|Abstract:||GNSS has become an indispensable information infrastructure in our daily life for its function in positioning and timing. But along with its wide application, the security of GNSS is receiving growing concern. Intermediate spoofing, which utilizes the working mechanism of GNSS tracking loop to covertly take over target receiver, poses the most serious near-term threat to GNSS receiver. In order to find corresponding defensive measures, it is essential to understand how GNSS tracking loop reacts to intermediate spoofing. In this paper, simulation framework that mimics actual attack scenario is developed. Through examination of simulation attack, the basic principle behind intermediate spoofing is reviewed. On the basis of above analysis, vulnerability of tracking loops with different loop parameters, such as loop bandwidth and phase discriminator to intermediate spoofing, is evaluated. Furthermore, innovative tracking loop which takes advantage of the redundancy of tracking are evaluated against intermediate spoofing.|
Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019)
September 16 - 20, 2019
Hyatt Regency Miami
|Pages:||943 - 952|
|Cite this article:||
Peng, Chenxi, Li, Hong, Lu, Mingquan, "Research on the Responses of GNSS Tracking Loop to Intermediate Spoofing," Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), Miami, Florida, September 2019, pp. 943-952.
ION Members/Non-Members: 1 Download Credit