Intermediate Spoofing Strategies and Countermeasures

被引:0
|
作者
Yang Gao [1 ]
Hong Li [1 ]
Mingquan Lu [1 ]
Zhenming Feng [1 ]
机构
[1] Department of Electronic Engineering,Tsinghua University
基金
中国国家自然科学基金;
关键词
intermediate spoofing; dragging code phase strategy; low cost countermeasures; code and carrier phase consistency;
D O I
暂无
中图分类号
TN967.1 [卫星导航系统];
学科分类号
摘要
Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems(GNSS)receivers,therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications.This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks.The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred.The method can be used by most receivers,is inexpensive,and requires only a small software upgrade.
引用
收藏
页码:599 / 605
页数:7
相关论文
共 50 条
  • [21] Introduction to the Issue on Spoofing and Countermeasures for Automatic Speaker Verification
    Yamagishi, Junichi
    Kinnunen, Tomi H.
    Evans, Nicholas
    De Leon, Phillip
    Trancoso, Isabel
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2017, 11 (04) : 585 - 587
  • [22] Spoofing attacks and countermeasures in fm indoor localization system
    Li, Zi
    Pei, Qingqi
    Liu, Yao
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (01): : 219 - 240
  • [23] ASVspoof: The Automatic Speaker Verification Spoofing and Countermeasures Challenge
    Wu, Zhizheng
    Yamagishi, Junichi
    Kinnunen, Tomi
    Hanilci, Cemal
    Sahidullah, Mohammed
    Sizov, Aleksandr
    Evans, Nicholas
    Todisco, Massimiliano
    Delgado, Hector
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2017, 11 (04) : 588 - 604
  • [24] Spoofing attacks and countermeasures in fm indoor localization system
    Zi Li
    Qingqi Pei
    Yao Liu
    World Wide Web, 2018, 21 : 219 - 240
  • [25] IP spoofing attack: Principles, methods, tools and countermeasures
    Jiang, Weihua
    Li, Weihua
    Du, Jun
    Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University, 2002, 20 (04): : 544 - 548
  • [26] Face recognition under spoofing attacks: countermeasures and research directions
    Li, Lei
    Correia, Paulo Lobato
    Hadid, Abdenour
    IET BIOMETRICS, 2018, 7 (01) : 3 - 14
  • [27] Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification: Fundamentals
    Kinnunen, Tomi
    Delgado, Hector
    Evans, Nicholas
    Lee, Kong Aik
    Vestman, Ville
    Nautsch, Andreas
    Todisco, Massimiliano
    Wang, Xin
    Sahidullah, Md
    Yamagishi, Junichi
    Reynolds, Douglas A.
    IEEE-ACM TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2020, 28 : 2195 - 2210
  • [28] Visual spoofing of SSL protected web sites and effective countermeasures
    Adelsbach, A
    Gajek, S
    Schwenk, J
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 204 - 216
  • [29] DoubleDeceiver: Deceiving the Speaker Verification System Protected by Spoofing Countermeasures
    Zhang, Mengao
    Xu, Ke
    Li, Hao
    Wang, Lei
    Fang, Chengfang
    Shi, Jie
    INTERSPEECH 2023, 2023, : 4014 - 4018
  • [30] Phase perturbation improves channel robustness for speech spoofing countermeasures
    Zang, Yongyi
    Zhang, You
    Duan, Zhiyao
    INTERSPEECH 2023, 2023, : 3162 - 3166