GNSS Spoofing Detection / (Record no. 616112)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 04251nam a22001817a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | NUST |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20260207123100.0 |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 621.382,KHA |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Khan, Abdul Malik |
| 9 (RLIN) | 124470 |
| 245 ## - TITLE STATEMENT | |
| Title | GNSS Spoofing Detection / |
| Statement of responsibility, etc. | Abdul Malik Khan |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Rawalpindi, |
| Name of publisher, distributor, etc. | MCS (NUST), |
| Date of publication, distribution, etc. | 2021 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xix, 167 p |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Formatted contents note | The Global Navigation Satellite Systems (GNSS) is a low cost (to user), globally available,<br/>highly precise, all-time/all-weather timing and positioning system. Because of these advantages,<br/>its usage is growing at a very high rate. The GNSS system is unique in several respects<br/>including their low transmit power, open structure, and simplex (receive-only user systems)<br/>operation. Due to the fact that GNSS signals are received with very low power, they are<br/>prone to interference events that may reduce the usage or decrease the accuracy. Also due<br/>to the open signal structure, the receivers are prone to intentional interference to deceive the<br/>user, known as the spoofing attack.<br/>Spoofing of GNSS receiver poses great risks and challenges due to the user stake involved<br/>and the damage it can cause. A low cost GNSS receiver under spoofing attack usually does<br/>not alert the user and could mislead to a hazardous situation. However, the attack has its own<br/>limitations and shortcomings that are exploited in the anti-spoofing receivers. These include<br/>changing the lock of the receiver from authentic to the spoofing signal, spatial diversity of<br/>the authentic signal, and the coherency between the code, carrier and navigation message<br/>stream.<br/>In the efforts of mitigating the effects of spoofing on a user receiver, the detection is usually<br/>the foremost task. Therefore, the focus of this thesis is on the design and validation of<br/>different signal processing techniques that aim at detection of the spoofing attack effects.<br/>Three different techniques are thesisized. These techniques include slope metric based detector,<br/>PCA based detector, and ACF shape distortion based detector. The goal of slope<br/>based spoofing detection technique is to measure the signal quality by analyzing the slope<br/>of ACF. The formulation of slope-based metrics involves monitoring correlators along with<br/>tracking correlators in the receiver’s channel, to capture the slope correctly. The PCA based<br/>technique discussed in this thesis, can classify the received signal as clean, multipath and<br/>spoofing through a Baye’s multi-hypothesis classifier constructed from a Monte-Carlo simulation<br/>of the parameters for a receiver operating in a threat environment. The classifier uses<br/>the observation vector consisting of PCA normalized reconstruction error and principal direction<br/>deviation. The ACF shape distortion method compares the measured and the typical<br/>correlator tap values. The measurement is done through multiple correlator taps. The typical<br/>ACF values used are calculated considering the un-spoofed situations in which the signal<br/>contains Line of Sight (LOS) and Non-LOS components and noise.<br/>The detection techniques are checked using simulations, synthetic data and the TEXBAT data shared by the University of Texas, Austin. The methods found to be very effective in<br/>detecting the spoofing attack during the pull-off phase of the attack. In each case, Different<br/>formulations of the proposed methods are studied for optimal detection.<br/>The thesis also discusses mathematical analysis of the noise as the signal travels in different<br/>parts of the receiver. The analysis primarily investigates the joint statistics of the signals<br/>at the output of the correlators. The results of the analysis are useful in the development of<br/>a detector that utilizes the statistical correlation between the correlator outputs such as PCA<br/>based detectors.<br/>The thesis also discusses a method of generating spoofing signals using two un-spoofed<br/>recordings done simultaneously in open sky conditions. The resultant spoofing signal can be<br/>used in the validation of anti-spoofing methods, as an affordable alternative to the complete<br/>spoofing equipment. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | PhD Electrical Engineering Thesis |
| 9 (RLIN) | 133107 |
| 651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME | |
| Geographic name | PhD EE Thesis |
| 9 (RLIN) | 133108 |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Supervised by Dr. Attiq Ahmad |
| 9 (RLIN) | 132703 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | |
| Koha item type | Thesis |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Permanent Location | Current Location | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Military College of Signals (MCS) | Military College of Signals (MCS) | Thesis | 02/07/2026 | 621.382,KHA | MCSPhD EE-18 | 02/07/2026 | 02/07/2026 | Thesis | Almirah No.68, Shelf No.6 |
