A detection method of satellite positioning spoofing attack
A spoofing attack and satellite positioning technology, which is applied in the detection field of satellite positioning spoofing attacks, can solve problems such as positioning or timing errors, and achieve the effects of low power consumption, high reliability, and low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] When a simple single-antenna GNSS spoofing attack occurs, all GNSS signals are emitted from the same antenna, and its Doppler frequency shift law often has the same law, while the position and movement of GPS satellites in space The speed is often not the same, so if the difference between the theoretical Doppler frequency shift data calculated by the present invention and the actual Doppler frequency shift value obtained by the receiver exceeds the preset threshold, it will be considered to be attacked by GNSS spoofing, Thus, a GNSS spoofing attack alarm is issued.
Embodiment 2
[0028] When a direct GNSS spoofing attack using multiple antennas occurs, the attacker can control the Doppler shift value of the GNSS spoofing signal to be similar to the real situation. Since the distance between the GNSS spoofing transmitter and the attacked GNSS receiver is much smaller than the distance between the receiver and the GNSS satellite, when the receiver is in motion, spoofing interference can bring a higher Doppler frequency shift, so GNSS attacks can be detected if the difference between the theoretical Doppler frequency shift data calculated by the receiver and the actual Doppler frequency shift value obtained by the receiver exceeds a preset threshold. Even if the attacker dynamically changes the transmission frequency of the transmitted attack signal according to the moving direction of the receiver, as long as the attacker cannot correctly estimate the moving speed of the receiver, the present invention can still detect the GNSS attack to a large extent. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


