Enhancement and Defense of GPS Navigation Using Signal Processing Techniques. Carson, N. February 2018. Accepted: 2018-02-14T15:11:42Z
Enhancement and Defense of GPS Navigation Using Signal Processing Techniques [link]Paper  abstract   bibtex   
In this thesis methods of spoo ng prevention are developed to detect, identify, and mitigate an attack against both networked and standalone GPS receivers. A network based detection algorithm is introduced which combines existing network data and GPS receiver outputs to create a dynamic threshold used as an indication of a spoo ng attack. Attack mitigation is accomplished in the development of an interference cancellation algorithm. In the event of an attack, correlators are designated to track the attacking signal and extract critical parameters describing its power, phase, and frequency. These parameters are used to create a replica of the incoming signal which is then subtracted from the bu ered raw data. This process removes the interfering signal allowing recovery of the authentic signal and computation of true receiver position. The anti-spoo ng routines evaluated in this thesis have an advantage over other methods due to their robustness in a wide variety of situations and their ability to mitigate an attack without any prior knowledge of the spoofer or the spoofed signal characteristics. Testing of the algorithms developed in this thesis is accomplished using various types of simulated GPS data since live-sky testing in the GPS frequency band is restricted by the Federal Communications Commission. Actual GPS measurements are collected and modi ed to simulate spoo ng in tests of the detection algorithms. Sets of simulated GPS data les are combined in software to simulate spoo ng at the signal level. These data sets are used to test the interference cancellation algorithm's e ectiveness at removing a spoofed signal in the intermediate frequency (IF) stage. The detection and suppression algorithms are demonstrated to e ectively alert the user to an attack and mitigate its e ect in IF stage generating a cleaned data set for acquisition and tracking of the authentic GPS signal.
@unpublished{carson_enhancement_2018,
	title = {Enhancement and {Defense} of {GPS} {Navigation} {Using} {Signal} {Processing} {Techniques}},
	url = {https://etd.auburn.edu//handle/10415/6075},
	abstract = {In this thesis methods of spoo ng prevention are developed to detect, identify, and
mitigate an attack against both networked and standalone GPS receivers. A network based
detection algorithm is introduced which combines existing network data and GPS receiver
outputs to create a dynamic threshold used as an indication of a spoo ng attack. Attack
mitigation is accomplished in the development of an interference cancellation algorithm. In
the event of an attack, correlators are designated to track the attacking signal and extract
critical parameters describing its power, phase, and frequency. These parameters are used
to create a replica of the incoming signal which is then subtracted from the bu ered raw
data. This process removes the interfering signal allowing recovery of the authentic signal
and computation of true receiver position. The anti-spoo ng routines evaluated in this thesis
have an advantage over other methods due to their robustness in a wide variety of situations
and their ability to mitigate an attack without any prior knowledge of the spoofer or the
spoofed signal characteristics.
Testing of the algorithms developed in this thesis is accomplished using various types
of simulated GPS data since live-sky testing in the GPS frequency band is restricted by
the Federal Communications Commission. Actual GPS measurements are collected and
modi ed to simulate spoo ng in tests of the detection algorithms. Sets of simulated GPS
data  les are combined in software to simulate spoo ng at the signal level. These data sets
are used to test the interference cancellation algorithm's e ectiveness at removing a spoofed
signal in the intermediate frequency (IF) stage. The detection and suppression algorithms
are demonstrated to e ectively alert the user to an attack and mitigate its e ect in IF stage
generating a cleaned data set for acquisition and tracking of the authentic GPS signal.},
	language = {en},
	urldate = {2024-06-25},
	author = {Carson, Nathaniel},
	month = feb,
	year = {2018},
	note = {Accepted: 2018-02-14T15:11:42Z},
}

Downloads: 0