GNSS Spoofing Detection / (Record no. 616112)

000 -LEADER
fixed length control field 04251nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260207123100.0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 621.382,KHA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Khan, Abdul Malik
9 (RLIN) 124470
245 ## - TITLE STATEMENT
Title GNSS Spoofing Detection /
Statement of responsibility, etc. Abdul Malik Khan
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. 2021
300 ## - PHYSICAL DESCRIPTION
Extent xix, 167 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note The Global Navigation Satellite Systems (GNSS) is a low cost (to user), globally available,<br/>highly precise, all-time/all-weather timing and positioning system. Because of these advantages,<br/>its usage is growing at a very high rate. The GNSS system is unique in several respects<br/>including their low transmit power, open structure, and simplex (receive-only user systems)<br/>operation. Due to the fact that GNSS signals are received with very low power, they are<br/>prone to interference events that may reduce the usage or decrease the accuracy. Also due<br/>to the open signal structure, the receivers are prone to intentional interference to deceive the<br/>user, known as the spoofing attack.<br/>Spoofing of GNSS receiver poses great risks and challenges due to the user stake involved<br/>and the damage it can cause. A low cost GNSS receiver under spoofing attack usually does<br/>not alert the user and could mislead to a hazardous situation. However, the attack has its own<br/>limitations and shortcomings that are exploited in the anti-spoofing receivers. These include<br/>changing the lock of the receiver from authentic to the spoofing signal, spatial diversity of<br/>the authentic signal, and the coherency between the code, carrier and navigation message<br/>stream.<br/>In the efforts of mitigating the effects of spoofing on a user receiver, the detection is usually<br/>the foremost task. Therefore, the focus of this thesis is on the design and validation of<br/>different signal processing techniques that aim at detection of the spoofing attack effects.<br/>Three different techniques are thesisized. These techniques include slope metric based detector,<br/>PCA based detector, and ACF shape distortion based detector. The goal of slope<br/>based spoofing detection technique is to measure the signal quality by analyzing the slope<br/>of ACF. The formulation of slope-based metrics involves monitoring correlators along with<br/>tracking correlators in the receiver’s channel, to capture the slope correctly. The PCA based<br/>technique discussed in this thesis, can classify the received signal as clean, multipath and<br/>spoofing through a Baye’s multi-hypothesis classifier constructed from a Monte-Carlo simulation<br/>of the parameters for a receiver operating in a threat environment. The classifier uses<br/>the observation vector consisting of PCA normalized reconstruction error and principal direction<br/>deviation. The ACF shape distortion method compares the measured and the typical<br/>correlator tap values. The measurement is done through multiple correlator taps. The typical<br/>ACF values used are calculated considering the un-spoofed situations in which the signal<br/>contains Line of Sight (LOS) and Non-LOS components and noise.<br/>The detection techniques are checked using simulations, synthetic data and the TEXBAT data shared by the University of Texas, Austin. The methods found to be very effective in<br/>detecting the spoofing attack during the pull-off phase of the attack. In each case, Different<br/>formulations of the proposed methods are studied for optimal detection.<br/>The thesis also discusses mathematical analysis of the noise as the signal travels in different<br/>parts of the receiver. The analysis primarily investigates the joint statistics of the signals<br/>at the output of the correlators. The results of the analysis are useful in the development of<br/>a detector that utilizes the statistical correlation between the correlator outputs such as PCA<br/>based detectors.<br/>The thesis also discusses a method of generating spoofing signals using two un-spoofed<br/>recordings done simultaneously in open sky conditions. The resultant spoofing signal can be<br/>used in the validation of anti-spoofing methods, as an affordable alternative to the complete<br/>spoofing equipment.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Electrical Engineering Thesis
9 (RLIN) 133107
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD EE Thesis
9 (RLIN) 133108
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Dr. Attiq Ahmad
9 (RLIN) 132703
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 02/07/2026   621.382,KHA MCSPhD EE-18 02/07/2026 02/07/2026 Thesis Almirah No.68, Shelf No.6
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.