Browse > Article
http://dx.doi.org/10.12673/jant.2016.20.5.394

Simulation of GNSS Spoofing Detection Method Using Encrypted Ranging Signal  

So, Hyoungmin (Agency for Defense Development)
Abstract
It is well known that the encrypted ranging signal, such as GPS P(Y) code, is immune to spoofing attack. However, in order for users to use the signal, there needs permission from the operator. And also there are many restrictions for use because of security issues. In this paper, a ground reference station equipped with high-gain directional antenna and a user receiver were simulated. In the reference station, the encrypted code can be demodulated from the high-gain signal. And then the code can be used to detect spoofing attack in the user receiver. This paper proposes the spoofing detection method using the encrypted signal and deals with simulation results.
Keywords
GPS spoofing; Anti-spoofing; GPS P(Y) code; Directional antenna; Encrypted signal;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. D. Kaplan, Understanding GPS : Principles and Applications, 2nd ed. Norwood, MA: Artech House, 2005.
2 F. Dovis, GNSS Interference Threats and Countermeasures, Norwood, MA: Artech House, 2015.
3 S. Peterson, and P. Faramarzi, "Exclusive: Iran hijacked US drone, says Iranian engineer," Csmonitor.com, Retrieved 15 December 2011.
4 T. E. Humphreys, "Statement on the vulnerability of civil unmanned aerial vehicles and other systems to civil GPS spoofing," [Internet]. Available: http://homeland.house.gov/sites/homeland.house.gov/files/Testimony-Humphreys.pdf, July 2012.
5 Anon. "Vulnerability assessment of the transportation infrastructure relying on the Global Positioning System Technology Report," John A. Volpe National Transportation Systems Center, 2001.
6 B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System Theory and Practice, 5th ed. New York, NY: Springer, 2001.
7 S. Lo, D. E. Lorenzo, P. Enge, D. Akos, and P. Bradley, "Signal authentication: A secure civil GNSS for today," Inside GNSS, Sept/Oct 2009.
8 M. L. Psiaki, B. W. O'Hanlon, J. A. Bhatti, D. P. Shepard, and T. E. Humphreys, "Civilian GPS spoofing detection based on dual-receiver correlation of military signals," in Proceedings of the 24th ITM of The Institute of Navigation 2011, Portland: OR, Sept. 2011.
9 H. So, J. Jang, K. Lee, K. Song and J. Park, "GNSS spoofing detection scheme based on the combined use of a single authentic ranging signal and RAIM," in Proceedings of 2015 International Association of Institutes of Navigation World Congress, Prague: Czech, Oct. 2015.
10 R. G. Brown, "A baseline GPS RAIM scheme and a note on the equivalence of three RAIM methods," Navigation, Vol. 39, No. 3, pp. 301-316, 1992.   DOI
11 G. X. Gao, A. Chen, S. Lo, D. D. Lorenzon, T. Walter and P. Enge, "Compass-M1 broadcast codes in E2, E5b, and E6 frequency bands," IEEE Journal of Selected Topics in Signal Processing, Vol. 3, No. 4, Aug. 2009.