Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "spoofing" wg kryterium: Temat


Tytuł:
Anti-Spoofing Method: A Survey on Biometric Face Recognition
Autorzy:
Saranya, M.
Amudha, P.
Powiązania:
https://bibliotekanauki.pl/articles/1193552.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
Biometric
anti-spoofing
face spoofing
security
Opis:
In recent decades, the evolution of biometric technology from the first revolutionary works in faces and voice recognition to the current state of development such as fingerprint, face, or iris, signature or hand. This path of technological growth has naturally led to a dangerous issue that has started emerging in recent years. The conflict of this rapidly emerging technology to external attacks and, in specific, to spoofing. Spoofing, referred by the term attack in modern standards. It refers that it has ability to fool a biometric system by means of giving forged version of original biometric system into the sensor where illegitimate user acts as an genuine user. The entire biometric community, including researchers and developers has put themselves into the challenging task of proposing and developing efficient protection methods. The main objective of this paper is to provide a broad overview on anti-spoofing, with special attention to face modality.
Źródło:
World Scientific News; 2016, 41; 92-98
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The vulnerability of unmanned vehicles to terrorist attacks such as Global Navigation Satellite System spoofing
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135170.pdf
Data publikacji:
2016
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
navigation
jammer
jamming
anti-jamming
spoofer
spoofing
anti-spoofing
repeater
Opis:
Spoofing, anti-spoofing, jamming, and anti-jamming algorithms have become an important research topic within the Global Navigation Satellite System (GNSS) discipline. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. GNSS signal power on the earth’s surface is around 160 dBW. The goal of spoofing is to provide the receiver with a slightly more powerful misleading signal, stronger than the original GNSS signal, fooling the receiver into using fake signals for positioning calculations. The receiver will generate a misleading position of the navigator. Practical spoofing that provides misleading navigation results of the receiver is difficult to conduct due to the signal infrastructure. Using trivial anti-spoofing algorithms in GNSS receivers, spoofing attacks can be easily detected. The article discusses the vulnerability of unmanned vehicles and provides an approach to anti-spoofing based on measuring distance between two antennas.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2016, 46 (118); 181-188
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protecting vehicles vulnerable to terrorist attacks, such as GNSS jamming, by electromagnetic interference shielding of antenna
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135431.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
navigation
jammer
jamming
anti-jamming
spoofer
spoofing
anti-spoofing
repeater
Opis:
Spoofing, anti-spoofing, jamming and anti-jamming technologies have become an important research topic within the GNSS discipline. While many GNSS receivers leave a large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed and/or jammed. The goal of spoofing is to provide the receiver with a misleading signal, fooling the receiver into using fake signals in the extra space for positioning calculations. The receiver will then generate a false position, thus misleading the navigator. The goal of jamming is to add noise to the satellite signal which leads to fooling the receiver into using “signals plus noise” for positioning calculations. This article discusses the approach to anti-jamming based on the shielding of antennas from the signal jammer.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 50 (122); 77-83
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Primenenie sputnikovogo komnasa dlâ obnaruženiâ GNSS-spufinga
The application of satellite compass for GNSS-spoofing detecting
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Lusznikov, E.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/359319.pdf
Data publikacji:
2014
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
spoofer
Spoofing
GNSS
compass
Opis:
The article discusses a new approach to the detection of GNSS spoofing, based on the use of satellite compass. Comparing the results of measurements of GNSS receivers of compass in two modes (normal mode of GNSS navigation and spoofing mode). The studies have shown, that in mode of spoofing attacks in both receivers of satellite compass we have the equality of coordinates, which in algorithm coordinate definitions, determine mathematical indeterminate form 0/0. This means getting out of the operating status of the satellite compass that can be used as an alarm “spoofing attack” to take appropriate security measures of GNSS navigation.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2014, 37 (109); 28-33
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the application of GNSS signal repeater as a spoofer
Autorzy:
Dobryakova, L.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/360710.pdf
Data publikacji:
2014
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
spoofer
spoofing
GNSS
repeater
Opis:
Spoofing and antispoofing algorithms have become an important research topic within the GNSS discipline. The power of the GNSS signal on the earth’s surface averages –160 dBw. While many GNSS receivers leave large space for signal dynamics, enough power space is left for the GNSS signals to be spoofed. The goal of spoofing is to provide the receiver with a misleading signal, fooling the receiver to use fake signals in space for positioning calculations. The receiver will produce a misleading position solution. The purpose of this paper is to analyze the vulnerability of the satellite signal in repeater’s output from the viewpoint of GNSS spoofing attacks. The article discusses a new approach to GNSS spoofing, based on the application of GNSS signals repeating by potential terrorists. Practical spoofing that provides misleading navigation results at the receiver is difficult to conduct due to the signal infrastructure, and by applying trivial anti-spoofing algorithms in GPS receivers, spoofing attack can be easily detected. To detect spoofing attacks of this type we have a variety of methods. For example, the authors suggest the use of paired navigators and GNSS compasses as detectors of GNSS spoofing.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2014, 40 (112); 53-57
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The spoofing detection of local area differential GNSS in the aspect of land transport systems
Wykrycie spoofingu w lokalnych różnicowych GNSS w aspekcie lądowych systemów transportowych
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/311113.pdf
Data publikacji:
2017
Wydawca:
Instytut Naukowo-Wydawniczy "SPATIUM"
Tematy:
GNSS
odbiornik satelitarny
spoofing
satellite receiver
Opis:
Differential Global Navigation Satellite System (DGNSS) is an enhancement to GNSS that was developed to correct errors (delays during the signals’ transit to earth) and inaccuracies in the GNSS system, allowing for more accurate positioning of information. In general, access to this correction information makes differential GNSS receivers much more accurate than other receivers; with these errors removed, a GNSS receiver has the potential to achieve accuracies of up to 10 centimeters. The GNSS positioning and navigation is widely used in many industries around the world : aircrafts, ships, missiles, UAVs and vehicles rely on GNSS data. Recent studies have shown that the interference and spoofing of GNSS is a real threat to the reliability and accuracy of the GNSS system and can be used by terrorists. One of the main problems of modern navigation both manned and unmanned transport systems is a problem of transport safety. One of the main problems of modern navigation both manned and unmanned transport systems is a problem of transport safety. To improve the accuracy of transport positioning we use Differential GNSS technology, which is based on setting a fixed referent station with a known geodetic position XYZ. Unfortunately, GNSS is vulnerable to malicious intrusion. GNSS can be spoofed by false signals, but special receivers can provide defenses against such attacks. In this article are considered the principles of architecture LADGNSS – Local Area Differential GNSS.
Różnicowe Globalne Satelitarne Systemy Nawigacyjne (DGNSS) są rozszerzeniem GNSS. Zostały one opracowane w celu skorygowania błędów (opóźnienia sygnałów podczas transmisji do ziemi) i nieścisłości w systemie GNSS, co pozwala na przesłanie bardziej dokładnych informacji pozycjonowania. Dostęp do informacji dotyczących poprawek różnicowych dla odbiorników GNSS pozwala na znacznie bardziej dokładne pozycjonowanie niż w przypadku innych odbiorników. Poprzez usunięcie tych błędów odbiornik GNSS ma potencjał, aby osiągnąć dokładność do 10 centymetrów. Pozycjonowanie GNSS i nawigacja są szeroko stosowane w wielu gałęziach przemysłu na całym świecie: w samolotach, na statkach, w rakietach, bezzałogowych statkach powietrznych(UAV) i pojazdach, opierających swoją pozycję na danych GNSS. Najnowsze badania wykazały, że ingerencja i fałszowanie GNSS jest realnym zagrożeniem dla wiarygodności i dokładności systemu GNSS, podatność ta może być wykorzystana przez terrorystów. Jednym z głównych problemów współczesnych załogowych i bezzałogowych systemów nawigacyjnych jest zagrożenie bezpieczeństwa transportu. Aby zwiększyć dokładność pozycjonowania transportu, wykorzystuje się różne technologie mechanizmu różnicowego GNSS opartego na ustawieniu stacji referencyjnej ze znanym geodezyjnym położeniem w przestrzeni XYZ. Niestety, GNSS jest w dużym stopniu narażone na ataki. Sygnał GNSS może być podrobiony przez nadawanie fałszywych sygnałów, ale specjalne odbiorniki mogą zapewnić przed nimi obronę. W artykule przyjęto zasady architektury LADGNSS – Local Area Differential GNSS.
