GPS Spoofing Detection System
dc.creator | Psiaki, Mark | |
dc.creator | O'Hanlon, Brady | |
dc.creator | Humphreys, Todd E. | |
dc.creator | Bhatti, Jahshan A. | |
dc.date.accessioned | 2018-01-30T19:21:51Z | |
dc.date.available | 2018-01-30T19:21:51Z | |
dc.date.issued | 2010 | |
dc.description.abstract | A real-time method for detecting GPS spoofing in a narrow-bandwidth civilian GPS receiver is being developed. It is needed in order to detect malicious spoofed signals that seek to deceive a C/A-code civilian GPS receiver regarding its position or time. The ability to detect a spoofing attack is important to the reliability of systems ranging from cell-phone towers, the power grid, and commercial fishing monitors. The spoofing detector mixes and accumulates base-band quadrature channel samples from two receivers, one a secure reference receiver, and the other the defended User Equipment (UE) receiver. The resulting statistic detects the presence or absence of the encrypted P(Y) code that should be present in both signals in the absence of spoofing. | en_US |
dc.description.department | Aerospace Engineering | en_US |
dc.identifier | doi:10.15781/T2CC0V952 | |
dc.identifier.uri | http://hdl.handle.net/2152/63338 | |
dc.language.iso | eng | en_US |
dc.relation.ispartof | Radionavigation Laboratory Posters | en_US |
dc.rights.restriction | Open | en_US |
dc.subject | GPS spoofing | en_US |
dc.subject | Detection system | en_US |
dc.subject | civilian GPS receiver | en_US |
dc.title | GPS Spoofing Detection System | en_US |
dc.type | Poster | en_US |