When a user receiver is tracking an authentic signal, a spoofing signal can be transmitted to the user antenna. The question is under what conditions does the tracking point of the receiver move from the authentic signal to the spoofing signal? In this study, we develop a spoofing process equation (SPE) that can be used to calculate the tracking point of the delay lock loop (DLL) at regular chip intervals for the entire spoofing process. The condition for a successful spoofing signal is analyzed using the SPE. To derive the SPE, parameters, such as the signal strength, sweep velocity, loop filter order, and DLL bandwidth are considered. The success or failure of a spoofing attack is determined for a specific spoofing signal using the SPE. In addition, a correlation between each parameter for a successful spoofing attack could be obtained through the SPE. The simulation results show that the SPE performance is largely consistent with that of general DLL methods, even though the computational load of SPE is very low.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC6359678 | PMC |
http://dx.doi.org/10.3390/s19020293 | DOI Listing |
Sensors (Basel)
December 2024
Department of Biomedical Engineering, Lebanese International University, Beirut P.O. Box 146404, Lebanon.
The integration of liveness detection into biometric systems is crucial for countering spoofing attacks and enhancing security. This study investigates the efficacy of photoplethysmography (PPG) signals, which offer distinct advantages over traditional biometric techniques. PPG signals are non-invasive, inherently contain liveness information that is highly resistant to spoofing, and are cost-efficient, making them a superior alternative for biometric authentication.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Stony Brook Institute at Anhui University, Hefei 230000, China.
The Internet of Things (IoT) contains many devices that can compute and communicate, creating large networks. Industrial Internet of Things (IIoT) represents a developed application of IoT, connecting with embedded technologies in production in industrial operational settings to offer sophisticated automation and real-time decisions. Still, IIoT compels significant cybersecurity threats beyond jamming and spoofing, which could ruin the critical infrastructure.
View Article and Find Full Text PDFSensors (Basel)
December 2024
LASSENA-Laboratory of Space Technologies, Embedded Systems, Navigation and Avionics, École de Technologie Supérieure (ETS), Montreal, QC H3C-1K3, Canada.
The hindering of Global Navigation Satellite Systems (GNSS) signal reception by jamming and spoofing attacks degrades the signal quality. Careful attention needs to be paid when post-processing the signal under these circumstances before feeding the signal into the GNSS receiver's post-processing stage. The identification of the time domain statistical attributes and the spectral domain characteristics play a vital role in analyzing the behaviour of the signal characteristics under various kinds of jamming attacks, spoofing attacks, and multipath scenarios.
View Article and Find Full Text PDFSensors (Basel)
December 2024
Institute of Communications and Navigation, German Aerospace Center (DLR), 51147 Köln, Germany.
Spoofing attacks pose a significant security risk for organizations and systems relying on global navigation satellite systems (GNSS) for their operations. While the existing spoofing detection methods have shown some effectiveness, these can be vulnerable to certain attacks, such as secure code estimation and replay (SCER) attacks, among others.This paper analyzes the potential of satellite fingerprinting methods for GNSS spoofing detection and benchmarks their performance using real (in realistic scenarios by using GPS and Galileo signals generated and recorded in the advanced GNSS simulation facility of DLR) GNSS signals and scenarios.
View Article and Find Full Text PDFSensors (Basel)
November 2024
Department of Electrical and Electronic Engineering, Auckland University of Technology, Auckland 1010, New Zealand.
Spoofing attacks (or Presentation Attacks) are easily accessible to facial recognition systems, making the online financial system vulnerable. Thus, it is urgent to develop an anti-spoofing solution with superior generalization ability due to the high demand for spoofing attack detection. Although multi-modality methods such as combining depth images with RGB images and feature fusion methods could currently perform well with certain datasets, the cost of obtaining the depth information and physiological signals, especially that of the biological signal is relatively high.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!