Characterization of Receiver Response to Spoofing Attacks

dc.creatorShepard, Danielen
dc.date.accessioned2012-08-22T17:03:09Zen
dc.date.available2012-08-22T17:03:09Zen
dc.date.issued2011-05en
dc.descriptionTHESIS Presented to the Faculty of the Undergraduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of BACHELOR OF SCIENCE IN AEROSPACE ENGINEERINGen
dc.description.abstractTest procedures are developed for characterizing the response of civil GPS receivers to spoofing attacks. Two response characteristics are analyzed in detail for four representative GPS receivers: (1) the aggressiveness with which a spoofer can manipulate the victim receiver’s time and position solution, and (2) the spoofer power advantage over the authentic signals required for successful receiver capture. Two of the tested receivers are commonly used in critical infrastructure applications, one in “smart” power grid regulation and one in telecommunications networks. The implications of the test results for these critical infrastructure applications are discussed.en
dc.description.departmentAerospace Engineeringen
dc.identifier.urihttp://hdl.handle.net/2152/17603en
dc.subjectGPS Spoofingen
dc.titleCharacterization of Receiver Response to Spoofing Attacksen
dc.typeThesisen

Access full-text files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
characterization_of_receiver_response_to_spoofing_attacks_shepard.pdf
Size:
4.21 MB
Format:
Adobe Portable Document Format
Description:
Undergraduate Thesis

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.66 KB
Format:
Item-specific license agreed upon to submission
Description: