Spoofer-to-Target Association in Multi-Spoofer Multi-Target Scenario for Stealthy GPS Spoofing

نویسندگان

چکیده

Global navigation satellite system (GNSS) based is omnipresent in today's world, providing position, velocity, and time (PVT) information with inexpensive GPS receivers. These receivers are highly vulnerable to intentional interference like spoofing meaconing. The of a single receiver using spoofer setup widespread, the concept multiple targets distributed spoofers also equally adaptable. Traditionally, spoofers, surveillance region work independently without knowing other being installed. Multiple deployment its management optimal for misguiding given surveillance. This paper presents generalized mathematical model multi-spoofer multi-target (MSMT) scenario, management, spoofer-to-target association. received power spoofed signals considered as an evaluating parameter locking onto Three novel centralized networking-based techniques proposed overcome association networking. Firstly, global nearest neighbor (GNN) proposed. overall cost function minimized by assigning unique spoofer-ID target-ID. In GNN-based spoofing, minimizes, but it does not ensure that every target-to-spoofer assignment minimum. Secondly, opportunity-based GNN resolve increase hit ratio. However, hard install more spoofers; therefore, tunable transmitting power-based presented accomplish efficient higher hit-ratio. efficiency evaluated association, ratio, position root mean square error (PRMSE). All algorithms outperform spoofing. We observe solution MSMT scenario.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Calculation of the lower limit of the spoofing-signal ratio for a GNSS receiver-spoofer

A receiver-spoofer is one of the most covert global navigation satellite system (GNSS) spoofing attacks and can only be effectively detected by the combination of multiple anti-spoofing technologies. In this paper, an analysis of influencing parameters for receiver-spoofers indicates that the ratio of the spoofing signal amplitude versus the authentic signal amplitude (spoofing-signal ratio) is...

متن کامل

SFF Anti-Spoofer: IIIT-H Submission for Automatic Speaker Verification Spoofing and Countermeasures Challenge 2017

The ASVspoof 2017 challenge is about the detection of replayed speech from human speech. The proposed system makes use of the fact that when the speech signals are replayed, they pass through multiple channels as opposed to original recordings. This channel information is typically embedded in low signal to noise ratio regions. A speech signal processing method with high spectro temporal resolu...

متن کامل

Efficiency of Target Location Scenarios in the Multi-Transmitter Multi-Receiver Passive Radar

Multi-transmitter multi-receiver passive radar, which locates target in the surveillance area by the reflected signals of the available opportunistic transmitter from the target, is of interest in many applications. In this paper, we investigate different signal processing scenarios in multi-transmitter multi-receiver passive radar. These scenarios include decentralized processing of reference ...

متن کامل

Unmanned Aircraft Capture and Control Via GPS Spoofing

The theory and practice of unmanned aerial vehicle (UAV) capture and control via Global Positioning System (GPS) signal spoofing are analyzed and demonstrated. The goal of this work is to explore UAV vulnerability to deceptive GPS signals. Specifically, this paper (1) establishes the necessary conditions for UAV capture via GPS spoofing, and (2) explores the spoofer’s range of possible post-cap...

متن کامل

Multi-target Data Association Using Sparse Reconstruction

In this paper we describe a solution to multi-target data association problem based on `1-regularized sparse basis expansions. Assuming we have sufficient training samples per subject, our idea is to create a discriminative basis of observations that we can use to reconstruct and associate a new target. The use of `1-regularized basis expansions allows our approach to exploit multiple instances...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3099968