Intermediate Spoofing Strategies and Countermeasures

被引:0
|
作者
Yang Gao [1 ]
Hong Li [1 ]
Mingquan Lu [1 ]
Zhenming Feng [1 ]
机构
[1] Department of Electronic Engineering,Tsinghua University
基金
中国国家自然科学基金;
关键词
intermediate spoofing; dragging code phase strategy; low cost countermeasures; code and carrier phase consistency;
D O I
暂无
中图分类号
TN967.1 [卫星导航系统];
学科分类号
摘要
Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems(GNSS)receivers,therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications.This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks.The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred.The method can be used by most receivers,is inexpensive,and requires only a small software upgrade.
引用
收藏
页码:599 / 605
页数:7
相关论文
共 50 条
  • [31] A Novel Web Content Spoofing Technique on WLAN and Its Countermeasures
    Jitpukdebodin, Sumedt
    Chokngamwong, Roongroj
    Kungpisdan, Supakorn
    2014 14TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2014, : 254 - 258
  • [32] TACTICS, STRATEGIES, AND COUNTERMEASURES
    KARRASS, CL
    PIMA MAGAZINE, 1983, 65 (09): : 17 - 17
  • [33] A Comparative Study on Recent Neural Spoofing Countermeasures for Synthetic Speech Detection
    Wang, Xin
    Yamagishi, Junichi
    INTERSPEECH 2021, 2021, : 4259 - 4263
  • [34] Integrated Spoofing Countermeasures and Automatic Speaker Verification: an Evaluation on ASVspoof 2015
    Sahidullah, Md
    Delgado, Hector
    Todisco, Massimiliano
    Yu, Hong
    Kinnunen, Tomi
    Evans, Nicholas
    Tana, Zheng-Hua
    17TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2016), VOLS 1-5: UNDERSTANDING SPEECH PROCESSING IN HUMANS AND MACHINES, 2016, : 1700 - 1704
  • [35] Energy Level Spoofing Attacks and Countermeasures in Blockchain-enabled IoT
    Khan, Ali Hussain
    Ikram, Humza
    Ahmed, Chuadhry Mujeeb
    Ul Hassan, Naveed
    Uzmi, Zartash Afzal
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 4322 - 4327
  • [36] ASVspoof 2019: Spoofing Countermeasures for the Detection of Synthesized, Converted and Replayed Speech
    Nautsch A.
    Wang X.
    Evans N.
    Kinnunen T.H.
    Vestman V.
    Todisco M.
    Delgado H.
    Sahidullah M.
    Yamagishi J.
    Lee K.A.
    IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 3 (02): : 252 - 265
  • [37] An Application-Oriented Taxonomy on Spoofing, Disguise and Countermeasures in Speaker Recognition
    Li, Lantian
    Cheng, Xingliang
    Zheng, Thomas Fang
    APSIPA TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING, 2022, 11 (02)
  • [38] SPOOFING COUNTERMEASURES TO PROTECT AUTOMATIC SPEAKER VERIFICATION FROM VOICE CONVERSION
    Alegre, Federico
    Amehraye, Asmaa
    Evans, Nicholas
    2013 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2013, : 3068 - 3072
  • [39] ASVspoof 2015: the First Automatic Speaker Verification Spoofing and Countermeasures Challenge
    Wu, Zhizheng
    Kinnunen, Tomi
    Evans, Nicholas
    Yamagishi, Junichi
    Hanilci, Cemal
    Sahidullah, Md
    Sizov, Aleksandr
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 2037 - 2041
  • [40] Study on Countermeasures for Identity Spoofing against Photoplethysmogram-based Authentication
    Hinatsu, Shun
    Suzuki, Daisuke
    Ishizuka, Hiroki
    Ikeda, Sei
    Oshiro, Osamu
    Transactions of Japanese Society for Medical and Biological Engineering, 2021, Annual59 (Proc): : 617 - 619