189 results on '"spoofing detection"'
Search Results
2. Fast GNSS spoofing detection based on LSTM-detect model.
- Author
-
Mao, Wenxuan, Ren, Jieyige, and Ni, Shuyan
- Abstract
Spoofing detection is an essential process in global navigation satellite system anti-spoofing. Signal quality monitoring (SQM) methods have been widely studied as simple and effective means to detect spoofing. However, the disadvantages of the existing SQM methods, such as long alarm times and low detection rates, necessitate the study of new methods. Therefore, to address these challenges, this paper proposes a novel SQM method based on a long short-term memory-detect (LSTM-Detect) model with a strong capacity for sequential signal processing. In particular, this method evaluates the distortion of the autocorrelation function (ACF) by the trained LSTM-Detect model for spoofing detection. The simulation results demonstrate that the LSTM-Detect model can detect a wide range of spoofing signals, varying in signal power advantages, code phase differences, and carrier phase differences. In the Texas Spoofing Test Battery datasets 2–6, the detection rate exceeds 98.5%, with an alarm time of less than 5 ms. Compared with five existing SQM methods, the LSTM-Detect model exhibits a more comprehensive spoofing detection performance. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
3. A real-time GNSS time spoofing detection framework based on feature processing.
- Author
-
Li, Jing, Chen, Zhengkun, Yuan, Xuelin, Xie, Ting, Xu, Yiyu, Zheng, Zehao, and Zhu, Xiangwei
- Abstract
Currently, the susceptibility of Global Navigation Satellite System (GNSS) signals underscores the importance of accurate GNSS time spoofing detection as a critical research area. Traditional spoofing detection methods have limitations in applicability, while the current learning-based algorithms are only applicable to the judgment of collected data, which is difficult to apply to real-time detection. In this paper, a real-time spoofing detection framework based on feature processing is proposed. The approach involves feature integration and correlation coefficient screening on each epoch of multi-satellite data. Additionally, special standardization strategy is employed to enhance the feasibility of real-time application. In the experimental phase, apart from utilizing the open dataset, an experimental platform is developed to generate dual-system data for experimentation purposes. Compared with the traditional clock difference detection method, this algorithm improves the detection performance by about 25%. Furthermore, the framework proposed can improve the detection F1 score of basic machine learning models and greatly reduce the computation time by more than ten times. On most datasets, models incorporating the framework achieved F1 scores of more than 99% and average response times of less than 10 μs. In summary, this study provides an effective intelligent solution for the application of real-time receiver spoofing detection. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
4. GPS Spoofing Detection using CAF Images and Neural Networks Based on the Proposed Peak Mapping Dimensionality Reduction Algorithm and TCNN Model.
- Author
-
Jahantab, M. J., Tohidi, S., Mosavi, M. R., and Ayatollahi, A.
- Subjects
DIMENSIONAL reduction algorithms ,CONVOLUTIONAL neural networks ,GLOBAL Positioning System ,GPS receivers ,ALGORITHMS - Abstract
Global Positioning System (GPS)-based positioning has become an indispensable part of our daily lives. A GPS receiver calculates its distance from a satellite by measuring the signal reception delay. Then, after determining its position relative to at least four satellites, the receiver obtains its precise location in three dimensions. There is a fundamental flaw in this positioning system, namely that satellite signals at ground level are very weak and susceptible to interference in the bandwidth; therefore, even a slight interference can disrupt the GPS receiver. In this paper, spoofing detection based on the Cross Ambiguity Function (CAF) is used. Furthermore, a dimension reduction algorithm is proposed to improve the speed and performance of the detection process. The reduced-dimensional images are trained by a Convolutional Neural Network (CNN). Additionally, a modified CNN model as Transformed-CNN (TCNN) is presented to enhance accuracy in this paper. The simulation results show a 98.67% improvement in network training speed compared to images with original dimensions, a 1.16% improvement in detection accuracy compared to the baseline model with reduced dimensions, and a 9.83% improvement compared to the original dimensions in detecting spoofing, demonstrating the effectiveness of the proposed algorithm and model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
5. GPS Spoofing Detection using CAF Images and Neural Networks Based on the Proposed Peak Mapping Dimensionality Reduction Algorithm and TCNN Model
- Author
-
M. J. Jahantab, S. Tohidi, Mohammad Reza Mosavi, and Ahmad Ayatollahi
- Subjects
gps ,spoofing detection ,caf ,tcnn ,dimension reduction algorithm ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Global Positioning System (GPS)-based positioning has become an indispensable part of our daily lives. A GPS receiver calculates its distance from a satellite by measuring the signal reception delay. Then, after determining its position relative to at least four satellites, the receiver obtains its precise location in three dimensions. There is a fundamental flaw in this positioning system, namely that satellite signals at ground level are very weak and susceptible to interference in the bandwidth; therefore, even a slight interference can disrupt the GPS receiver. In this paper, spoofing detection based on the Cross Ambiguity Function (CAF) is used. Furthermore, a dimension reduction algorithm is proposed to improve the speed and performance of the detection process. The reduced-dimensional images are trained by a Convolutional Neural Network (CNN). Additionally, a modified CNN model as Transformed-CNN (TCNN) is presented to enhance accuracy in this paper. The simulation results show a 98.67% improvement in network training speed compared to images with original dimensions, a 1.16% improvement in detection accuracy compared to the baseline model with reduced dimensions, and a 9.83% improvement compared to the original dimensions in detecting spoofing, demonstrating the effectiveness of the proposed algorithm and model.
- Published
- 2024
6. Game-theoretic physical layer authentication for spoofing detection in internet of things
- Author
-
Yue Wu, Tao Jing, Qinghe Gao, Yingzhen Wu, and Yan Huo
- Subjects
IoT ,Game theory ,Physical layer authentication ,Nash equilibrium ,Spoofing detection ,Information technology ,T58.5-58.64 - Abstract
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
- Published
- 2024
- Full Text
- View/download PDF
7. Navigation spoofing interference detection based on Transformer model.
- Author
-
Niu, Ben, Zhuang, Xuebin, Lin, Zijian, and Zhang, Linjie
- Subjects
- *
TRANSFORMER models , *GLOBAL Positioning System , *GPS receivers , *SIGNAL detection , *SIGNALS & signaling - Abstract
Spoofed signal interference poses a serious threat to the security of Global Navigation Satellite Systems (GNSS). In order to effectively detect spoofing signals, this paper proposes a spoofing signal detection method based on the Transformer model in the signal capture phase. When a spoofed signal is added, the capture matrix of the receiver changes. The method takes the capture matrix near the relevant peak as the data set for training the Transformer model to improve the model's ability to recognize the features of the capture matrix, and then uses the trained model to identify the capture results and get the discriminative result of whether there is deception joining. Subsequently, the trained model is embedded into the navigation receiver, and the receiver configuration is modified so that it continuously performs signal capture over the whole data and detects spoofing signals on the capture results. The experimental results show that the spoofing signal detection method based on the Transformer model has a higher detection accuracy compared to other deep learning models. For data with different search steps, its detection accuracy can reach more than 95%. When the chip delay of the spoofed signal is greater than half a chip, the detection accuracy tends to be close to 100%. For online open-source spoofing datasets, the detection algorithm can still obtain excellent detection results. The spoofing signal detection technique based on the Transformer model is of great significance to improve the security and robustness of the navigation system and has the prospect of wide application. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Enhancing Voice Authentication with a Hybrid Deep Learning and Active Learning Approach for Deepfake Detection.
- Author
-
Ahmed, Ali Saadoon and Khaleel, Arshad M.
- Subjects
DEEP learning ,RANDOM forest algorithms ,DATABASES ,DYNAMIC models - Abstract
This paper explores the application of active learning to enhance machine learning classifiers for spoofing detection in automatic speaker verification (ASV) systems. Leveraging the ASVspoof 2019 database, we integrate an active learning framework with traditional machine learning workflows, specifically focusing on Random Forest (RF) and Multilayer Perceptron (MLP) classifiers. The active learning approach was implemented by initially training models on a small subset of data and iteratively selecting the most uncertain samples for further training, which allowed the classifiers to refine their predictions effectively. Experimental results demonstrate that while the MLP initially outperformed RF with an accuracy of 95.83% compared to 91%, the incorporation of active learning significantly improved RF's performance to 94%, narrowing the performance gap between the two models. After applying active learning, both classifiers showed enhanced precision, recall, and F1-scores, with improvements ranging from 3% to 5%. This study provides valuable insights into the role of active learning in boosting the efficiency of machine learning models for dynamic spoofing scenarios in ASV systems. Future research should focus on designing advanced active learning techniques and exploring their integration with other machine learning paradigms to further enhance ASV security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Leveraging machine learning for the detection of structured interference in Global Navigation Satellite Systems.
- Author
-
Nabi, Imtiaz, Farooq, Salma Zainab, Saeed, Sunnyaha, Irtaza, Syed Ali, Shehzad, Khurram, Arif, Mohammad, Khan, Inayat, and Ahmad, Shafiq
- Subjects
GLOBAL Positioning System ,RADIO interference ,RECEIVER operating characteristic curves ,SUPPORT vector machines ,K-nearest neighbor classification - Abstract
Radio frequency interference disrupts services offered by Global Navigation Satellite Systems (GNSS). Spoofing is the transmission of structured interference signals intended to deceive GNSS location and timing services. The identification of spoofing is vital, especially for safety-of-life aviation services, since the receiver is unaware of counterfeit signals. Although numerous spoofing detection and mitigation techniques have been developed, spoofing attacks are becoming more sophisticated, limiting most of these methods. This study explores the application of machine learning techniques for discerning authentic signals from counterfeit ones. The investigation particularly focuses on the secure code estimation and replay (SCER) spoofing attack, one of the most challenging type of spoofing attacks, ds8 scenario of the Texas Spoofing Test Battery (TEXBAT) dataset. The proposed framework uses tracking data from delay lock loop correlators as intrinsic features to train four distinct machine learning (ML) models: logistic regression, support vector machines (SVM) classifier, K-nearest neighbors (KNN), and decision tree. The models are trained employing a random six-fold cross-validation methodology. It can be observed that both logistic regression and SVM can detect spoofing with a mean F1-score of 94%. However, logistic regression provides 165dB gain in terms of time efficiency as compared to SVM and 3 better than decision tree-based classifier. These performance metrics as well as receiver operating characteristic curve analysis make logistic regression the desirable approach for identifying SCER structured interference. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation.
- Author
-
Wang, Lei, Chen, Lei, Li, Baiyu, Liu, Zhe, Li, Zongnan, and Lu, Zukun
- Subjects
GLOBAL Positioning System ,INERTIAL navigation systems ,MILITARY research - Abstract
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference. When combined with the inertial navigation system (INS), the GNSS/INS integrated navigation system offers distinct advantages in the field of anti-spoofing technology research, which has garnered significant attention in recent years. To summarize the current research achievements of GNSS/INS integrated navigation anti-spoofing technology, it is necessary to provide an overview of the three core technical aspects of spoofing attack principles and implementation strategies, spoofing detection, and spoofing mitigation. First, the principles and implementation strategies of spoofing interference attacks are introduced, and different classifications of spoofing interference attacks are given. Then, the performance characteristics and technical points of different spoofing detection and spoofing mitigation methods are compared and analyzed, and the shortcomings and challenges in the current development of GNSS/INS anti-spoofing technology are pointed out. Finally, based on the summary and shortcomings of the existing technology, a prospect for the future development of GNSS/INS integrated navigation anti-spoofing technology is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. AHBSMO-DRN: Single Device and Multiple Sharing-Based Geo-Position Spoofing Detection in Instant Messaging Platform.
- Author
-
Koparde, Shweta and Mane, Vanita
- Subjects
DISCRETE cosine transforms ,INSTANT messaging ,GEOGRAPHICAL positions ,GEOTAGGING ,STATISTICAL correlation - Abstract
In recent years, location check-in on mobile components is a trending topic over social media. At the same time, hackers grasp the geographical position (geo-position) data that destruct the security of users. Hence, it is crucial to detect the originality of geo-position. A plethora of methods have been developed for geo-position spoofing identification that depends on geo-position data. Nonetheless, such techniques are incapable in terms of missing prior data or insufficient of large samples. To counterpart this issue, an effective model is invented to detect spoofing activity by Adaptive Honey Badger Spider Monkey Optimization_Deep residual Network (AHBSMO-based DRN). Here, neuro camera footprint refining is performed using Neuro Fuzzy filter and extracted footprint image obtained while considering the input and spoofed image are fused using Pearson correlation coefficient. Meanwhile, geo-tagged value of input image and spoofed image is also fused based on same Pearson coefficient. Finally, fusion is performed and then, spoofing detection is accomplished by comparing the Discrete Cosine Transform (DCT) foot print of two images to find if the input image is spoofed or not. Moreover, AHBSMO-based DRN model has gained outstanding outcomes in regard of accuracy of 0.921, True Positive Rate (TPR) 0 of 0.911, and False Positive Rate (FPR) of 0.136. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. BDS time spoofing detection method based on the dynamic time warping.
- Author
-
Chen, Zhengkun, Liu, Yang, Li, Jing, Xie, Ting, Yuan, Xuelin, and Zhu, Xiangwei
- Abstract
The radio navigation satellite system (RNSS) timing has been widely used in crucial power systems. However, the problem of RNSS service vulnerability to interference and spoofing significantly affects its application. The phasor measurement unit can effectively detect timing spoofing that exceeds the maximum allowable error, but there has been less research on small-offset timing spoofing. We propose a joint timing spoofing detection method of the radio determination satellite system (RDSS) and RNSS in BDS for small-offset timing spoofing. The RDSS service uses an authentication mechanism in the master station, making it challenging to be spoofed, and it has the same time and space references as the RNSS service. We obtain the RNSS and RDSS timing signal counts and performs dynamic time wrapping to measure the similarity metric of two-time series as a detection quantity. Then, the proposed method is verified by actual experiments. The experiment results show that the detection probability of the RDSS-assisted method is significantly higher than that of the method only using the RNSS variance. The detection probability of the proposed method can reach 90% at a false alarm probability of 0.1, which verifies the accuracy and reliability of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis.
- Author
-
Ji, Ning, Rao, Yongnan, Wang, Xue, and Zou, Decai
- Subjects
- *
GLOBAL Positioning System , *MONTE Carlo method , *CORRELATORS - Abstract
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures. In response, a novel spoofing detection method entitled aggregated correlation residue likelihood analysis (A-CoRLiAn) is proposed in this study. Requiring only the addition of a pair of supplementary correlators, A-CoRLiAn harnesses correlation residues to formulate a likelihood metric, subsequently aggregating weighted decisions from all tracked satellites to ascertain the presence of spoofing. Evaluated under six diverse spoofing scenarios (including emerging challenges) in the Texas Spoofing Test Battery (TEXBAT) via Monte Carlo simulations, A-CoRLiAn yields a detection rate of 99.71%, demonstrating sensitivity, robustness, autonomy, and a lightweight architecture conducive to real-time implementation against spoofing threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Leveraging machine learning for the detection of structured interference in Global Navigation Satellite Systems
- Author
-
Imtiaz Nabi, Salma Zainab Farooq, Sunnyaha Saeed, Syed Ali Irtaza, Khurram Shehzad, Mohammad Arif, Inayat Khan, and Shafiq Ahmad
- Subjects
Global positioning system ,GNSS spoofing ,Spoofing detection ,Signal quality monitoring ,GNSS security ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Radio frequency interference disrupts services offered by Global Navigation Satellite Systems (GNSS). Spoofing is the transmission of structured interference signals intended to deceive GNSS location and timing services. The identification of spoofing is vital, especially for safety-of-life aviation services, since the receiver is unaware of counterfeit signals. Although numerous spoofing detection and mitigation techniques have been developed, spoofing attacks are becoming more sophisticated, limiting most of these methods. This study explores the application of machine learning techniques for discerning authentic signals from counterfeit ones. The investigation particularly focuses on the secure code estimation and replay (SCER) spoofing attack, one of the most challenging type of spoofing attacks, ds8 scenario of the Texas Spoofing Test Battery (TEXBAT) dataset. The proposed framework uses tracking data from delay lock loop correlators as intrinsic features to train four distinct machine learning (ML) models: logistic regression, support vector machines (SVM) classifier, K-nearest neighbors (KNN), and decision tree. The models are trained employing a random six-fold cross-validation methodology. It can be observed that both logistic regression and SVM can detect spoofing with a mean F1-score of 94%. However, logistic regression provides 165dB gain in terms of time efficiency as compared to SVM and 3 better than decision tree-based classifier. These performance metrics as well as receiver operating characteristic curve analysis make logistic regression the desirable approach for identifying SCER structured interference.
- Published
- 2024
- Full Text
- View/download PDF
15. Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation
- Author
-
Lei Wang, Lei Chen, Baiyu Li, Zhe Liu, Zongnan Li, and Zukun Lu
- Subjects
anti-spoofing ,GNSS/INS integrated navigation ,spoofing interference ,spoofing detection ,spoofing mitigation ,Physics ,QC1-999 - Abstract
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference. When combined with the inertial navigation system (INS), the GNSS/INS integrated navigation system offers distinct advantages in the field of anti-spoofing technology research, which has garnered significant attention in recent years. To summarize the current research achievements of GNSS/INS integrated navigation anti-spoofing technology, it is necessary to provide an overview of the three core technical aspects of spoofing attack principles and implementation strategies, spoofing detection, and spoofing mitigation. First, the principles and implementation strategies of spoofing interference attacks are introduced, and different classifications of spoofing interference attacks are given. Then, the performance characteristics and technical points of different spoofing detection and spoofing mitigation methods are compared and analyzed, and the shortcomings and challenges in the current development of GNSS/INS anti-spoofing technology are pointed out. Finally, based on the summary and shortcomings of the existing technology, a prospect for the future development of GNSS/INS integrated navigation anti-spoofing technology is discussed.
- Published
- 2024
- Full Text
- View/download PDF
16. Detecting GNSS spoofing using deep learning
- Author
-
Borhani-Darian, Parisa, Li, Haoqing, Wu, Peng, and Closas, Pau
- Published
- 2024
- Full Text
- View/download PDF
17. Machine Learning-Based PHY-Authentication Without Prior Attacker Information for Wireless Multiple Access Channels.
- Author
-
Altun, Ufuk and Basar, Ertugrul
- Subjects
DEEP learning ,MACHINING ,TRANSMITTERS (Communication) ,MACHINERY ,COMPUTER simulation ,COMMUNICATION models ,MACHINE learning - Abstract
Physical layer (PHY) authentication methods provide spatial security by exploiting the unique channel between two users. In recent years, many studies focused on substituting traditional threshold-based detection mechanisms with machine/deep learning classifiers to solve the threshold selection problem and obtain better detection accuracy. However, these studies assume that receivers have access to spoofer's channel information at the training of the classifier, which is unrealistic for real-time scenarios. In this study, we propose a PHY-authentication architecture for wireless multiple access channels (W-MACs) that removes this assumption and works without any prior information about the spoofer. The proposed method is designed for multi-user systems and is suitable for any classifier model or communication protocol. The feasibility and the performance of the proposed method are investigated via computer simulations and compared with a benchmark model. The results proved the feasibility of the proposed method as it can detect spoofers successfully without requiring spoofers' channel information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. A Real-Time Spoofing Detection Method Using Three Low-Cost Antennas in Satellite Navigation.
- Author
-
Chen, Jiajia, Wang, Xueying, Fang, Zhibo, Jiang, Cheng, Gao, Ming, and Xu, Ying
- Subjects
ANTENNAS (Electronics) ,GLOBAL Positioning System ,ARTIFICIAL satellites in navigation ,SIGNAL detection ,STATISTICAL models ,SUM of squares - Abstract
The vulnerability of civil receivers of the Global Satellite Navigation System (GNSS) to spoofing jamming has raised significant concerns in recent times. Traditional multi-antenna spoofing detection methods are limited in application scenarios and come with high hardware costs. To address this issue, this paper proposes a novel GNSS spoofing detection method utilizing three low-cost collinear antennas. By leveraging the collinearity information of the antennas, this method effectively constrains the observation equation, leading to improved estimation accuracy of the pointing vector. Furthermore, by employing a binary statistical detection model based on the sum of squares (SSE) between the observed value and the estimated value of the pointing vector, real-time spoofing signal detection is enabled. Simulation results confirm the efficacy of the proposed statistical model, with the error of the skewness coefficient not exceeding 0.026. Experimental results further demonstrate that the collinear antenna-based method reduces the standard deviation of the angle deviation of the pointing vector by over 55.62% in the presence of spoofing signals. Moreover, the experiments indicate that with a 1 m baseline, this method achieves 100% spoofing detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Generalized Likelihood Ratio Satellite Navigation Spoofing Detection Algorithm Based on Moving Variance
- Author
-
Pingping Qu, Tianfeng Liu, Tengli Yu, Ershen Wang, Song Xu, and Zibo Yuan
- Subjects
Satellite navigation ,moving variance ,generalized likelihood ratio test ,spoofing detection ,pseudo-range ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing limits their widespread use in military security and national economy. Therefore, fast and accurate detection of GNSS spoofing is of great significance. When spoofing cannot be accurately detected in the capture tracking phase, spoofing detection needs to be performed again at the localization solver. In order to detect the spoofing jamming of Global Navigation Satellite System in pseudo-range measurements, a generalized likelihood ratio satellite navigation spoofing detection algorithm based on moving variance is proposed by analyzing the pseudo-ranges cleared by the positioning of global satellite navigation signals. A new data subset is created by calculating the variance of the pseudo-range of different satellites at the same time and moving it forward. The variance is calculated again by this data subset to obtain the moving variance, the generalized likelihood ratio detection model is used to calculate the detection statistics of the pseudo-range movement variance, the detection statistic is then compared to the detection threshold under the condition that the probability of false alarm is $1\times 10 ^{-7}$ , so as to realize the spoofing jamming detection of global satellite navigation receiver for pseudo-range. Taking the software receiver as the experimental platform, the effectiveness of the proposed algorithm is verified by comparing it with two other algorithms. The result show that when the number of spoofed satellites is less than 9, the algorithm has a good detection effect. When the false alarm rate is $1\times 10 ^{-7}$ , the average prediction accuracy rate is kept above 98 %.
- Published
- 2024
- Full Text
- View/download PDF
20. An effective facial spoofing detection approach based on weighted deep ensemble learning.
- Author
-
Sabri, My Abdelouahed, Ennouni, Assia, and Aarab, Abdellah
- Abstract
Deep learning has seen successful implementation in various domains, such as natural language processing, image classification, and object detection in recent times. In the field of biometrics, deep learning has also been used to develop effective anti-spoofing systems. Facial spoofing, the act of presenting fake facial information to deceive a biometric system, poses a significant threat to the security of face recognition systems. To address this challenge, we propose, in this paper, an effective and robust facial spoofing detection approach based on weighted deep ensemble learning. Our method combines the strengths of two powerful deep learning architectures, DenseNet201 and MiniVGG. The choice of these two architectures is based on a comparative study between DenseNet201, DenseNet169, VGG16, MiniVGG, and ResNet50, where DenseNet201 and MiniVGG obtained the best recall and precision scores, respectively. Our proposed weighted voting ensemble leverages each architecture-specific capabilities to make the final prediction. We assign weights to each classification model based on its performance, which are determined by a mathematical formulation considering the trade-off between recall and precision. To validate the effectiveness of our proposed approach, we evaluate it on the challenging ROSE-Youtu face liveness detection dataset. Our experimental results demonstrate that our proposed method achieves an impressive accuracy rate of 99% in accurately detecting facial spoofing attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Rapid detection of GNSS time synchronization attacks via the enhanced code and carrier Doppler consistency test.
- Author
-
Feng, Fan, Chen, Zhengkun, Chen, Longjiang, and Zhu, Xiangwei
- Abstract
Many critical infrastructures, such as smart grids, communication systems, and industrial networks, rely on the global navigation satellite system (GNSS) to ensure accurate time synchronization. However, the vulnerability of GNSS receivers to time synchronization attacks (TSAs) poses a significant threat to these infrastructures, potentially leading to severe consequences. Thus, it is imperative to promptly detect TSAs before they have an impact. We propose a method called the enhanced code and carrier Doppler consistency test (E-CCDCT) to address this issue. The proposed method monitors the consistency between the code Doppler shift and carrier Doppler shift to rapidly detect any inconsistency between them caused by a TSA. An additional advantage of E-CCDCT is its ability to provide early warning if a TSA signal attempts phase alignment before spoofing. Experiments for comparison with off-the-shelf TSA detection techniques were conducted using the Texas Spoofing Test Battery datasets. The results confirm that the proposed method exhibits superior detection speed compared to other methods. Furthermore, the proposed method achieves a detection probability of at least 90% at a false alarm rate of 0.1%. Consequently, this method offers exceptional efficiency and accuracy and can serve as a valuable complement to existing TSA detection techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Stochastic Reachability-Based GPS Spoofing Detection with Chimera Signal Enhancement.
- Author
-
Mina, Tara, Kanhere, Ashwin, Kousik, Shreyas, and Gao, Grace
- Subjects
- *
SIGNAL detection , *GLOBAL Positioning System , *MONTE Carlo method , *MEASUREMENT errors , *BOUND states , *UNITS of measurement - Abstract
To protect civilian global positioning system (GPS) users from spoofing attacks, the U.S. Air Force Research Lab has proposed the chips-message robust authentication (Chimera) enhancement for the L1C signal. In particular, the Chimera fast channel allows users to authenticate the received GPS signal once every 1.5 or 6 s, depending on the out-of-band source utilized for receiving the fast channel marker keys. However, for many moving receiver applications, receivers often use much higher GPS measurement rates, at 5-20 Hz. In this work, we derive a stochastic reachability (SR)-based detector to perform continuous GPS signal verification and state estimation between Chimera authentications. Our SR detector validates the received GPS measurement against any self-contained sensor, such as an inertial measurement unit, in the presence of bounded biases in the sensor error distributions. We demonstrate via Monte Carlo simulations that our detector satisfies a user-defined false alarm requirement during nominal conditions, while successfully detecting a simulated spoofing attack. We further demonstrate that our SR state estimation filter successfully bounds the true state during both authentic and spoofed conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
23. Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems.
- Author
-
Zharkov, Maksim, Veremeenko, Konstantin, Kuznetsov, Ivan, and Pronkin, Andrei
- Subjects
GLOBAL Positioning System ,INERTIAL navigation systems ,HARDWARE-in-the-loop simulation ,ANTENNAS (Electronics) ,ARTIFICIAL satellites in navigation - Abstract
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, the most dangerous interference is the so-called spoofing. Simultaneously, in most cases of GNSS use, an inertial navigation system (INS) or an attitude and heading reference system (AHRS) is also present on the board of mobile objects. In this regard, the research goal is to assess the possibility of detecting GNSS spoofing in inertial satellite navigation systems. This paper examines the method for detecting GNSS spoofing by combining a pair of commercially available GNSS receivers and antennas with an INS or AHRS. The method is based on a comparison of the double differences of GNSS carrier phase measurements performed by receivers under conditions of resolved integer ambiguity and the values of the range double differences predicted using an INS. GNSS carrier phase integer ambiguity can be resolved using a strapdown inertial navigation system (SINS) or AHRS data. The mathematical model of GNSS phase difference measurements and the SINS-predicted satellite range differences model are given. The proposed algorithm calculates the moving average of the residuals between the SINS-predicted satellite range double differences and the measured GNSS carrier phase double differences. The primary criterion for spoofing detection is the specified threshold excess of the moving average of the double difference residuals. Experimental studies are performed using simulation and hardware-in-the-loop simulation. The experimental results allow us to evaluate the efficiency of the proposed approach and estimate the potential characteristics of the spoofing detection algorithm based on it. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
24. GNSS Spoofing Detection Using Q Channel Energy.
- Author
-
Wang, Jiaqi, Tang, Xiaomei, Ma, Pengcheng, Wu, Jian, Ma, Chunjiang, and Sun, Guangfu
- Subjects
- *
GLOBAL Positioning System - Abstract
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the quadrature (Q) channel correlators. The detailed principle of this detection method is introduced based on the received signal model under spoofing attack. The normalization parameter used in this method was the estimation of the noise floor. The performance of the proposed Q energy detector is validated through simulations, the Texas Spoofing Test Battery dataset and field tests. The results demonstrate that the proposed detector significantly enhances detection performance compared to signal quality monitoring methods, particularly in overpowered scenarios and dynamic scenarios. By increasing the detection probability in the presence of spoofing signals and decreasing the false alarm probability in the absence of spoofing signals, the proposed detector can better meet the requirements of practical applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
25. Experimental Case Study of Self-Supervised Learning for Voice Spoofing Detection
- Author
-
Yerin Lee, Narin Kim, Jaehong Jeong, and Il-Youp Kwak
- Subjects
Spoofing detection ,self-supervised learning ,contrastive learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This study aims to improve the performance of voice spoofing attack detection through self-supervised pre-training. Supervised learning needs appropriate input variables and corresponding labels for constructing the machine learning models that are to be applied. It is necessary to secure a large number of labeled datasets to improve the performance of supervised learning processes. However, labeling requires substantial inputs of time and effort. One of the methods for managing this requirement is self-supervised learning, which uses pseudo-labeling without the necessity for substantial human input. This study experimented with contrastive learning, a well-performing self-supervised learning approach, to construct a voice spoofing detection model. We applied MoCo’s dynamic dictionary, SimCLR’s symmetric loss, and COLA’s bilinear similarity in our contrastive learning framework. Our model was trained using VoxCeleb data and voice data extracted from YouTube videos. Our self-supervised model improved the performance of the baseline model from 6.93% to 5.26% for a logical access (LA) scenario and improved the performance of the baseline model from 0.60% to 0.40% for a physical access (PA) scenario. In the case of PA, the best performance was achieved when random crop augmentation was applied, and in the case of LA, the best performance was obtained when random crop and random shifting augmentations were considered.
- Published
- 2023
- Full Text
- View/download PDF
26. Detection and Orientation of GNSS Spoofing Based on Positioning Solutions of Three Receivers
- Author
-
Shimiao Chen, Shuyan Ni, Lingfeng Cheng, Tuofeng Lei, Zhuoya Jia, and Qiwei Fu
- Subjects
Spoofing detection ,spoofing orientation ,positioning solutions ,clock offset ,interacting multiple model ,volume Kalman filter ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Spoofing poses a serious security threat to the satellite navigation system. Most of the current spoofing detection methods are based on the information in the receiver-solving process. Applying the above spoofing detection algorithm on the receiver requires a redesign of the original receiver, which limits the application of the deceptive detection method on the ex-factory receiver. In the case of single-station spoofing, the positions of the successfully spoofed multiple receivers are the same according to the deception signal, but the clock offset is different. The single-difference clock offset is positively correlated with the distance between the two receivers. Based on the above principles, this paper proposes a spoofing detection and spoofing direction method based on the positioning solutions of three receivers. The observation value of the baseline length is calculated from the position information in the positioning solution, and spoofing detection is realized by hypothesis testing. The clocks of the three receivers are synchronized. The Adaptive Delta Gradient Descent(ADGD) method is adopted to calculate the spoofing direction according to the single-difference clock offset in the positioning solution. The direction angle is optimized through the Interacting Multiple Model based on the volume Kalman Filter. The relationship between several parameters and the direction accuracy of spoofing is analyzed through simulation tests. Experimental results show that this method can effectively detect and orient spoofing. In addition, the detection and orientation method of spoofing has the advantage of fast response speed, which can realize fast spoofing detection and direction finding in a deception environment.
- Published
- 2023
- Full Text
- View/download PDF
27. Geo-Tagged Spoofing Detection using Jaccard Similarity
- Author
-
Shweta Koparde and Vanita Mane
- Subjects
Spoofing detection ,Dicerete Cosine Transform ,Tanimoto similarity ,Fuzzy filter ,Science ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In recent years, position evaluation of mobile devices has developed as an essential part of social movement. Meantime, the criminals may interfere with the information of geographical position (geo-position), and they can adjust the geo-position for their convenience. Therefore, it is important to identify the authenticity of geo-position. In this paper, an instant messaging platform-based geo-tagged spoof image detection system is created using Jaccard similarity. With the help of a Fuzzy filter, the input, as well as spoofing images, are subjected to camera footprint extraction, and their corresponding outputs are fused by Dice Coefficient. Moreover, the input as well as spoofed images is subjected to geotagged process, and their corresponding geotagged input, and geotagged spoofed images are fused by Tanimoto similarity. At last, the fused images from Dice Coefficient, and Tanimoto similarity are employed for the spoof detection process, where the Jaccard similarity compares the two images using Dicerete Cosine Transform (DCT). Consequently, the spoofed images are detected, and their effectiveness is measured in terms of accuracy, False Positive Rate (FPR), and True Positive Rate (TPR), as well as the corresponding values are attained like 0.099, 0.892, and 0.896 respectively.
- Published
- 2023
- Full Text
- View/download PDF
28. Noise-Robust Spoofed Speech Detection Using Discriminative Autoencoder.
- Author
-
Dişken, Gökay and Tüfekçi, Zekeriya
- Subjects
VECTORS (Calculus) ,SIGNAL-to-noise ratio ,DEEP learning ,MACHINE learning ,ARTIFICIAL neural networks - Abstract
Audio spoof detection gained the attention of the researchers recently, as it is vital to detect spoofed speech for automatic speaker recognition systems. Publicly available datasets also accelerated the studies in this area. Many different features and classifiers have been proposed to overcome the spoofed speech detection problem, and some of them achieved considerably high performances. However, under additive noise, the spoof detection performance drops rapidly. On the other hand, the number of studies about robust spoofed speech detection is very limited. The problem becomes more interesting as the conventional speech enhancement methods reportedly performed worse than no enhancement. In this work, i-vectors are used for spoof detection, and discriminative denoising autoencoder (DAE) network is used to obtain enhanced (clean) i-vectors from their noisy counterparts. Once the enhanced i-vectors are obtained, they can be treated as normal i-vectors and can be scored/classified without any modifications in the classifier part. Data from ASVspoof 2015 challenge is used with five different additive noise types, following a similar configuration of previous studies. The DAE is trained in a multicondition manner, using both clean and corrupted i-vectors. Three different noise types at various signal-to-noise ratios are used to create corrupted i-vectors, and two different noise types are used only in the test stage to simulate unknown noise conditions. Experimental results showed that the proposed DAE approach is more effective than the conventional speech enhancement methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
29. A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components.
- Author
-
Mao, Pengrui, Yuan, Hong, Chen, Xiao, Gong, Yingkui, Li, Shuhui, Li, Ran, Luo, Ruidan, Zhao, Guangyao, Fu, Chengang, and Xu, Jiajia
- Subjects
- *
ANTENNAS (Electronics) - Abstract
The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the user. GNSS spoofing signals are difficult to carry out spoofing attacks in the direction of arrival (DOA) of the real signal, so the spoofing detection method based on DOA is very effective. On the basis of identifying spoofing signals, accurate DOA information of the signal can be further used to locate the spoofer. At present, the existing DOA monitoring methods for spoofing signals are mainly based on dedicated antenna arrays and receivers, which are costly and difficult to upgrade and are not conducive to large-scale deployment, upgrade, and maintenance. This paper proposes a spoofing detection and direction-finding method based on a low-cost commercial GNSS board component (including an antenna). Based on the traditional principle of using a multi-antenna carrier phase to solve DOA, this paper innovatively solves the following problems: the poor direction-finding accuracy caused by the unstable phase center of low-cost commercial antennas, the low success rate of spoofing detection in a multipath environment, and the inconsistent sampling time among multiple low-cost commercial GNSS boards. Moreover, the corresponding prototype equipment for spoofing detection and direction-finding is developed. The measured results show that it can effectively detect spoofing signals in open environments. Under a certain false alarm rate, the detection success rate can reach 100%, and the typical direction-finding accuracy can reach 5 ° . [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
30. GNSS spoofing detection based on multicorrelator distortion monitoring.
- Author
-
Shang, Xiangyong, Sun, Fuping, Wang, Daming, Xiao, Kai, Dou, Sai, Lu, Xiuwei, and Sun, Ji
- Abstract
Spoofing attacks have become one of the main threats in global navigation satellite system receiver applications. The maximum likelihood (ML) distortion monitoring, which is a kind of signal quality monitoring (SQM) algorithm, shows good performance in spoofing detection. It employs a multicorrelator structure to measure the correlation peak, and the ML fit residual is derived for spoofing detection. However, ML distortion monitoring requires complex computation and precise code phase search. In this study, we propose a new multicorrelator distortion monitoring algorithm, which omits the process of ML estimation and code phase search. The fit residuals can be directly calculated using the multicorrelator output, achieving better performance than the conventional SQM metrics. Rao test was derived for the modeling of the spoofing detection algorithm, and the detection performance was analyzed mathematically. We employed the Texas Spoofing Test Battery spoofing datasets to evaluate the performance. Experiment results show that the average detection probability is 94.31% at a false alarm rate of 0.01%. The computation of the proposed algorithm is uncomplicated, but needs additional correlator resources. It shows better robustness and detection rate than the previous SQM algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
31. GNSS spoofing detection based on frequency domain processing.
- Author
-
Li, Song, Tang, Xiaomei, Lin, Honglei, and Wang, Feixue
- Subjects
- *
GLOBAL Positioning System , *SOFTWARE upgrades , *FALSE alarms , *CORRELATORS , *TIME management - Abstract
Global Navigation Satellite System (GNSS) spoofing detection has attracted much attention in recent years to ensure security. However, most of the existing methods use the time domain feature and can be easily affected by interference, which limits the practical application. To solve this problem, the frequency domain processing approach is investigated and a novel spoofing detection method is proposed. The basic idea is to exploit the spoofing-induced feature by transforming the correlator output into the frequency domain. The proposed method has a simple implementation logic and requires only minor software upgrades to existing GNSS receivers. Simulation and experimental results are presented to verify the effectiveness of the proposed method. The results demonstrate that it exhibits superior detection performance and shows robustness to interference. Consequently, this method has great application value and can serve as a valuable complement to current detection methods. • Theoretical analysis of intermediate GNSS spoofing effect on carrier tracking presented. • Spoofing-induced feature exploited by frequency domain processing technique. • Detection threshold analytically derived from constant false alarm rate criterion. • Effectiveness and robustness of spoofing detection verified under interference scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
32. PULMO: Precise utterance-level modeling for speech anti-spoofing.
- Author
-
Yoon, Sunghyun
- Subjects
- *
CONVOLUTIONAL neural networks , *PARALLEL processing , *ERROR rates - Abstract
In recent years, most state-of-the-art approaches for spoofed speech detection have been based on convolutional neural networks (CNNs). Most neural networks, including CNNs, are trained in minibatch units, where all input data in each minibatch must have the same shape. Therefore, for minibatch training, each utterance is first either padded or truncated because utterances are variable-length sequences and thus cannot be directly fed into networks in minibatch units. However, modeling either a padded or truncated utterance, rather than the original one, makes it unfeasible to capture the entire context as is: padding could propagate even unwanted information, like artifacts, in the original utterance, and truncation inevitably loses some information. With these information distortions, model could get stuck in a suboptimal solution. To fill this gap, we proposeÚ a method for precise utterance-level modeling that enables minibatch-wise utterance-level modeling of variable-length utterances while minimizing the information distortions. The proposed method comprises sequence segmentation followed by segment aggregation. Sequence segmentation feeds variable-length utterances in the minibatch unit by decomposing each of them into fixed-length segments, which enables parallel processing of variable-length utterances without the uncertainty in input length. Segment aggregation plays a role in aggregating the segment embeddings by utterance to encode the entire information of each utterance. The experimental results of the evaluation trials of ASVspoof 2019 and 2021 indicate that the proposed method shows up to 84.9 % and 97.6 % relative equal error rate reductions on logical and physical access scenarios, respectively. Furthermore, the proposed method reduced the FLOPs for an epoch by 6 %. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
33. Spoofed Speech Detection with Weighted Phase Features and Convolutional Networks
- Author
-
Gökay Dişken
- Subjects
spoofing detection ,cosine normalized cepstrum ,convolutional neural networks ,Acoustics. Sound ,QC221-246 - Abstract
Detection of audio spoofing attacks has become vital for automatic speaker verification systems. Spoofing attacks can be obtained with several ways, such as speech synthesis, voice conversion, replay, and mimicry. Extracting discriminative features from speech data can improve the accuracy of detecting these attacks. In fact, a frame-wise weighted magnitude spectrum is found to be effective to detect replay attacks recently. In this work, discriminative features are obtained in a similar fashion (frame-wise weighting), however, a cosine normalized phase spectrum is used since phase-based features have shown decent performance for the given task. The extracted features are then fed to a convolutional neural network as input. In the experiments ASVspoof 2015 and 2017 databases are used to investigate the proposed system’s spoof detection performance for both synthetic and replay attacks, respectively. The results showed that the proposed approach achieved 34.5% relative decrease in the average EER for ASVspoof 2015 evaluation set, compared to the ordinary cosine normalized phase features. Furthermore, the proposed system outperformed the others at detecting S10 attack type of ASVspoof 2015 database.
- Published
- 2022
- Full Text
- View/download PDF
34. Identify spoofing attacks in Internet of Things (IoT) environments using machine learning algorithms.
- Author
-
Vajrobol, Vajratiya, Saxena, Geetika Jain, Pundir, Amit, Singh, Sanjeev, B. Gupta, Brij, Gaurav, Akshat, and Rahaman, Mosiur
- Subjects
- *
COMPUTER network traffic , *INTERNET protocol address , *RANDOM forest algorithms , *MACHINE learning , *INTERNET of things - Abstract
With the growing adoption of Internet of Things (IoT) devices, security concerns are becoming increasingly urgent. Protecting IoT systems from cyberattacks is crucial to safeguard sensitive information. Spoofing, particularly Domain Name System (DNS) and Address Resolution Protocol (ARP) spoofing, is a type of attack that can manipulate network traffic and compromise data integrity.
DNS spoofing redirects users to fraudulent websites by altering domain name resolutions, whileARP spoofing tricks the network by associating a legitimate internet protocol address with a malicious MAC address, allowing attackers to intercept or modify communication. This study aims to develop an efficient method for detecting these types of spoofing attacks in IoT environments using machine learning techniques. The results show that the random forest algorithm outperforms other models, achieving remarkable performance with a 95.1% accuracy, a precision score of 95.2%, and a strong F1 score of 95.1%. A key contribution of this research is the simultaneous detection of both DNS and ARP spoofing within a unified framework, utilizing a comprehensive set of 46 features. These findings underscore the importance of ensuring robust protection against spoofing attacks to maintain the security and integrity of IoT systems. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
35. Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems
- Author
-
Maksim Zharkov, Konstantin Veremeenko, Ivan Kuznetsov, and Andrei Pronkin
- Subjects
global navigation satellite systems ,spoofing detection ,inertial navigation systems ,Engineering machinery, tools, and implements ,TA213-215 ,Technological innovations. Automation ,HD45-45.2 - Abstract
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, the most dangerous interference is the so-called spoofing. Simultaneously, in most cases of GNSS use, an inertial navigation system (INS) or an attitude and heading reference system (AHRS) is also present on the board of mobile objects. In this regard, the research goal is to assess the possibility of detecting GNSS spoofing in inertial satellite navigation systems. This paper examines the method for detecting GNSS spoofing by combining a pair of commercially available GNSS receivers and antennas with an INS or AHRS. The method is based on a comparison of the double differences of GNSS carrier phase measurements performed by receivers under conditions of resolved integer ambiguity and the values of the range double differences predicted using an INS. GNSS carrier phase integer ambiguity can be resolved using a strapdown inertial navigation system (SINS) or AHRS data. The mathematical model of GNSS phase difference measurements and the SINS-predicted satellite range differences model are given. The proposed algorithm calculates the moving average of the residuals between the SINS-predicted satellite range double differences and the measured GNSS carrier phase double differences. The primary criterion for spoofing detection is the specified threshold excess of the moving average of the double difference residuals. Experimental studies are performed using simulation and hardware-in-the-loop simulation. The experimental results allow us to evaluate the efficiency of the proposed approach and estimate the potential characteristics of the spoofing detection algorithm based on it.
- Published
- 2023
- Full Text
- View/download PDF
36. An intelligent recognition framework of access control system with anti-spoofing function
- Author
-
Dongzhihan Wang, Guijin Ma, and Xiaorui Liu
- Subjects
face recognition ,mask detection ,spoofing detection ,face authentication ,Mathematics ,QA1-939 - Abstract
Under the background that Covid-19 is spreading across the world, the lifestyle of people has to confront a series of changes and challenges. This also presents new problems and requirements to automation facilities. For example, nowadays masks have almost become necessities for people in public places. However, most access control systems (ACS) cannot recognize people wearing masks and authenticate their identities to deal with increasingly serious epidemic pressure. Consequently, many public entries have turned to an attendant mode that brings low efficiency, infection potential, and high possibility of negligence. In this paper, a new security classification framework based on face recognition is proposed. This framework uses mask detection algorithm and face authentication algorithm with anti-spoofing function. In order to evaluate the performance of the framework, this paper employs the Chinese Academy of Science Institute of Automation-Face Anti-spoofing Datasets (CASIA-FASD) and Reply-Attack datasets as benchmarks. Performance evaluation indicates that the Half Total Error Rate (HTER) is 9.7%, the Equal Error Rate (EER) is 5.5%. The average process time of a single frame is 0.12 seconds. The results demonstrate that this framework has a high anti-spoofing capability and can be employed on the embedded system to complete the mask detection and face authentication task in real-time.
- Published
- 2022
- Full Text
- View/download PDF
37. A Coprime Array-Based Technique for Spoofing Detection and DOA Estimation in GNSS.
- Author
-
Zhao, Yuqing, Shen, Feng, Xu, Dingjie, and Meng, Zhen
- Abstract
In this article, we propose a coprime array-based technique that enables global navigation satellite system (GNSS) receivers to reliably defend against spoofing attacks with a small time offset. The technique can not only detect spoofing, but also provide the direction of arrival (DOA) of the spoofing source. Our approach is implemented on the raw digital baseband signals, hence it does not need to perform the complex despreading and acquisition stage of the GNSS receiver. Crucially, the detector is still available when the number of signals (including spoofing and satellite signals) is more than the number of array elements. The simulation results demonstrate the effectiveness of the proposed technique in terms of DOA estimation and spoofing detection. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
38. GNSS Spoofing Detection and Mitigation in Multireceiver Configuration via Tracklets and Spoofer Localization
- Author
-
Bethi Pardhasaradhi, Gunnery Srinath, G. S. Vandana, Pathipati Srihari, and P. Aparna
- Subjects
GNSS intentional interference ,spoofer localization ,spoofing detection ,GLRT ,bearings only localization ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Global navigation satellite systems (GNSS) sensors estimate its position, velocity, and time (PVT) using pseudorange measurements. When there is no interference, the pseudoranges are due to authentic satellites, and the bearings is distinguishable. Whereas, in the presence of any intentional interference source like spoofer, the pseudorange measurements owing to spurious signals and all the bearings from the same direction. These spurious attacks yield either no position or falsified position to the GNSS receiver. This paper proposes to install multiple GNSS receivers on a vehicle (assumed to be cooperative) to detect and mitigate the spoofing attack. While installing multiple GNSS receivers, we assume that each GNSS receiver’s relative position vector (RPV) is assumed to be known to other GNSS receivers. The installed GNSS receivers use the extended Kalman filter (EKF) framework to estimate their PVT. We proposed to calculate the equivalent-measurement and equivalent-measurement covariance of each GNSS receiver in the Cartesian coordinates in the tracklet framework. These tracklets are translated to the vehicle center using RPV to obtain translated-tracklets. The translated tracklet based generalized likelihood ratio test (GLRT) is derived to detect the spoofing attack at a given epoch. In addition to that, these translated-tracklets are processed in a batch least square (LS) framework to obtain the vehicle position. Once the attack is detected at a specific epoch, it quantifies that the position information is false. Moreover, another spoofing test is also formulated using DOA of signals. Once both the tests confirm the spoofing attack, the spoofer localization is performed using pseudo-updated states of GNSS receivers and acquired bearings in the iterative least-squares (ILS) framework. Mitigation of spoofing attack can be achieved either by projecting a null beam in the direction of the spoofer or by launching a counter-attack on the spoofer. The simulation results demonstrate that the proposed algorithm detects spoofing attacks and ensures continuity in the navigation track. As the number of satellite signals increases, the algorithms provide better position root mean square error (PRMSE) for GNSS receivers track, vehicle track, and spoofer localization.
- Published
- 2022
- Full Text
- View/download PDF
39. Tightly Coupled GNSS/INS Integration Spoofing Detection Algorithm Based on Innovation Rate Optimization and Robust Estimation
- Author
-
Ye Ke, Zhiwei Lv, Chao Zhang, Xu Deng, Wenlong Zhou, and Debiao Song
- Subjects
Innovation rate optimization ,robust estimation ,spoofing detection ,tightly coupled GNSS/INS integration ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The spoofing detection algorithm for a global navigation satellite system/inertial navigation system (GNSS/INS) integrated navigation system based on the innovation rate and robust estimation has limitations such as extensive or invalid detection times, high missed detection rates, and false alarm rates. This study addresses these limitations by proposing a tightly coupled GNSS/INS integration spoofing detection algorithm based on innovation rate optimization and robust estimation. The proposed algorithm improved the normalized innovation of a small step or slow-growing ramp, thereby optimizing its innovation rate test statistics. The proposed approach also reduces the spoofing effect on the innovation rate by adaptively adjusting a gain matrix using robust estimation, thus improving the detection ability further. The simulation results show that the detection time of the proposed algorithm is reduced by 51.9% on average when dealing with small step or slow-growing ramp spoofing. Moreover, the missed detection rate decreases by 58% on average, and the false alarm rate remains at approximately zero. The proposed algorithm is suitable for spoofing detection in unmanned aerial vehicle applications of GNSS/INS integrated navigation systems with the advantages of fast detection and good performance.
- Published
- 2022
- Full Text
- View/download PDF
40. A New Multi-Filter Framework for Texture Image Representation Improvement Using Set of Pattern Descriptors to Fingerprint Liveness Detection
- Author
-
Rodrigo Colnago Contreras, Luis Gustavo Nonato, Maurilio Boaventura, Ines Aparecida Gasparotto Boaventura, Francisco Lledo Dos Santos, Rodrigo Bruno Zanin, and Monique Simplicio Viana
- Subjects
Fingerprint liveness detection ,spoofing detection ,pattern recognition ,texture analysis ,computer vision ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The use of user recognition and authentication systems has become very common and is part of everyday routines for many people, guaranteeing access to the automatic teller machines, entrance to the gym or even to smartphones. Among all the biometrics that can be analyzed in this type of system, the fingerprint is the most considered due to the ease of collection, the uniqueness of each user, and the large amount of solid theories and computational libraries available in the scientific literature. However, in recent years, the falsification of these biometrics with synthetic materials, known as spoofing, has become a real threat to these systems. To circumvent these effects without the addition of hardware devices, techniques based on the analysis of texture pattern descriptors were developed. In this work, we propose a new framework based on steps of data augmentation, image processing and replication, and feature fusion and reduction. The method has as main objective to improve the ability of classifiers, or sets of classifiers, to recognize life in fingerprints. Furthermore, it is proposed a generalization of vector representation of patterns described in matrix form from the systematic use of sets of mapping functions. All the proposed material was analyzed on the well-established benchmark of the Liveness Detection competition of the 2009, 2011, 2013 and 2015 editions, presenting an average accuracy of 97.77% and being a competitive strategy in relation to the other techniques that make up the state of the art of specialized literature.
- Published
- 2022
- Full Text
- View/download PDF
41. Research on GNSS interference recognition based on ROI of correlation peaks.
- Author
-
Yang, Bin, Dong, Chunxiao, Gao, Bo, Liu, Yongjun, Cui, Weijia, and Gao, Fei
- Subjects
GLOBAL Positioning System ,CONVOLUTIONAL neural networks ,RADAR interference ,MACHINE learning - Abstract
Summary: The general Global Navigation Satellite System (GNSS) receiver faces several challenges because of jamming signals, spoofing signals, and multipath signals, which severely influence its safety. In this paper, a receiver scheme with an interference recognition function is designed. In the latter, the correlation peak with different shapes is produced according to different interferences. The machine learning method is then applied to recognize and classify these feature maps. This transforms the interference recognition problem into a machine learning‐based classification problem. In order to reduce the complexity of the machine learning network, only the finite‐length correlation peak region of interest (ROI) is extracted as network input, endowing the shallow neural network with the interference recognition function. Afterward, five data acquisition environments are designed: authentic, spoofing, jamming, non‐line‐of‐sight (NLOS) multipath, and line‐of‐sight (LOS) multipath. Moreover, several experimental data are acquired, followed by the production of the correlation peak maps dataset, that are then learned and tested using two machine learning networks: one‐dimensional convolutional neural network (1D‐CNN) and bidirectional long short‐term memory neural network (BiLSTM‐NN). The results demonstrate that a recognition accuracy rate of over 98% can be reached using the shallow machine learning network. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
42. Performance Analysis of Direct GNSS Spoofing Detection with Accelerometers for Constant Velocity.
- Author
-
Kwon, Keum-Cheol and Shim, Duk-Sun
- Abstract
Global navigation satellite systems (GNSSs) are gaining importance as their main applications in localization and navigation particularly for future autonomous vehicle navigation. A drawback of GNSS for spoofing is the simple structure of the GNSS signal and its weak strength on the Earth's surface. These conditions can expose civilian users to GNSS spoofing attacks with the potential to cause significant damage. There are many approaches to detecting GNSS spoofing; one category uses independent sensors, such as inertial sensors. Inertial sensors are typically used as tightly coupled GNSS/INS (inertial navigation system) integration to provide consistency checks for position, velocity, or other parameters. However, in this study, a direct consistency check of the acceleration itself is used to detect spoofing and provide the probability density function (PDF) of a proposed decision variable for a constant-velocity case. The proposed decision variable compares the accelerations of the GNSS and accelerometers for the constant-velocity case. The performance of the proposed spoofing detection method is analyzed based on the detection probability of GNSS spoofing. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
43. Detection of Spoofing Attacks in Aeronautical Ad-Hoc Networks Using Deep Autoencoders.
- Author
-
Hoang, Tiep M., van Chien, Trinh, van Luong, Thien, Chatzinotas, Symeon, Ottersten, Bjorn, and Hanzo, Lajos
- Abstract
We consider an aeronautical ad-hoc network relying on aeroplanes operating in the presence of a spoofer. The aggregated signal received by the terrestrial base station is considered as “clean” or “normal”, if the legitimate aeroplanes transmit their signals and there is no spoofing attack. By contrast, the received signal is considered as “spurious” or “abnormal” in the face of a spoofing signal. An autoencoder (AE) is trained to learn the characteristics/features from a training dataset, which contains only normal samples associated with no spoofing attacks. The AE takes original samples as its input samples and reconstructs them at its output. Based on the trained AE, we define the detection thresholds of our spoofing discovery algorithm. To be more specific, contrasting the output of the AE against its input will provide us with a measure of geometric waveform similarity/dissimilarity in terms of the peaks of curves. To quantify the similarity between unknown testing samples and the given training samples (including normal samples), we first propose a so-called deviation-based algorithm. Furthermore, we estimate the angle of arrival (AoA) from each legitimate aeroplane and propose a so-called AoA-based algorithm. Then based on a sophisticated amalgamation of these two algorithms, we form our final detection algorithm for distinguishing the spurious abnormal samples from normal samples under a strict testing condition. In conclusion, our numerical results show that the AE improves the trade-off between the correct spoofing detection rate and the false alarm rate as long as the detection thresholds are carefully selected. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
44. Detection of synchronous spoofing on a GNSS receiver using weighed double ratio metrics.
- Author
-
Wang, Yiwei, Kou, Yanhong, Zhao, Yun, and Huang, Zhigang
- Abstract
Spoofing signal detection is an essential process in GNSS anti-spoofing. The detection probability of the existing metrics degrades significantly for many specific combinations of relative code phases and carrier phases of the spoofing signal relative to the authentic signal. To improve detection, we propose a four-complex-correlator metric, called weighted double ratio (WDR), which first constructs a metric named RatioQ exploiting the quadra-phase correlation outputs and then combines two pairs of complex correlators separated by a large correlator spacing and weighted according to their noise levels to form a WDR. Theoretical analysis and simulation results show that the detection coverage rate, the receiver operating characteristic, and the detection probability versus different carrier to noise ratios are significantly improved. The experiment using the Texas spoofing test battery data in all eight cases demonstrates that the proposed method outperforms the existing metrics, especially for high spoofing-signal-ratios and the unlocked-frequency mode. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
45. BPCNN: Bi-Point Input for Convolutional Neural Networks in Speaker Spoofing Detection.
- Author
-
Yoon, Sunghyun and Yu, Ha-Jin
- Subjects
- *
CONVOLUTIONAL neural networks , *ROUGH sets , *HUMAN fingerprints , *ERROR rates - Abstract
We propose a method, called bi-point input, for convolutional neural networks (CNNs) that handle variable-length input features (e.g., speech utterances). Feeding input features into a CNN in a mini-batch unit requires that all features in each mini-batch have the same shape. A set of variable-length features cannot be directly fed into a CNN because they commonly have different lengths. Feature segmentation is a dominant method for CNNs to handle variable-length features, where each feature is decomposed into fixed-length segments. A CNN receives one segment as an input at one time. However, a CNN can consider only the information of one segment at one time, not the entire feature. This drawback limits the amount of information available at one time and consequently results in suboptimal solutions. Our proposed method alleviates this problem by increasing the amount of information available at one time. With the proposed method, a CNN receives a pair of two segments obtained from a feature as an input at one time. Each of the two segments generally covers different time ranges and therefore has different information. We also propose various combination methods and provide a rough guidance to set a proper segment length without evaluation. We evaluate the proposed method on the spoofing detection tasks using the ASVspoof 2019 database under various conditions. The experimental results reveal that the proposed method reduces the relative equal error rate (EER) by approximately 17.2% and 43.8% on average for the logical access (LA) and physical access (PA) tasks, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
46. Enhanced GNSS Spoofing Detector via Multiple-Epoch Inertial Navigation Sensor Prediction in a Tightly-Coupled System.
- Author
-
Zhang, Liyuan, Zhao, Hongbo, Sun, Chao, Bai, Lu, and Feng, Wenquan
- Abstract
Global navigation satellite system (GNSS) signals have open structure and weak power, which is vulnerable to spoofing attacks. The Innovation-based detection technique has been proved effective for spoofing detection in an integrated navigation system. However, it employs spoofed priori estimate of pseudorange to construct innovation, showing shortcomings like limited detection probability for slowly-varying spoofing attacks, long time to alarm (TTA), and high false alarm probability. This work proposes an enhanced innovation-based spoofing detector via multiple-epoch inertial navigation sensor (INS) prediction. An additional INS unit is added, which is corrected by extended Kalman Filter (EKF) every ${N}$ epoch. Its output is used to replace the spoofed priori estimate in the EKF and then construct an improved innovation. Compared with the conventional innovation, the improved one can be immune to spoofing during multiple epochs and accumulate more abnormal energy due to spoofing attacks. In addition, an innovation bias mitigation method is presented, which exploits the mean of innovation of previous epochs to predict the immediate innovation bias and thus reduces the probability of false alarm. The overall spoofing detection performance is evaluated using both simulation data and hardware-based experiment data collected in Beihang university. A driving test was also carried out to verify its performance in complex urban conditions. Results show that the proposed detector significantly improves the detection performance under slowly-varying spoofing attacks and reduces the probability of false alarm compared with the conventional detector. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
47. Spoofed Speech Detection with Weighted Phase Features and Convolutional Networks.
- Author
-
DİŞKEN, Gökay
- Subjects
CONVOLUTIONAL neural networks ,AUTOMATIC speech recognition ,SPEECH synthesis ,TASK performance - Abstract
Detection of audio spoofing attacks has become vital for automatic speaker verification systems. Spoofing attacks can be obtained with several ways, such as speech synthesis, voice conversion, replay, and mimicry. Extracting discriminative features from speech data can improve the accuracy of detecting these attacks. In fact, a frame-wise weighted magnitude spectrum is found to be effective to detect replay attacks recently. In this work, discriminative features are obtained in a similar fashion (frame-wise weighting), however, a cosine normalized phase spectrum is used since phase-based features have shown decent performance for the given task. The extracted features are then fed to a convolutional neural network as input. In the experiments ASVspoof 2015 and 2017 databases are used to investigate the proposed system's spoof detection performance for both synthetic and replay attacks, respectively. The results showed that the proposed approach achieved 34.5% relative decrease in the average EER for ASVspoof 2015 evaluation set, compared to the ordinary cosine normalized phase features. Furthermore, the proposed system outperformed the others at detecting S10 attack type of ASVspoof 2015 database. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
48. A Framework for GNSS Spoofing Detection Through Combinations of Metrics.
- Author
-
Rothmaier, Fabian, Chen, Yu-Hsuan, Lo, Sherman, and Walter, Todd
- Subjects
- *
GLOBAL Positioning System , *FALSE alarms - Abstract
We present a framework for GNSS spoofing detection combining an arbitrary number of metrics while guaranteeing a fixed maximum false alert probability. The detection test assumes a simple form that makes it suitable for real time applications. We define criteria for metrics to be used within this framework and demonstrate compatibility with a range of commonly used metrics. We achieve a more than 70% reduction in worst-case missed detection probability compared to conventional metric combination techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
49. GNSS Spoofing Jamming Detection Based on Generative Adversarial Network.
- Author
-
Li, Junzhi, Zhu, Xiangwei, Ouyang, Mingjun, Li, Wanqing, Chen, Zhengkun, and Fu, Qixiang
- Abstract
The GNSS spoofing jamming is generated by transmitting spoofing signals that are identical or similar to the authentic satellite signals but have a stronger power in order to guide a receiver to acquire and track them instead of real signals. The main aim of spoofing is to make the receiver obtain wrong timing and positioning information. In this paper, the characteristics of spoofing signals in the acquisition phase are analyzed and studied. Based on the idea of confrontation evolution of a general adverse network (GAN), this study proposes a GNSS anti-spoofing method. The performance of the proposed method is verified by simulations experiments. The experimental results show that when the pseudo-code phase difference between the spoofing signal and the authentic signal exceeds 0.5 chip, the detection probability of the GAN can reach more than 98%. The proposed method can also be applied to situations where the spoofing signal is highly synchronized with the real signal. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
50. A New GNSS Spoofing Detection Method Using Two Antennas
- Author
-
Jiajia Chen, Ying Xu, Hong Yuan, and Yige Yuan
- Subjects
Carrier phase ,global navigation satellite system ,spoofing detection ,two antennas ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The security of global navigation satellite system (GNSS) has attracted a lot of attention recently. The spoofing detection method using multi-antenna array is one of the most efficient spoofing detection methods due to its unique geometry space. However, it is either based on the assumption that all spoofing signals come from the same direction or it requires additional inertial measurement unit (IMU) or multi-antenna attitude solution to obtain attitude information. In this paper, we propose a new GNSS spoofing detection method using only two off-the-shelf antennas. This method can detect a single spoofing signal or spoofing signals from multiple directions, and does not require any attitude information. This method employs the carrier phase and the known baseline length to estimate the baseline vector. Its theoretical performance can be assessed by the sum of squared error (SSE) test statistic. Static and dynamic experiments both prove that this method can distinguish the spoofing signal from the real signal effectively without any delay.
- Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.