首页> 外文会议>International technical meeting of the Satellite Division of the Institute of Navigation;ION GNSS 2011 >Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals
【24h】

Civilian GPS Spoofing Detection based on Dual-Receiver Correlation of Military Signals

机译:基于军用信号双接收器相关性的平民GPS欺骗检测

获取原文

摘要

Cross-correlations of unknown encrypted signals betweentwo civilian GNSS receivers are used to detect spoofingof known open-source signals. This type of detectionalgorithm is the strongest known defense againstsophisticated spoofing attacks if the defended receiver hasonly one antenna. The attack strategy of concern starts byoverlaying false GNSS radio-navigation signals exactlyon top of the true signals. The false signals increase inpower, lift the receiver tracking loops off of the truesignals, and then drag the tracking loops and thenavigation solution to erroneous, but consistent results.This paper develops codeless and semi-codeless spoofingdetection methods for use in inexpensive, narrow-bandcivilian GNSS receivers. Detailed algorithms andanalyses are developed that use the encrypted militaryP(Y) code on the L1 GPS frequency in order to defendthe open-source civilian C/A code. The new detectiontechniques are similar to methods used in civilian dualfrequencyGPS receivers to track the P(Y) code on L2 bycross-correlating it with P(Y) on L1. Successful detectionof actual spoofing attacks is demonstrated by off-lineprocessing of digitally recorded RF data. The codelesstechnique can detect attacks using 1.2 sec of correlation,and the semi-codeless technique requires correlationintervals of 0.2 sec or less. This technique has beendemonstrated in a narrow-band receiver with a 2.5 MHzbandwidth RF front-end that attenuates the P(Y) code by5.5 dB.
机译:两个民用GNSS接收器之间未知加密信号的互相关用于检测已知开源信号的欺骗。如果被防御的接收器只有一个天线,则这种检测算法是已知的针对复杂欺骗攻击的最强防御措施。令人关注的攻击策略是通过将错误的GNSS无线电导航信号恰好覆盖在真实信号之上开始的。虚假信号会增加功率,将接收器跟踪环路从真实信号上移开,然后将跟踪环路和导航解决方案拖到错误但一致的结果。 GNSS接收器。开发了详细的算法和分析,这些算法和分析使用L1 GPS频率上的加密的MilitaryP(Y)代码来保护开源民用C / A代码。新的检测技术类似于民用双频GPS接收机中通过将L2上的P(Y)与L1上的P(Y)互相关来跟踪L(2)上的P(Y)码的方法。脱机处理数字记录的RF数据可证明成功检测到了实际的欺骗攻击。无代码技术可以使用1.2秒的相关性检测攻击,而半无代码技术则需要0.2秒或更短的相关间隔。该技术已在具有2.5 MHz带宽RF前端的窄带接收器中演示,该前端将P(Y)码衰减5.5 dB。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号