Intermediate Spoofing Strategies and Countermeasures

被引:0
|
作者
Yang Gao [1 ]
Hong Li [1 ]
Mingquan Lu [1 ]
Zhenming Feng [1 ]
机构
[1] Department of Electronic Engineering,Tsinghua University
基金
中国国家自然科学基金;
关键词
intermediate spoofing; dragging code phase strategy; low cost countermeasures; code and carrier phase consistency;
D O I
暂无
中图分类号
TN967.1 [卫星导航系统];
学科分类号
摘要
Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems(GNSS)receivers,therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications.This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks.The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred.The method can be used by most receivers,is inexpensive,and requires only a small software upgrade.
引用
收藏
页码:599 / 605
页数:7
相关论文
共 50 条
  • [1] Intermediate Spoofing Strategies and Countermeasures
    Gao, Yang
    Li, Hong
    Lu, Mingquan
    Feng, Zhenming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (06) : 599 - 605
  • [2] Impact and Detection of GPS Spoofing and Countermeasures against Spoofing
    Ahmad, Mukhtar
    Farid, Muhammad Atif
    Ahmed, Sheeraz
    Saeed, Khalid
    Asharf, M.
    Akhtar, Usman
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING, MATHEMATICS AND ENGINEERING TECHNOLOGIES (ICOMET), 2019,
  • [3] ECG biometric: Spoofing and countermeasures
    Karimian N.
    Woodard D.
    Forte D.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2020, 2 (03): : 257 - 270
  • [4] IIIT-H Spoofing Countermeasures for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2019
    Alluri, K. N. R. K. Raju
    Vuppala, Anil Kumar
    INTERSPEECH 2019, 2019, : 1043 - 1047
  • [5] Mask spoofing in face recognition and countermeasures
    Kose, Neslihan
    Dugelay, Jean-Luc
    IMAGE AND VISION COMPUTING, 2014, 32 (10) : 779 - 789
  • [6] Spoofing and countermeasures for speaker verification: A survey
    Wu, Zhizheng
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    Alegre, Federico
    Li, Haizhou
    SPEECH COMMUNICATION, 2015, 66 : 130 - 153
  • [7] Survey on Effective GPS Spoofing Countermeasures
    Haider, Zeeshan
    Khalid, Shehzad
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 573 - 577
  • [8] Spoofing and countermeasures for automatic speaker verification
    Evans, Nicholas
    Kinnunen, Tomi
    Yamagishi, Junichi
    14TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2013), VOLS 1-5, 2013, : 925 - 929
  • [9] Spoofing and Countermeasures for Speaker Verification: A Review
    Anjum, Z. Khamar
    Swamy, R. Kumara
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2017, : 467 - 471
  • [10] Realization and countermeasures for current location spoofing attacks
    Suzuki, Nobuo
    Harada, Taiga
    Fujihata, Takuya
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KSE 2021), 2021, 192 : 2115 - 2121