Źródło:
Autobusy : technika, eksploatacja, systemy transportowe; 2017, 18, 6; 147-151, CD
1509-5878
2450-7725
Pojawia się w:
Autobusy : technika, eksploatacja, systemy transportowe
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Foundations of GNSS spoofing detection and mitigation with distributed GNSS SDR receiver
Autorzy:
Filić, M.
Powiązania:
https://bibliotekanauki.pl/articles/117522.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
Global Navigation Satellite System (GNSS)
positioning
Navigation and Timing (PNT)
cyber attack
Spoofing Detection and Mitigation (SDM)
GNSS SDM
spoofing
GNSS receiver
GNSS spoofing attack
Opis:
GNSS spoofing is an intentional and malicious action aimed at degrading and suppressing GNSS Positioning, Navigation, and Timing (PNT) services. Since it affects data and information segment of GNSS, it is considered a GNSS information (cyber‐) security attack. Considering a significant and powerful threat, GNSS spoofing should be treated seriously to avoid damage and liabilities resulting from disruptions of GNSS PNT services. Here the GNSS position estimation procedure is examined for potential vulnerabilities, and the nature of and motivation for GNSS spoofing attacks exloiting the vulnerabilities assessed. A novel GNSS Spoofing Detection and Mitigation (GNSS SDM) method is proposed within the established computational and communication infrastructure, that allows for successful overcoming and classification of GNSS spoofing attacks. Proposed method is applicable without requirements for core GNSS modification, and leaves majority of user equipment easily transferable to the GNSS spoofing‐free environment. Potential GNSS spoofing effects and GNSS anti‐spoofing opportunities in maritime sector were given a particular attention.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2018, 12, 4; 649-656
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wybrane charakterystyki eksploatacyjne wojskowych odbiorników GPS z modułem SAASM
Selected performance characteristics of GPS SAASM receivers
Autorzy:
Specht, M.
Powiązania:
https://bibliotekanauki.pl/articles/222602.pdf
Data publikacji:
2013
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
moduł SAASM
jamming
spoofing
SAASM module
Opis:
Powszechność wykorzystania cywilnych odbiorników GPS w nawigacji światowej spowodowała konieczność zmiany sposobu podejścia departamentu obrony USA do wykorzystania militarnych odbiorników tego systemu. Na początku xxi wieku opracowano nową koncepcję techniczno-organizacyjną użytkowania odbiorników militarnych z modułem SAASM (Selective Availability Anti-Spoofing Module), których wykorzystanie nie wymaga synchronizacji wstępnej z sygnałami cywilnymi. Bezpośredni dostęp do serwisu wojskowego SPS (Standard Positioning Service) stał się istotą rewolucji w zakresie wykorzystania GPS w aplikacjach militarnych. W artykule zaprezentowano wybrane charakterystyki techniczne odbiorników GPS z modułem SAASM.
Widespread use of GPS receivers in worldwide navigation has made the us department of defense change their approach to the use of military receivers of the system. At the beginning of the 21st century a new technical-organizational concept was developed of using military SAASM (Selective Availability Anti-Spoofing Module) receivers which whose employment does not require initial synchronization with civilian signals. Direct access to the Standard Positioning Service (SPS) omitting civilian signals has become the core of revolution in using GPS for military purposes. The paper presents selected technical characteristics of GPS receivers with SAASM module.
Źródło:
Zeszyty Naukowe Akademii Marynarki Wojennej; 2013, R. 54 nr 4 (195), 4 (195); 87-98
0860-889X
Pojawia się w:
Zeszyty Naukowe Akademii Marynarki Wojennej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
GPS/GNSS spoofing and the real-time single-antenna-based spoofing detection system
Autorzy:
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/135406.pdf
Data publikacji:
2017
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
Global Navigation Satellite System
Global Positioning System
anti-terrorism
anti-spoofing
transport safety
spoofer
spoofing detection algorithm
Opis:
The idea of C/A codes GPS/GNSS Spoofing (Substitution), or the ability to mislead a satellite navigation receiver into establishing a position or time fix which is incorrect, has been gaining attention as spoofing has become more sophisticated. Various techniques have been proposed to detect if a receiver is being spoofed – with varying degrees of success and computational complexity. If the jammer signals are sufficiently plausible then the GNSS receiver may not realize it has been duped. There are various means of detecting spoofing activity and hence providing effective mitigation methods. In this paper, a novel signal processing method applicable to a single antenna handset receiver for spoofing detection has been described. Mathematical models and algorithms have been developed to solve the problems of satellite navigation safety. What has been considered in the paper is a spoofing detection algorithm based on the analysis of a civil satellite signal generated by mobile C/A GPS/GNSS single-antenna receivers. The work has also served to refine the civilian spoofing threat assessment by demonstrating the challenges involved in mounting a spoofing attack.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2017, 52 (124); 145-153
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design and analysis of spoofing detection algorithms for GNSS signals
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/359990.pdf
Data publikacji:
2014
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
GPS
NAVSTAR
GLONASS
Spoofing
Dual-Receiver
Opis:
Many civil GNSS (Global Navigation Satellite System) applications need secure, assured information for asset tracking, fleet management and the like. But there is also a growing demand for geosecurity locationbased services. Unfortunately, GNSS is vulnerable to malicious intrusion and spoofing. How can users be sure the information they receive is authentic? Spoofing is the transmission of matched-GNSS-signalstructure interference in an attempt to commandeer the tracking loops of a victim receiver and thereby manipulate the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters or it can be co-located with its victim. Spoofing attacks can be classified as simple, intermediate, or sophisticated in terms of their effectiveness and subtlety. In an intermediate spoofing attack, a spoofer synchronizes its counterfeit signals with the authentic GNSS signals so they are code-phase-aligned at the target receiver. In this paper we consider the anti-spoofing algorithms based on spoofing detection via Dual-Receiver.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2014, 40 (112); 47-52
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New threat to global transport. GNSS receiver spoofing
Autorzy:
Gucma, M.
Powiązania:
https://bibliotekanauki.pl/articles/224112.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
GNSS Receiver
Global Navigation Satellite System
signal spoofing
anti-spoofing technique
global transport
threats
GNSS
komunikacja globalna
zagrożenia
Opis:
Transport and logistics in XXI century relies on the several technical systems for assuring safe and reliable operations. One of widely used systems are satellite positioning systems, used to monitoring transport means and cargo itself. Reliability of the whole transport chain is often combined with singular reliability of satellite monitoring system. Possible threats to precise positioning of any vehicle is GNSS (Global Navigation Satellite System) deliberate interference. So called spoofing interference can mislead receiver in transport objective for reporting entirely wrong position and timing. To fight with this phenomena’s antispoofing techniques are developed. This paper will provide a review of late researches in field of GNSS anti-spoofing on the side of receiver. GNSS receiver vulnerabilities for a spoofer (device) attack will be presented as well as anti-spoofing algorithms. Possible limitation, costs as well as countermeasures methods will be shown thoroughly. Some of recent trends in anti-spoofing techniques in the world will be outlined up to date.
Źródło:
Archives of Transport; 2015, 35, 3; 7-14
0866-9546
2300-8830
Pojawia się w:
Archives of Transport
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Spoofed Speech Detection with Weighted Phase Features and Convolutional Networks
Autorzy:
Dişken, Gökay
Powiązania:
https://bibliotekanauki.pl/articles/2141645.pdf
Data publikacji:
2022
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
spoofing detection
cosine normalized cepstrum
convolutional neural networks
Opis:
Detection of audio spoofing attacks has become vital for automatic speaker verification systems. Spoofing attacks can be obtained with several ways, such as speech synthesis, voice conversion, replay, and mimicry. Extracting discriminative features from speech data can improve the accuracy of detecting these attacks. In fact, a frame-wise weighted magnitude spectrum is found to be effective to detect replay attacks recently. In this work, discriminative features are obtained in a similar fashion (frame-wise weighting), however, a cosine normalized phase spectrum is used since phase-based features have shown decent performance for the given task. The extracted features are then fed to a convolutional neural network as input. In the experiments ASVspoof 2015 and 2017 databases are used to investigate the proposed system’s spoof detection performance for both synthetic and replay attacks, respectively. The results showed that the proposed approach achieved 34.5% relative decrease in the average EER for ASVspoof 2015 evaluation set, compared to the ordinary cosine normalized phase features. Furthermore, the proposed system outperformed the others at detecting S10 attack type of ASVspoof 2015 database.
Źródło:
Archives of Acoustics; 2022, 47, 2; 181-189
0137-5075
Pojawia się w:
Archives of Acoustics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland
Autorzy:
Macierzyński, Wiesław Łukasz
Boczoń, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/16729748.pdf
Data publikacji:
2022
Wydawca:
Instytut Naukowo-Wydawniczy "SPATIUM"
Tematy:
cybersecurity
cyber threat
ransomware
phishing
smishing
vishing
spoofing
malware
Opis:
Purpose: The purpose of the article is to present both theoretical and practical basis for cybersecurity in electronic banking in Poland during the COVID-19 pandemic. During this period a major reorganisation of IT solutions occurred, which allowed to extend the range of online products and services offered both to bank customers and employees. As our life is more and more dependent on digital technologies, cyber attacks have become more costly and more dangerous. Driven by dynamic technological development regulations have changed, which resulted in cybersecurity becoming a key priority in financial institutions. All the more so because the rapid technological development has been followed by more and more advanced techniques used by criminals searching for easy financial profits. Methodology: The paper uses the method of literature review - mostly electronic sources,  descriptive and comparative analyses. Findings: From customers, perspective, the impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland may be recognized as negative. The years 2020-2021 brought a dynamic growth in the number of digital banking customers, especially mobile banking. In those years financial institutions recorded  an enormous increase in online payments, which was the result of strong, forced by the pandemic, surge in sales in E-commerce. At the same time, there was a sharp rise in the crime rate targeted at banks, but most of all, at bank customers. While the security of the very financial institutions remained unthreatened, there was an explosion in the number of cybercrimes  targeted at E-banking users, with the losses giving dozens of millions PLN in total. That is reflected by the data provided by the National Bank of Poland, numerous complaints to the Financial Ombudsman, the Office of Competition and Consumer Protection, as well as the police investigations. Practical implications: The analysis of relations between theoretical and practical bases of cybersecurity in E-banking in Poland during the COVID-19 pandemic is a key factor for financial institutions. Cybercrime undermines customers' trust in E-channels and therefore negatively influences how banks are perceived, the level of the users' activity in digital channels, and consequently, activity and sales in E-channels. Besides the image and financial risks, banks need to take into consideration the increase in reputation, operation and legal risks. On these grounds, it is possible for state organisations and financial institutions to develop professional education concerning cybersecurity, not only for E-banking customers, but for the whole society.
Źródło:
Central European Review of Economics & Finance; 2022, 39, 4; 39-55
2082-8500
2083-4314
Pojawia się w:
Central European Review of Economics & Finance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analiz algoritmov detektirovaniâ GNSS-spufinga
The analysis of the detecting algorithms of GNSS-spoofing
Autorzy:
Dobryakova, L.
Lemieszewski, Ł.
Ochin, E.
Powiązania:
https://bibliotekanauki.pl/articles/359113.pdf
Data publikacji:
2013
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
spoofer
spoofing
GNSS
NAVSTAR GPS
GLONASS
Galileo
BEJDOU-2
Opis:
The article discusses the new algorithms for detect of GNSS-spoofing based on a comparison of the pseudorange measurements results of navigation satellites and calculate the coordinates of a pair of GNSSreceivers in two modes: the normal GNSS-navigation and mode of the spoofing. The theoretical studies have shown that a single-antenna mode spoofing under certain conditions gives us the same measured pseudoranges. The calculated distance between the two antennas of GNSS-receivers gives us zero. In a mode of the normal GNSS-navigation computed distance between the antennas of the two GNSS-receivers exceeds the true distance to the tens of meters. These differences are used as the basic detection spoofing parameters.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2013, 36 (108) z. 2; 30-36
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Antiterrorism : design and analysis of GNSS antispoofing algorithms
Antyterroryzm : projektowanie i analiza algorytmów antyspoofingu dla globalnych nawigacyjnych systemów satelitarnych
Autorzy:
Ochin, E.
