Intermediate Spoofing Strategies and Countermeasures

被引:0
|
作者
Yang Gao [1 ]
Hong Li [1 ]
Mingquan Lu [1 ]
Zhenming Feng [1 ]
机构
[1] Department of Electronic Engineering,Tsinghua University
基金
中国国家自然科学基金;
关键词
intermediate spoofing; dragging code phase strategy; low cost countermeasures; code and carrier phase consistency;
D O I
暂无
中图分类号
TN967.1 [卫星导航系统];
学科分类号
摘要
Intermediate spoofing can impact most off-the-shelf Global Navigation Satellite Systems(GNSS)receivers,therefore low cost detection of such spoofing is very important to protect the reliability of the GNSS receivers used in critical safety and financial applications.This paper presents two strategies to analyze attacks by intermediate spoofing attackers to identify the weaknesses of such attacks.The analyses lead to a code and carrier phase consistency detection method with simulation results showing that this method can indicate the receiver when spoofing has occurred.The method can be used by most receivers,is inexpensive,and requires only a small software upgrade.
引用
收藏
页码:599 / 605
页数:7
相关论文
共 50 条
  • [41] Jamming and Spoofing in GPS/GNSS Based Applications and Services - Threats and Countermeasures
    Cuntz, Manuel
    Konovaltsev, Andriy
    Dreher, Achim
    Meurer, Michael
    FUTURE SECURITY, 2012, 318 : 196 - 199
  • [42] Research on the responses of GNSS tracking loop to intermediate spoofing
    Peng, Chenxi
    Li, Hong
    Lu, Mingquan
    PROCEEDINGS OF THE 32ND INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2019), 2019, : 943 - 952
  • [43] Research of Intermediate Spoofing Without Precise Target Information
    Peng, Chenxi
    Li, Hong
    Wen, Jian
    Lu, Mingquan
    CHINA SATELLITE NAVIGATION CONFERENCE (CSNC) 2019 PROCEEDINGS, VOL II, 2019, 563 : 615 - 624
  • [44] Transforming acoustic characteristics to deceive playback spoofing countermeasures of speaker verification systems
    Fang, Fuming
    Yamagishi, Junichi
    Echizen, Isao
    Sahidullah, Md
    Kinnunen, Tomi
    2018 10TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS), 2018,
  • [45] STRATEGIES FOR DEPLOYMENT OF AGRICULTURAL COUNTERMEASURES
    WILKINS, BT
    HOWARD, BJ
    DESMET, GM
    ALEXAKHIN, RM
    MAUBERT, H
    SCIENCE OF THE TOTAL ENVIRONMENT, 1993, 137 (1-3) : 1 - 8
  • [46] GENERALIZATION OF SPOOFING COUNTERMEASURES: A CASE STUDY WITH ASVSPOOF 2015 AND BTAS 2016 CORPORA
    Paul, Dipjyoti
    Sahidullah, Md
    Saha, Goutam
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 2047 - 2051
  • [47] Black-box Attacks on Spoofing Countermeasures Using Transferability of Adversarial Examples
    Zhang, Yuekai
    Jiang, Ziyan
    Villalba, Jesus
    Dehak, Najim
    INTERSPEECH 2020, 2020, : 4238 - 4242
  • [48] Development of CRIM System for the Automatic Speaker Verification Spoofing and Countermeasures Challenge 2015
    Alam, Md Jahangir
    Kenny, Patrick
    Bhattacharya, Gautam
    Stafylakis, Themos
    16TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2015), VOLS 1-5, 2015, : 2072 - 2076
  • [49] The SYSU System for the Interspeech 2015 Automatic Speaker Verification Spoofing and Countermeasures Challenge
    Weng, Shitao
    Chen, Shushan
    Yu, Lei
    Wu, Xuewei
    Cai, Weicheng
    Liu, Zhi
    Zhou, Yiming
    Li, Ming
    2015 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2015, : 152 - 155
  • [50] Speech spoofing countermeasures based on source voice analysis and machine learning techniques
    Rahmeni, Raoudha
    Ben Aicha, Anis
    Ben Ayed, Yassine
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 668 - 675