Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Position spoofing attack detection method for frequency modulation signal indoor positioning system

An FM signal, indoor positioning technology, applied in the field of communication, can solve the problem of position information acquisition error, positioning system position determination error and other problems

Active Publication Date: 2016-03-16
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] A location spoofing attack refers to an attacker tampering with the location information of a normal user's location, so that the normal user obtains the location information tampered with by the attacker when the normal user needs to obtain the location information, resulting in an error in obtaining the location information
The position spoofing attack of the FM signal indoor positioning system is based on the signal strength of the target position and the false position, combined with the characteristics of the FM signal frequency changing within a certain range of the center frequency, and constructs an attack signal that is the same as the carrier frequency of the FM signal but opposite, so that the attack signal and The normal FM signal is fused in the transmission medium to achieve a change in the strength of the normal FM signal, resulting in an error in the position determination of the positioning system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Position spoofing attack detection method for frequency modulation signal indoor positioning system
  • Position spoofing attack detection method for frequency modulation signal indoor positioning system
  • Position spoofing attack detection method for frequency modulation signal indoor positioning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution, and provides detailed implementation and specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.

[0043] The application scenario of the present invention is an FM signal indoor positioning system, and the system includes a FM signal base station, an attacker and a normal user. The user calculates the cross-correlation between the received undetected signal and the FM carrier signal spectrum, uses the upper and lower thresholds to determine the signal type, and obtains the detection result of the location spoofing attack.

[0044] Such as figure 1 Shown, concrete steps of the present invention are as follows:

[0045] Step 1, initialization.

[0046] 1.1) The user uses his own antenna to receive 100 times of natural noise...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a position spoofing attack detection method for a frequency modulation signal indoor positioning system, mainly to solve the problem that a position spoofing attack cannot be detected in a frequency modulation signal-based indoor positioning system. The method comprises steps of initialization, threshold determination, undetected signal receiving, frequency domain correlation calculation and position spoofing attack detection. Frequency domain characteristics of normal frequency modulation signals, carrier signals and natural noise signals are fully combined, time domain signals are converted into the frequency domain signals for processing, and the characteristic that the time domain signals in the position spoofing attack have irregular amplitude variation can be avoided; spectral cross-correlation is adopted for representing signal features, and high-efficiency judgment on attacked signals can be ensured; and an upper threshold and a lower threshold are used for dual judgment, and detection accuracy is improved.

Description

technical field [0001] The invention relates to the technical field of communication, and further relates to the indoor positioning technology of frequency modulation signals. According to the characteristics of normal frequency modulation signal, carrier signal and natural noise signal, the present invention can perform two-level detection on undetected signals by combining the cross-correlation of signal frequency domain and adopting the method of upper and lower thresholds, and further judge the true signal type of undetected signals, Therefore, a judgment can be made on whether the positioning system is attacked, making the method more efficient and flexible in detecting location spoofing attacks. Background technique [0002] In recent years, because GPS signals cannot be transmitted indoors, underground and in tunnels, and are easily blocked by large trees, mountains, and tall buildings in cities, and have multipath effects, it is difficult to apply them to indoor envi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W12/122H04W12/63
CPCH04W12/12
Inventor 裴庆祺李子刘尧
Owner XIDIAN UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More