Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  antispoofing
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The need for accuracy, precision, and data registration in underwater positioning and navigation should be viewed as no less stringent than that which exists on the sea surface. In the same way in which GNSS (Global Navigation Satellite System) receivers rely on the signals from multiple satellites to calculate a precise position, undersea vehicles discern their location by ranging to the acoustic signals originating from several fixed underwater acoustic sources using the Time-of-Arrival algorithm (ToA) through the Ordinary Least Squares method (OLS). In this article, the scope has been limited to only considering underwater positioning systems in which the navigation receiver is acoustically passive. The receiver “listens” to the buoys, receives their messages and solves the problem of finding its own position based on the geographical coordinates of the buoys. Often, such systems are called GNSS-like Underwater Positioning Systems (GNSS-like UPS). It is important to note the distinction between general purpose GNSS-like UPS (mainly civil systems) and special purpose GNSS-like UPS (mainly military systems). In this article, only general purpose GNSS-like UPS systems have been considered. Depending on the scale of system’s service areas, GNSS-like UPS are divided into global, regional, zonal and local systems. Only local GNSS-like UPS systems have been considered in this article. The spoofing of acoustic GNSS-like UPS works as follows: the acoustic GNSS signal generator transmits a simulated signal of several satellites. If the level of the simulated signal exceeds the signal strength of the real satellites, the acoustic receiver of an underwater object will “capture” the fake signal and calculate a false position based on it. All receivers that fall into the spoofing zone will calculate the same coordinates, while the receivers located in different places will have a mismatch in the XYZ coordinates.
2
Content available Cloud-based GNSS navigation spoofing detection
EN
Satellite navigation systems are commonly used to precisely determine the trajectory of transportation equipment. The widespread deployment of GNSS is pushing the current receiver technology to its limits due to the stringent demands for seamless, ubiquitous and secure/reliable positioning information. This fact is further aggravated by the advent of new applications where the miniaturized size, low power consumption and limited computational capabilities of user terminals pose serious risks to the implementation of even the most basic GNSS signal processing tasks. This paper has presented the advantage of Cloud-based GNSS Navigation, which facilitates the possibility of developing innovative applications where their particularities (e.g. massive processing of data, cooperation among users, security-related applications, etc.) make them suitable for implementation using Cloud-based infrastructure.
3
Content available Detection of Spoofing using Differential GNSS
EN
One of the main problems in modern navigation of both manned and unmanned transport systems is that of transport safety. Differential GNSS technology has been used to improve the accuracy of transport positioning, in which position is calculated relative to a fixed reference station with a known position XYZ. Unfortunately, GNSS is vulnerable to malicious intrusion. GNSS signals and/or correction signals from the reference station can be spoofed by false signals, and special receivers have been used to provide defenses against such attacks. But how can the roving receiver (i.e. the user) be sure that the information they receive is authentic? Spoofing is the transmission of a matched-GNSS-signal-structure and/or signals to a reference station in order to cause interference and attempt to commandeer the tracking loops of a victim receiver, thereby allowing manipulation of the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters, or it can be co-located with its victim. In this article we consider the principles of spoofing detection using Differential GNSS, in which a correction signal from the reference station is used for the detection of spoofing.
EN
Spoofing and antispoofing algorithms have become an important research topic within the GNSS discipline. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. The goal of spoofing is to provide the receiver with a misleading signal, fooling the receiver to use fake signals in thespace for positioning calculations. The receiver will produce a misleading position solution. The article discusses a new approach to GNSS spoofing based on the application of GNSS signal repeating by potential terrorists. Practical spoofing that provides misleading navigation results at the receiver is difficult to conduct due to the signal infrastructure and by applying trivial anti-spoofing algorithms in GPS receivers, spoofing attacks can be easily detected. To detect spoofing attacks of this type a variety of methods exists. For example, the authors suggest the use of paired navigators and GNSS compasses as detectors of GNSS spoofing.
PL
Algorytmy spoofingu i antyspoofingu stały się ważnym tematem badań w ramach dyscypliny GNSS. Podczas gdy wiele odbiorników GNSS ma dużą przestrzeń dla dynamiki sygnału, wystarczająco dużo miejsca pozostaje dla sygnałów GNSS być sfałszowanym. Celem spoofingu jest dostarczenie odbiornika z sygnałem mylącym oszukać odbiornik w toku obliczenia pozycji. Odbiornik będzie produkować mylących pozycji. W artykule omówiono nowe podejście do spoofingu GNSS w oparciu o zastosowanie sygnału GNSS powtarzając przez potencjalnych terrorystów. Praktyczne spoofing, które zapewnia błędne wyniki nawigacji w odbiorniku jest trudne do przeprowadzenia ze względu na infrastrukturę sygnału oraz stosowanie trywialnych algorytmy anty-spoofingu w odbiorniki GNSS, ataki spoofingu można łatwo wykryć. Do wykrywania ataków fałszowaniu tego rodzaju istnieje wiele różnych metod. Na przykład, autorzy sugerują stosowanie sparowanych nawigatorów i GNSS kompasy jako detektorów spoofingu GNSS.
EN
GNSS-dependent positioning and navigation have a significant impact on everyday life. One of the major problems of modern navigation for both manned and unmanned transport systems is the problem of navigation safety. Therefore, such a widely used system increasingly becomes an attractive target for illicit exploitation by terrorists and hackers acting from various motives. As such, spoofing and antispoofing algorithms have become an important research topic within the GNSS discipline. This paper will provide a review of the navigation and safety problems of unmanned systems. After introducing a spoofing signal model, a brief review of recently proposed anti-spoofing techniques and their performance in terms of spoofingdetection and spoofing mitigation will be provided. This paper will also provide a review of different spoofing scenarios in case of the application of signal repeater as a spoofer.
PL
Pozycjonowanie GNSS i nawigacja posiada znaczny wpływ na życie codzienne. Jednym z głównych problemów współczesnej nawigacji zarówno załogowych i bezzałogowych systemów transportowych jest problem bezpieczeństwa żeglugi. Dlatego takie powszechnie stosowany system staje się coraz bardziej atrakcyjnym celem dla nielegalnego wykorzystywania przez terrorystów i hakerów działających z różnych motywów. Algorytmy spoofingui antyspoofingu stały się ważnym tematem badań w ramach dyscypliny GNSS. Ten artykuł będzie stanowić przegląd nawigacji i bezpieczeństwa problemów systemów bezzałogowych. Po wprowadzeniu model spoofingu sygnału zostaną przedstawione krótki przegląd niedawno zaproponowanej techniki antyspoofingu. Ten artykuł będzie oraz zapewniać przegląd różnych scenariusze w przypadku stosowania wzmacniaku sygnałów, jako spoofer.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.