Characterization of Receiver Response to Spoofing Attacks
dc.creator | Shepard, Daniel | en |
dc.date.accessioned | 2012-08-22T17:03:09Z | en |
dc.date.available | 2012-08-22T17:03:09Z | en |
dc.date.issued | 2011-05 | en |
dc.description | THESIS Presented to the Faculty of the Undergraduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of BACHELOR OF SCIENCE IN AEROSPACE ENGINEERING | en |
dc.description.abstract | Test procedures are developed for characterizing the response of civil GPS receivers to spoofing attacks. Two response characteristics are analyzed in detail for four representative GPS receivers: (1) the aggressiveness with which a spoofer can manipulate the victim receiver’s time and position solution, and (2) the spoofer power advantage over the authentic signals required for successful receiver capture. Two of the tested receivers are commonly used in critical infrastructure applications, one in “smart” power grid regulation and one in telecommunications networks. The implications of the test results for these critical infrastructure applications are discussed. | en |
dc.description.department | Aerospace Engineering | en |
dc.identifier.uri | http://hdl.handle.net/2152/17603 | en |
dc.subject | GPS Spoofing | en |
dc.title | Characterization of Receiver Response to Spoofing Attacks | en |
dc.type | Thesis | en |
Access full-text files
Original bundle
1 - 1 of 1
Loading...
- Name:
- characterization_of_receiver_response_to_spoofing_attacks_shepard.pdf
- Size:
- 4.21 MB
- Format:
- Adobe Portable Document Format
- Description:
- Undergraduate Thesis
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.66 KB
- Format:
- Item-specific license agreed upon to submission
- Description: