hdl.handle.net/11583/2580343
Attenzione
Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo