Anti-spoofing by smart acquisition in cold-start with multiple hypothesis using wavelet transform in a software GPS receiver

Publish Year: 1404
نوع سند: مقاله ژورنالی
زبان: English
View: 9

This Paper With 15 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJNAA-16-1_013

تاریخ نمایه سازی: 14 مرداد 1403

Abstract:

The spoofing subject is becoming ever increasingly more severe. In addition to the flow of technology, the availability of software-defined radio platforms has increased. Usually, detecting the spoofing is performed by introducing the features that are difficult for the deceiver to counterfeit. Spoofing and countering can be performed in different parts of a GPS receiver. In recent years, less attention has been paid to defense at cold-start. This research presents that the spoofing attack can be diminished during the initial start-up process with a very short effective time. This low-cost method introduces a new decision rule based on a multiple statistical hypothesis test to identify fake peaks in correlation output of acquisition and extract the authentic peaks utilizing the wavelet transform or peak removal process. The main distinction of this method with previous works is investigating different amplitude ratios of spoofing signal to authentic. Simulation results on ۱۰ data sets show that the probability of correct detection and mitigation is more than ۹۰%.

Authors

Maryam Moazedi

Department of Engineering Sciences, Advanced Technologies, University of Mohaghegh Ardabili, Namin, Iran

Mohammad Reza Mosavi

Department of Electrical Engineering, Iran University of Science and Technology,

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • A.R. Baziar, M. Moazedi, and M.R. Mosavi, Analysis of single ...
  • D. Borio, L. Camoriano, and L.L. Presti, Impact of GPS ...
  • K. Borre, D.M. Akos, N. Bertelsen, P. Rinder, and S.H. ...
  • A. Broumandan, A. Jafarnia-Jahromi, S. Daneshmand, and G. Lachapelle, Overview ...
  • F. Dovis, GNSS Interference Threats and Countermeasures, Artech House, ۲۰۱۵ ...
  • E. Garbin Manfredini and F. Dovis, On the use of ...
  • Y. Hu, S. Bian, K. Cao, and B. Ji, GNSS ...
  • A. Jafarnia Jahromi, GNSS signal authenticity verification in the presence ...
  • E.D. Kaplan and C.J. Hegarty, Understanding GPS: Principles and Applications, ...
  • F. Lazaro, R. Raulefs, H. Bartz, and T. Jerkovits, VDES ...
  • M. Li, Y. Yuan, N. Wang, Z. Li, Y. Li, ...
  • C. Liang, M. Miao, J. Ma, H. Yan, Q. Zhang, ...
  • A. Polydoros, On the synchronization aspects of direct-sequence spread spectrum ...
  • S. Semanjski, I. Semanjski, W.D. Wilde, and A. Muls, Use ...
  • E. Schmidt, Z. Ruble, D. Akopian, and D.J. Pack, Software-defined ...
  • E. Schmidt, Z.A. Ruble, D. Akopian, and D.J. Pack, A ...
  • E. Shafiee, M.R. Mosavi, and M. Moazedi, Detection of spoofing ...
  • M. Sharie, M.R. Mosavi, and N. Rahemi, Acquisition of weak ...
  • M. Sharie, M.R. Mosavi, and N. Rahemi, Determination of an ...
  • Z. Wu, Y. Zhang, and R. Liu, BD-II NMA and ...
  • D. Yuan, H. Li, F. Wang, and M. Lu, A ...
  • L.I. Yang-zhi, L. Guangxia, and C. Jian, The research and ...
  • نمایش کامل مراجع