Dobryakova, L.
Lemieszewski, Ł.
Powiązania:
https://bibliotekanauki.pl/articles/359663.pdf
Data publikacji:
2012
Wydawca:
Akademia Morska w Szczecinie. Wydawnictwo AMSz
Tematy:
GNSS
GPS
GLONASS
Galileo
antyterroryzm
antyspoofing
antiterrorism
anti-spoofing
Opis:
Many civil GNSS (Global Navigation Satellite System) applications need secure, assured information for asset tracking, fleet management and the like. But there is also a growing demand for geosecurity location-based services. Unfortunately, GNSS is vulnerable to malicious intrusion and spoofing. How can users be sure that the information they receive is authentic? Spoofing is the transmission of matched-GNSS-signal-structure interference in an attempt to commandeer the tracking loops of a victim receiver and thereby manipulate the receiver’s timing or navigation solution. A spoofer can transmit its counterfeit signals from a stand-off distance of several hundred meters, or it can be co-located with its victim. Spoofing attacks can be classified as simple, intermediate, or sophisticated in terms of their effectiveness and subtlety. In an intermediate spoofing attack, a spoofer synchronizes its counterfeit signals with the authentic GNSS signals, so they are code-phase-aligned at the target receiver. In this paper, authors consider the antispoofing algorithms based on finding statistical anomalies in the basic parameters of the satellite signals. At the stage of learning, the system of antispoofing explores the statistical properties of signals and at the phase of spoofing detection, the system used thresholds characteristics of statistical anomalies. The excess of the threshold characteristics provides a basis for probabilistic decision on the presence of spoofing.
Wiele cywilnych zastosowań GNSS (Globalnych Nawigacyjnych Systemów Satelitarnych) wymaga pewności, że informacje dotyczące śledzenia zasobów, zarządzania flotą itp. nie są sfałszowane. Na uwagę zasługuje także rosnący popyt na geobezpieczeństwo bazujące na usługach lokalizacji. Niestety GNSS jest podatny na preparowanie i modyfikowanie pakietów danych. Powstaje pytanie: jak użytkownicy mogą być pewni, że informacja, którą otrzymują jest autentyczna? Spoofing (ang. spoof – naciąganie, szachrajstwo) jest ingerencją w strukturę transmisji GNSS w celu modyfikacji pętli trasy odbiornika poszkodowanego, skutkiem czego jest manipulacja czasem na odbiorniku lub urządzeniem nawigacyjnym. Osoba podszywająca się może transmitować podrobiony sygnał z ukrycia w odległości do kilkuset metrów lub być współpołożona z jego ofiarą. Ataki spoofingu można zaklasyfikować jako proste, pośrednie i zaawansowane pod względem ich subtelności i efektywności. W ataku pośrednim osoba podszywająca się synchronizuje swój fałszywy sygnał z autentycznym sygnałem GNNS w taki sposób, iż następuje wyrównanie kodu–fazy dla odbiornika sygnału. W artykule przedstawiono algorytmy antyspoofingu, bazujące na znajdowaniu statystycznych anomalii w podstawowych parametrach sygnału satelitarnego. W trakcie funkcjonowania system antyspoofing bada statystyczne własności sygnałów i na etapie wykrycia spoofingu wykorzystuje charakterystyki progu anomalii. Nadmiar cech progowych stanowi podstawę do wykrycia spoofingu.
Źródło:
Zeszyty Naukowe Akademii Morskiej w Szczecinie; 2012, 30 (102); 93-101
1733-8670
2392-0378
Pojawia się w:
Zeszyty Naukowe Akademii Morskiej w Szczecinie
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies