Spoofing Attack Results Determination in Code Domain Using a Spoofing Process Equation.

Sensors (Basel)

Institute of Advanced Aerospace Technology, School of Mechanical and Aerospace Engineering, Seoul National University, 1 Gwanak-ro, Gwanak-gu, Seoul 08826, Korea.

Published: January 2019

When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (SPE) that can be used to calculate the tracking point of the delay lock loop (DLL) at regular chip intervals for the entire spoofing process. The condition for a successful spoofing signal is analyzed using the SPE. To derive the SPE, parameters, such as the signal strength, sweep velocity, loop filter order, and DLL bandwidth are considered. The success or failure of a spoofing attack is determined for a specific spoofing signal using the SPE. In addition, a correlation between each parameter for a successful spoofing attack could be obtained through the SPE. The simulation results show that the SPE performance is largely consistent with that of general DLL methods, even though the computational load of SPE is very low.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6359678PMC
http://dx.doi.org/10.3390/s19020293DOI Listing

Publication Analysis

Top Keywords

spoofing attack
12
spoofing process
12
spoofing signal
12
spoofing
10
process equation
8
authentic signal
8
signal spoofing
8
tracking point
8
successful spoofing
8
spe
7

Similar Publications

The integration of liveness detection into biometric systems is crucial for countering spoofing attacks and enhancing security. This study investigates the efficacy of photoplethysmography (PPG) signals, which offer distinct advantages over traditional biometric techniques. PPG signals are non-invasive, inherently contain liveness information that is highly resistant to spoofing, and are cost-efficient, making them a superior alternative for biometric authentication.

View Article and Find Full Text PDF

The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure.

View Article and Find Full Text PDF

XAI GNSS-A Comprehensive Study on Signal Quality Assessment of GNSS Disruptions Using Explainable AI Technique.

Sensors (Basel)

December 2024

LASSENA-Laboratory of Space Technologies, Embedded Systems, Navigation and Avionics, École de Technologie Supérieure (ETS), Montreal, QC H3C-1K3, Canada.

The hindering of Global Navigation Satellite Systems (GNSS) signal reception by jamming and spoofing attacks degrades the signal quality. Careful attention needs to be paid when post-processing the signal under these circumstances before feeding the signal into the GNSS receiver's post-processing stage. The identification of the time domain statistical attributes and the spectral domain characteristics play a vital role in analyzing the behaviour of the signal characteristics under various kinds of jamming attacks, spoofing attacks, and multipath scenarios.

View Article and Find Full Text PDF

Satellite Fingerprinting Methods for GNSS Spoofing Detection.

Sensors (Basel)

December 2024

Institute of Communications and Navigation, German Aerospace Center (DLR), 51147 Köln, Germany.

Spoofing attacks pose a significant security risk for organizations and systems relying on global navigation satellite systems (GNSS) for their operations. While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios.

View Article and Find Full Text PDF

Facial Anti-Spoofing Using "Clue Maps".

Sensors (Basel)

November 2024

Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland 1010, New Zealand.

Spoofing attacks (or Presentation Attacks) are easily accessible to facial recognition systems, making the online financial system vulnerable. Thus, it is urgent to develop an anti-spoofing solution with superior generalization ability due to the high demand for spoofing attack detection. Although multi-modality methods such as combining depth images with RGB images and feature fusion methods could currently perform well with certain datasets, the cost of obtaining the depth information and physiological signals, especially that of the biological signal is relatively high.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!