Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

نویسندگان

  • A. Sadr School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • D. M. de Andrés ETSI de Telecomunicación, Universidad Politécnica de Madrid, Av. Complutense 30, 28040 Madrid, Spain.
  • K. Zarrinnegar School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • M. R. Mosavi School of Electrical Engineering, Iran University of Science and TechnologySchool of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
  • S. Tohidi School of Electrical Engineering, Iran University of Science and Technology (IUST), Narmak, Tehran 16846-13114, Iran.
چکیده مقاله:

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural Network (MLP NN) and Convolutional Neural Network (CNN). Using the proposed method reduces data complexity, which can reduce the number of learning data requirements. The simulation results indicate that, by applying the proposed image processing algorithm for different dimensions of CAF images, the CNN performs better than MLP NN in terms of training accuracy; the MLP NN is superior to CNN in terms of convergence speed of training. In addition, the results demonstrate that the operation of the proposed method is appropriate in the case of small-delay spoofed signals. Therefore, for the intervals above 0.25 code chip, the proposed method detects spoofing attacks with a correct detection probability close to one.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

The aviation industry’s increasing reliance on GPS to facilitate navigation and air traffic monitoring opens new attack vectors with the purpose of hijacking UAVs or interfering with air safety. We propose Crowd-GPS-Sec to detect and localize GPS spoofing attacks on moving airborne targets such as UAVs or commercial airliners. Unlike previous attempts to secure GPS, Crowd-GPS-Sec neither requir...

متن کامل

Thermal Image Processing Approach to Detect Malaria using Fuzzy Logic

The thermal image processing technique for detecting malaria using General Fuzzy Min-Max neural network (GFMM). For detecting malaria, image should go through 4 standard steps, pre-processing, segmentation, feature extraction and selection and classification. Median filter is used in pre-processing step which reduces salt-and-pepper noise of the image. The filtered image is then segmented with ...

متن کامل

Improving Gait Biometrics under Spoofing Attacks

Gait is a relatively new biometric modality which has a precious advantage over other modalities, such as iris and voice, in that it can be easily captured from a distance. While it has recently become a topic of great interest in biometric research, there has been little investigation into gait spoofing attacks where a person tries to imitate the clothing or walking style of someone else. We r...

متن کامل

Image Processing Approach to Detect Road Signs in Indian Roads

ABSTARCT: Most of the Indian rural and suburban roads are not ideal for driving due to improper and invisible road signs. This has led to many accidents causing loss of lives and severe damage to vehicles. Many techniques have been proposed in the past to detect these problems using image processing methods. But there has been little work specifically carried out for detecting the issue of road...

متن کامل

Effective Approach to Detect Clickjacking Attacks

Today’s world revolves around internet technologies. Numerous internet applications and services are available to the users to make life simpler. In this work, we propose to detect and prevent clickjacking attacks by means of establishing a trustworthy map between the user interface and the web application. This is accomplished by the exploitation of agents. There are three agents proposed in t...

متن کامل

Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks

Results from Global Positioning System (GPS) spoofing tests against Phasor Measurement Units (PMUs) are presented, demonstrating that PMUs are vulnerable to spoofing attacks. A GPS spoofer can manipulate PMU time stamps by injecting a counterfeit ensemble of GPS signals into the antenna of the PMU’s time reference receiver. A spoofer-induced timing error of only a few tens of microseconds cause...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ذخیره در منابع من قبلا به منابع من ذحیره شده

{@ msg_add @}


عنوان ژورنال

دوره 19  شماره 1

صفحات  2584- 2584

تاریخ انتشار 2023-03

با دنبال کردن یک ژورنال هنگامی که شماره جدید این ژورنال منتشر می شود به شما از طریق ایمیل اطلاع داده می شود.

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023