Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Spoofing Mitigation Using Multiple GNSS-Receivers
Linköping University, Department of Electrical Engineering, Automatic Control.
2019 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Global Navigation Satellite Systems (GNSS) are used in a multitude of civilian as well as security related applications. GNSS-receivers are vulnerable to different types of spoofing attacks where the receiver is ``tricked'' to provide false position and time estimates. These attacks could have serious implications; hence, it is important to develop GNSS-receivers that are robust against spoofing attacks.

This thesis investigates the use of multiple GNSS-receivers that exchange information such as pseudorange or carrier phase measurements in order to perform spoofing mitigation. It has previously been shown that carrier phase measurements from multiple receivers can be used to identify spoofing signals. The focus in this thesis is on investigating the possibility of using pseudorange measurements from two receivers to perform spoofing mitigation. The use of pseudoranges to perform spoofing mitigation is compared to the use of carrier phases.

The spoofing attack is assumed to be performed using a single transmission antenna. This is exploited in order to identify the spoofing signals. The spoofing mitigation algorithms compute, for a pair of receivers, either pseudorange or carrier phase double differences. A double difference is the difference of two single differences for a satellite pair, where the single difference is the difference of pseudoranges or carrier phases measured from one satellite by a pair of receivers. The spoofing mitigation involves the identification of spoofing signals based on these calculated pseudorange or carrier phase double differences. The measurements obtained from identified spoofing signals are not used by the receivers in subsequent computations of position, velocity and time, thereby mitigating the effects of the spoofing attack.

The spoofing mitigation algorithms were evaluated with the help of the software-defined GNSS-receiver GNSS-SDR, which was modified to acquire and track both authentic signals and spoofed signals. The spoofing mitigation algorithms were implemented and evaluated in MATLAB. Simulated meaconing attacks were created using a Spirent GNSS simulator.

The evaluations indicate that spoofing mitigation is possible using pseudorange measurements from two receivers. However, the performance of the spoofing mitigation algorithms deteriorates for short distances between the receivers when pseudorange measurements are used. The use of carrier phase measurements for spoofing mitigation appears to be more appropriate for short distances between the receivers. The use of pseudoranges enabled quite fast identification of the spoofing signals for larger distances between the receivers. Most spoofing signals are identified within 30 seconds using pseudoranges and for distances larger than 20 meter between the receivers.

Place, publisher, year, edition, pages
2019. , p. 76
Keywords [en]
GNSS, spoofing, mitigation
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:liu:diva-158461ISRN: LiTH-ISY-EX--19/5238--SEOAI: oai:DiVA.org:liu-158461DiVA, id: diva2:1333664
External cooperation
Totalförsvarets forskningsinstitut (FOI)
Subject / course
Electrical Engineering
Presentation
2019-06-11, konferensrummet i Visionen, Linköping, 09:00 (Swedish)
Supervisors
Examiners
Available from: 2019-07-02 Created: 2019-07-01 Last updated: 2019-07-02Bibliographically approved

Open Access in DiVA

fulltext(11882 kB)58 downloads
File information
File name FULLTEXT01.pdfFile size 11882 kBChecksum SHA-512
a1adafb47f1c059d5ee38805ff1fb3b262f561e514ba2367fafb6f969ef8139a0a63aa4edef0cad7e87929f42ebe6c955b25c2cc8d4414602cb161944a5c1a60
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Stenberg, Niklas
By organisation
Automatic Control
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 58 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 130 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf