Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

Authors

  • A. Sadr School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • D. M. de Andrés ETSI de Telecomunicación, Universidad Politécnica de Madrid, Av. Complutense 30, 28040 Madrid, Spain.
  • K. Zarrinnegar School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • M. R. Mosavi School of Electrical Engineering, Iran University of Science and TechnologySchool of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • S. Tohidi School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
Abstract:

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural Network (MLP NN) and Convolutional Neural Network (CNN). Using the proposed method reduces data complexity, which can reduce the number of learning data requirements. The simulation results indicate that, by applying the proposed image processing algorithm for different dimensions of CAF images, the CNN performs better than MLP NN in terms of training accuracy; the MLP NN is superior to CNN in terms of convergence speed of training. In addition, the results demonstrate that the operation of the proposed method is appropriate in the case of small-delay spoofed signals. Therefore, for the intervals above 0.25 code chip, the proposed method detects spoofing attacks with a correct detection probability close to one.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...

full text

Thermal Image Processing Approach to Detect Malaria using Fuzzy Logic

The thermal image processing technique for detecting malaria using General Fuzzy Min-Max neural network (GFMM). For detecting malaria, image should go through 4 standard steps, pre-processing, segmentation, feature extraction and selection and classification. Median filter is used in pre-processing step which reduces salt-and-pepper noise of the image. The filtered image is then segmented with ...

full text

Improving Gait Biometrics under Spoofing Attacks

Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We r...

full text

Image Processing Approach to Detect Road Signs in Indian Roads

ABSTARCT: Most of the Indian rural and suburban roads are not ideal for driving due to improper and invisible road signs. This has led to many accidents causing loss of lives and severe damage to vehicles. Many techniques have been proposed in the past to detect these problems using image processing methods. But there has been little work specifically carried out for detecting the issue of road...

full text

Effective Approach to Detect Clickjacking Attacks

Today’s world revolves around internet technologies. Numerous internet applications and services are available to the users to make life simpler. In this work, we propose to detect and prevent clickjacking attacks by means of establishing a trustworthy map between the user interface and the web application. This is accomplished by the exploitation of agents. There are three agents proposed in t...

full text

Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks

Results from Global Positioning System (GPS) spoofing tests against Phasor Measurement Units (PMUs) are presented, demonstrating that PMUs are vulnerable to spoofing attacks. A GPS spoofer can manipulate PMU time stamps by injecting a counterfeit ensemble of GPS signals into the antenna of the PMU’s time reference receiver. A spoofer-induced timing error of only a few tens of microseconds cause...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 19  issue 1

pages  2584- 2584

publication date 2023-03

By following a journal you will be notified via email when a new issue of this journal is published.

Keywords

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023