269 results on '"spoofing detection"'
Search Results
2. Fast GNSS spoofing detection based on LSTM-detect model.
- Author
-
Mao, Wenxuan, Ren, Jieyige, and Ni, Shuyan
- Abstract
Spoofing detection is an essential process in global navigation satellite system anti-spoofing. Signal quality monitoring (SQM) methods have been widely studied as simple and effective means to detect spoofing. However, the disadvantages of the existing SQM methods, such as long alarm times and low detection rates, necessitate the study of new methods. Therefore, to address these challenges, this paper proposes a novel SQM method based on a long short-term memory-detect (LSTM-Detect) model with a strong capacity for sequential signal processing. In particular, this method evaluates the distortion of the autocorrelation function (ACF) by the trained LSTM-Detect model for spoofing detection. The simulation results demonstrate that the LSTM-Detect model can detect a wide range of spoofing signals, varying in signal power advantages, code phase differences, and carrier phase differences. In the Texas Spoofing Test Battery datasets 2–6, the detection rate exceeds 98.5%, with an alarm time of less than 5 ms. Compared with five existing SQM methods, the LSTM-Detect model exhibits a more comprehensive spoofing detection performance. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
3. A real-time GNSS time spoofing detection framework based on feature processing.
- Author
-
Li, Jing, Chen, Zhengkun, Yuan, Xuelin, Xie, Ting, Xu, Yiyu, Zheng, Zehao, and Zhu, Xiangwei
- Abstract
Currently, the susceptibility of Global Navigation Satellite System (GNSS) signals underscores the importance of accurate GNSS time spoofing detection as a critical research area. Traditional spoofing detection methods have limitations in applicability, while the current learning-based algorithms are only applicable to the judgment of collected data, which is difficult to apply to real-time detection. In this paper, a real-time spoofing detection framework based on feature processing is proposed. The approach involves feature integration and correlation coefficient screening on each epoch of multi-satellite data. Additionally, special standardization strategy is employed to enhance the feasibility of real-time application. In the experimental phase, apart from utilizing the open dataset, an experimental platform is developed to generate dual-system data for experimentation purposes. Compared with the traditional clock difference detection method, this algorithm improves the detection performance by about 25%. Furthermore, the framework proposed can improve the detection F1 score of basic machine learning models and greatly reduce the computation time by more than ten times. On most datasets, models incorporating the framework achieved F1 scores of more than 99% and average response times of less than 10 μs. In summary, this study provides an effective intelligent solution for the application of real-time receiver spoofing detection. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
4. GPS Spoofing Detection using CAF Images and Neural Networks Based on the Proposed Peak Mapping Dimensionality Reduction Algorithm and TCNN Model.
- Author
-
Jahantab, M. J., Tohidi, S., Mosavi, M. R., and Ayatollahi, A.
- Subjects
DIMENSIONAL reduction algorithms ,CONVOLUTIONAL neural networks ,GLOBAL Positioning System ,GPS receivers ,ALGORITHMS - Abstract
Global Positioning System (GPS)-based positioning has become an indispensable part of our daily lives. A GPS receiver calculates its distance from a satellite by measuring the signal reception delay. Then, after determining its position relative to at least four satellites, the receiver obtains its precise location in three dimensions. There is a fundamental flaw in this positioning system, namely that satellite signals at ground level are very weak and susceptible to interference in the bandwidth; therefore, even a slight interference can disrupt the GPS receiver. In this paper, spoofing detection based on the Cross Ambiguity Function (CAF) is used. Furthermore, a dimension reduction algorithm is proposed to improve the speed and performance of the detection process. The reduced-dimensional images are trained by a Convolutional Neural Network (CNN). Additionally, a modified CNN model as Transformed-CNN (TCNN) is presented to enhance accuracy in this paper. The simulation results show a 98.67% improvement in network training speed compared to images with original dimensions, a 1.16% improvement in detection accuracy compared to the baseline model with reduced dimensions, and a 9.83% improvement compared to the original dimensions in detecting spoofing, demonstrating the effectiveness of the proposed algorithm and model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
5. GPS Spoofing Detection using CAF Images and Neural Networks Based on the Proposed Peak Mapping Dimensionality Reduction Algorithm and TCNN Model
- Author
-
M. J. Jahantab, S. Tohidi, Mohammad Reza Mosavi, and Ahmad Ayatollahi
- Subjects
gps ,spoofing detection ,caf ,tcnn ,dimension reduction algorithm ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Global Positioning System (GPS)-based positioning has become an indispensable part of our daily lives. A GPS receiver calculates its distance from a satellite by measuring the signal reception delay. Then, after determining its position relative to at least four satellites, the receiver obtains its precise location in three dimensions. There is a fundamental flaw in this positioning system, namely that satellite signals at ground level are very weak and susceptible to interference in the bandwidth; therefore, even a slight interference can disrupt the GPS receiver. In this paper, spoofing detection based on the Cross Ambiguity Function (CAF) is used. Furthermore, a dimension reduction algorithm is proposed to improve the speed and performance of the detection process. The reduced-dimensional images are trained by a Convolutional Neural Network (CNN). Additionally, a modified CNN model as Transformed-CNN (TCNN) is presented to enhance accuracy in this paper. The simulation results show a 98.67% improvement in network training speed compared to images with original dimensions, a 1.16% improvement in detection accuracy compared to the baseline model with reduced dimensions, and a 9.83% improvement compared to the original dimensions in detecting spoofing, demonstrating the effectiveness of the proposed algorithm and model.
- Published
- 2024
6. Game-theoretic physical layer authentication for spoofing detection in internet of things
- Author
-
Yue Wu, Tao Jing, Qinghe Gao, Yingzhen Wu, and Yan Huo
- Subjects
IoT ,Game theory ,Physical layer authentication ,Nash equilibrium ,Spoofing detection ,Information technology ,T58.5-58.64 - Abstract
The Internet of Things (IoT) has permeated various fields relevant to our lives. In these applications, countless IoT devices transmit vast amounts of data, which often carry important and private information. To prevent malicious users from spoofing these information, the first critical step is effective authentication. Physical Layer Authentication (PLA) employs unique characteristics inherent to wireless signals and physical devices and is promising in the IoT due to its flexibility, low complexity, and transparency to higher layer protocols. In this paper, the focus is on the interaction between multiple malicious spoofers and legitimate receivers in the PLA process. First, the interaction is formulated as a static spoof detection game by including the spoofers and receivers as players. The best authentication threshold of the receiver and the attack rate of the spoofers are consideblack as Nash Equilibrium (NE). Then, closed-form expressions are derived for all NEs in the static environment in three cases: multiplayer games, zero-sum games with collisions, and zero-sum games without collisions. Considering the dynamic environment, a Multi-Agent Deep Deterministic Policy Gradient (MADDPG) algorithm is proposed to analyze the interactions of receiver and spoofers. Last, comprehensive simulation experiments are conducted and demonstrate the impact of environmental parameters on the NEs, which provides guidance to design effective PLA schemes.
- Published
- 2024
- Full Text
- View/download PDF
7. Navigation spoofing interference detection based on Transformer model.
- Author
-
Niu, Ben, Zhuang, Xuebin, Lin, Zijian, and Zhang, Linjie
- Subjects
- *
TRANSFORMER models , *GLOBAL Positioning System , *GPS receivers , *SIGNAL detection , *SIGNALS & signaling - Abstract
Spoofed signal interference poses a serious threat to the security of Global Navigation Satellite Systems (GNSS). In order to effectively detect spoofing signals, this paper proposes a spoofing signal detection method based on the Transformer model in the signal capture phase. When a spoofed signal is added, the capture matrix of the receiver changes. The method takes the capture matrix near the relevant peak as the data set for training the Transformer model to improve the model's ability to recognize the features of the capture matrix, and then uses the trained model to identify the capture results and get the discriminative result of whether there is deception joining. Subsequently, the trained model is embedded into the navigation receiver, and the receiver configuration is modified so that it continuously performs signal capture over the whole data and detects spoofing signals on the capture results. The experimental results show that the spoofing signal detection method based on the Transformer model has a higher detection accuracy compared to other deep learning models. For data with different search steps, its detection accuracy can reach more than 95%. When the chip delay of the spoofed signal is greater than half a chip, the detection accuracy tends to be close to 100%. For online open-source spoofing datasets, the detection algorithm can still obtain excellent detection results. The spoofing signal detection technique based on the Transformer model is of great significance to improve the security and robustness of the navigation system and has the prospect of wide application. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Enhancing Voice Authentication with a Hybrid Deep Learning and Active Learning Approach for Deepfake Detection.
- Author
-
Ahmed, Ali Saadoon and Khaleel, Arshad M.
- Subjects
DEEP learning ,RANDOM forest algorithms ,DATABASES ,DYNAMIC models - Abstract
This paper explores the application of active learning to enhance machine learning classifiers for spoofing detection in automatic speaker verification (ASV) systems. Leveraging the ASVspoof 2019 database, we integrate an active learning framework with traditional machine learning workflows, specifically focusing on Random Forest (RF) and Multilayer Perceptron (MLP) classifiers. The active learning approach was implemented by initially training models on a small subset of data and iteratively selecting the most uncertain samples for further training, which allowed the classifiers to refine their predictions effectively. Experimental results demonstrate that while the MLP initially outperformed RF with an accuracy of 95.83% compared to 91%, the incorporation of active learning significantly improved RF's performance to 94%, narrowing the performance gap between the two models. After applying active learning, both classifiers showed enhanced precision, recall, and F1-scores, with improvements ranging from 3% to 5%. This study provides valuable insights into the role of active learning in boosting the efficiency of machine learning models for dynamic spoofing scenarios in ASV systems. Future research should focus on designing advanced active learning techniques and exploring their integration with other machine learning paradigms to further enhance ASV security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Leveraging machine learning for the detection of structured interference in Global Navigation Satellite Systems.
- Author
-
Nabi, Imtiaz, Farooq, Salma Zainab, Saeed, Sunnyaha, Irtaza, Syed Ali, Shehzad, Khurram, Arif, Mohammad, Khan, Inayat, and Ahmad, Shafiq
- Subjects
GLOBAL Positioning System ,RADIO interference ,RECEIVER operating characteristic curves ,SUPPORT vector machines ,K-nearest neighbor classification - Abstract
Radio frequency interference disrupts services offered by Global Navigation Satellite Systems (GNSS). Spoofing is the transmission of structured interference signals intended to deceive GNSS location and timing services. The identification of spoofing is vital, especially for safety-of-life aviation services, since the receiver is unaware of counterfeit signals. Although numerous spoofing detection and mitigation techniques have been developed, spoofing attacks are becoming more sophisticated, limiting most of these methods. This study explores the application of machine learning techniques for discerning authentic signals from counterfeit ones. The investigation particularly focuses on the secure code estimation and replay (SCER) spoofing attack, one of the most challenging type of spoofing attacks, ds8 scenario of the Texas Spoofing Test Battery (TEXBAT) dataset. The proposed framework uses tracking data from delay lock loop correlators as intrinsic features to train four distinct machine learning (ML) models: logistic regression, support vector machines (SVM) classifier, K-nearest neighbors (KNN), and decision tree. The models are trained employing a random six-fold cross-validation methodology. It can be observed that both logistic regression and SVM can detect spoofing with a mean F1-score of 94%. However, logistic regression provides 165dB gain in terms of time efficiency as compared to SVM and 3 better than decision tree-based classifier. These performance metrics as well as receiver operating characteristic curve analysis make logistic regression the desirable approach for identifying SCER structured interference. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation.
- Author
-
Wang, Lei, Chen, Lei, Li, Baiyu, Liu, Zhe, Li, Zongnan, and Lu, Zukun
- Subjects
GLOBAL Positioning System ,INERTIAL navigation systems ,MILITARY research - Abstract
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference. When combined with the inertial navigation system (INS), the GNSS/INS integrated navigation system offers distinct advantages in the field of anti-spoofing technology research, which has garnered significant attention in recent years. To summarize the current research achievements of GNSS/INS integrated navigation anti-spoofing technology, it is necessary to provide an overview of the three core technical aspects of spoofing attack principles and implementation strategies, spoofing detection, and spoofing mitigation. First, the principles and implementation strategies of spoofing interference attacks are introduced, and different classifications of spoofing interference attacks are given. Then, the performance characteristics and technical points of different spoofing detection and spoofing mitigation methods are compared and analyzed, and the shortcomings and challenges in the current development of GNSS/INS anti-spoofing technology are pointed out. Finally, based on the summary and shortcomings of the existing technology, a prospect for the future development of GNSS/INS integrated navigation anti-spoofing technology is discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. AHBSMO-DRN: Single Device and Multiple Sharing-Based Geo-Position Spoofing Detection in Instant Messaging Platform.
- Author
-
Koparde, Shweta and Mane, Vanita
- Subjects
DISCRETE cosine transforms ,INSTANT messaging ,GEOGRAPHICAL positions ,GEOTAGGING ,STATISTICAL correlation - Abstract
In recent years, location check-in on mobile components is a trending topic over social media. At the same time, hackers grasp the geographical position (geo-position) data that destruct the security of users. Hence, it is crucial to detect the originality of geo-position. A plethora of methods have been developed for geo-position spoofing identification that depends on geo-position data. Nonetheless, such techniques are incapable in terms of missing prior data or insufficient of large samples. To counterpart this issue, an effective model is invented to detect spoofing activity by Adaptive Honey Badger Spider Monkey Optimization_Deep residual Network (AHBSMO-based DRN). Here, neuro camera footprint refining is performed using Neuro Fuzzy filter and extracted footprint image obtained while considering the input and spoofed image are fused using Pearson correlation coefficient. Meanwhile, geo-tagged value of input image and spoofed image is also fused based on same Pearson coefficient. Finally, fusion is performed and then, spoofing detection is accomplished by comparing the Discrete Cosine Transform (DCT) foot print of two images to find if the input image is spoofed or not. Moreover, AHBSMO-based DRN model has gained outstanding outcomes in regard of accuracy of 0.921, True Positive Rate (TPR) 0 of 0.911, and False Positive Rate (FPR) of 0.136. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. BDS time spoofing detection method based on the dynamic time warping.
- Author
-
Chen, Zhengkun, Liu, Yang, Li, Jing, Xie, Ting, Yuan, Xuelin, and Zhu, Xiangwei
- Abstract
The radio navigation satellite system (RNSS) timing has been widely used in crucial power systems. However, the problem of RNSS service vulnerability to interference and spoofing significantly affects its application. The phasor measurement unit can effectively detect timing spoofing that exceeds the maximum allowable error, but there has been less research on small-offset timing spoofing. We propose a joint timing spoofing detection method of the radio determination satellite system (RDSS) and RNSS in BDS for small-offset timing spoofing. The RDSS service uses an authentication mechanism in the master station, making it challenging to be spoofed, and it has the same time and space references as the RNSS service. We obtain the RNSS and RDSS timing signal counts and performs dynamic time wrapping to measure the similarity metric of two-time series as a detection quantity. Then, the proposed method is verified by actual experiments. The experiment results show that the detection probability of the RDSS-assisted method is significantly higher than that of the method only using the RNSS variance. The detection probability of the proposed method can reach 90% at a false alarm probability of 0.1, which verifies the accuracy and reliability of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. 利用机器学习的 GNSS 欺骗检测综述.
- Author
-
周雅兰 and 宋晓鸥
- Abstract
Copyright of Journal of Computer Engineering & Applications is the property of Beijing Journal of Computer Engineering & Applications Journal Co Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
14. Advanced GNSS Spoofing Detection: Aggregated Correlation Residue Likelihood Analysis.
- Author
-
Ji, Ning, Rao, Yongnan, Wang, Xue, and Zou, Decai
- Subjects
- *
GLOBAL Positioning System , *MONTE Carlo method , *CORRELATORS - Abstract
Compared to conventional spoofing, emerging spoofing attacks pose a heightened threat to security applications within the global navigation satellite system (GNSS) due to their subtly designed signal structures. In response, a novel spoofing detection method entitled aggregated correlation residue likelihood analysis (A-CoRLiAn) is proposed in this study. Requiring only the addition of a pair of supplementary correlators, A-CoRLiAn harnesses correlation residues to formulate a likelihood metric, subsequently aggregating weighted decisions from all tracked satellites to ascertain the presence of spoofing. Evaluated under six diverse spoofing scenarios (including emerging challenges) in the Texas Spoofing Test Battery (TEXBAT) via Monte Carlo simulations, A-CoRLiAn yields a detection rate of 99.71%, demonstrating sensitivity, robustness, autonomy, and a lightweight architecture conducive to real-time implementation against spoofing threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Facial Authenticity and Spoofing Detection
- Author
-
Singh, Aviral, Singh, Kritika, Vashisht, Vasudha, Sansanwal, Dhruv, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Swaroop, Abhishek, editor, Kansal, Vineet, editor, Fortino, Giancarlo, editor, and Hassanien, Aboul Ella, editor
- Published
- 2024
- Full Text
- View/download PDF
16. An RFP Dataset for Real, Fake, and Partially Fake Audio Detection
- Author
-
AlAli, Abdulazeez, Theodorakopoulos, George, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Hewage, Chaminda, editor, Nawaf, Liqaa, editor, and Kesswani, Nishtha, editor
- Published
- 2024
- Full Text
- View/download PDF
17. Spoofing Transaction Detection with Group Perceptual Enhanced Graph Neural Network
- Author
-
Kang, Le, Mu, Tai-Jiang, Ning, XiaoDong, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Bifet, Albert, editor, Krilavičius, Tomas, editor, Miliou, Ioanna, editor, and Nowaczyk, Slawomir, editor
- Published
- 2024
- Full Text
- View/download PDF
18. Metaheuristic Algorithms for Enhancing Multicepstral Representation in Voice Spoofing Detection: An Experimental Approach
- Author
-
Contreras, Rodrigo Colnago, Heck, Gustavo Luiz, Viana, Monique Simplicio, dos Santos Bongarti, Marcelo Adriano, Zamani, Hoda, Guido, Rodrigo Capobianco, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Tan, Ying, editor, and Shi, Yuhui, editor
- Published
- 2024
- Full Text
- View/download PDF
19. Research on Spoofing Detection Based on C/N0 Measurements for GNSS Array Receivers
- Author
-
Liu, Jinyuan, Xie, Yuchen, Chen, Feiqiang, Ni, Shaojie, Sun, Guangfu, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Yang, Changfeng, editor, and Xie, Jun, editor
- Published
- 2024
- Full Text
- View/download PDF
20. BOC Signal Spoofing Detection Based on Multi-correlator Signal Quality Monitoring Method
- Author
-
Liang, Mingxuan, Chen, Zhengkun, Zhou, Zhijian, Yuan, Xuelin, Zhu, Xiangwei, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Yang, Changfeng, editor, and Xie, Jun, editor
- Published
- 2024
- Full Text
- View/download PDF
21. A 5G-Assisted GNSS Spoofing Detection Method in a GNSS-5G Hybrid Positioning System
- Author
-
Bai, Lu, Sun, Chao, Dempster, Andrew G., Feng, Wenquan, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Tan, Kay Chen, Series Editor, Yang, Changfeng, editor, and Xie, Jun, editor
- Published
- 2024
- Full Text
- View/download PDF
22. Leveraging machine learning for the detection of structured interference in Global Navigation Satellite Systems
- Author
-
Imtiaz Nabi, Salma Zainab Farooq, Sunnyaha Saeed, Syed Ali Irtaza, Khurram Shehzad, Mohammad Arif, Inayat Khan, and Shafiq Ahmad
- Subjects
Global positioning system ,GNSS spoofing ,Spoofing detection ,Signal quality monitoring ,GNSS security ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Radio frequency interference disrupts services offered by Global Navigation Satellite Systems (GNSS). Spoofing is the transmission of structured interference signals intended to deceive GNSS location and timing services. The identification of spoofing is vital, especially for safety-of-life aviation services, since the receiver is unaware of counterfeit signals. Although numerous spoofing detection and mitigation techniques have been developed, spoofing attacks are becoming more sophisticated, limiting most of these methods. This study explores the application of machine learning techniques for discerning authentic signals from counterfeit ones. The investigation particularly focuses on the secure code estimation and replay (SCER) spoofing attack, one of the most challenging type of spoofing attacks, ds8 scenario of the Texas Spoofing Test Battery (TEXBAT) dataset. The proposed framework uses tracking data from delay lock loop correlators as intrinsic features to train four distinct machine learning (ML) models: logistic regression, support vector machines (SVM) classifier, K-nearest neighbors (KNN), and decision tree. The models are trained employing a random six-fold cross-validation methodology. It can be observed that both logistic regression and SVM can detect spoofing with a mean F1-score of 94%. However, logistic regression provides 165dB gain in terms of time efficiency as compared to SVM and 3 better than decision tree-based classifier. These performance metrics as well as receiver operating characteristic curve analysis make logistic regression the desirable approach for identifying SCER structured interference.
- Published
- 2024
- Full Text
- View/download PDF
23. Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation
- Author
-
Lei Wang, Lei Chen, Baiyu Li, Zhe Liu, Zongnan Li, and Zukun Lu
- Subjects
anti-spoofing ,GNSS/INS integrated navigation ,spoofing interference ,spoofing detection ,spoofing mitigation ,Physics ,QC1-999 - Abstract
The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out in-depth defense research on spoofing interference. When combined with the inertial navigation system (INS), the GNSS/INS integrated navigation system offers distinct advantages in the field of anti-spoofing technology research, which has garnered significant attention in recent years. To summarize the current research achievements of GNSS/INS integrated navigation anti-spoofing technology, it is necessary to provide an overview of the three core technical aspects of spoofing attack principles and implementation strategies, spoofing detection, and spoofing mitigation. First, the principles and implementation strategies of spoofing interference attacks are introduced, and different classifications of spoofing interference attacks are given. Then, the performance characteristics and technical points of different spoofing detection and spoofing mitigation methods are compared and analyzed, and the shortcomings and challenges in the current development of GNSS/INS anti-spoofing technology are pointed out. Finally, based on the summary and shortcomings of the existing technology, a prospect for the future development of GNSS/INS integrated navigation anti-spoofing technology is discussed.
- Published
- 2024
- Full Text
- View/download PDF
24. Detecting GNSS spoofing using deep learning
- Author
-
Borhani-Darian, Parisa, Li, Haoqing, Wu, Peng, and Closas, Pau
- Published
- 2024
- Full Text
- View/download PDF
25. 卫星导航欺骗干扰检测与抑制技术综述.
- Author
-
倪淑燕, 陈世淼, 付琦玮, 毛文轩, 雷拓峰, and 宋鑫
- Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. 基于高度计辅助的GNSS欺骗干扰检测.
- Author
-
徐奕禹, 陈长风, 袁雪林一, 陈正坤, and 周志健
- Abstract
Copyright of Systems Engineering & Electronics is the property of Journal of Systems Engineering & Electronics Editorial Department and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
27. 基于 IMM-KF 算法改进的欺骗式干扰检测算法.
- Author
-
陈世淼, 倪淑燕, 程凌峰, 付琦玮, and 雷拓峰
- Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
28. Machine Learning-Based PHY-Authentication Without Prior Attacker Information for Wireless Multiple Access Channels.
- Author
-
Altun, Ufuk and Basar, Ertugrul
- Subjects
DEEP learning ,MACHINING ,TRANSMITTERS (Communication) ,MACHINERY ,COMPUTER simulation ,COMMUNICATION models ,MACHINE learning - Abstract
Physical layer (PHY) authentication methods provide spatial security by exploiting the unique channel between two users. In recent years, many studies focused on substituting traditional threshold-based detection mechanisms with machine/deep learning classifiers to solve the threshold selection problem and obtain better detection accuracy. However, these studies assume that receivers have access to spoofer's channel information at the training of the classifier, which is unrealistic for real-time scenarios. In this study, we propose a PHY-authentication architecture for wireless multiple access channels (W-MACs) that removes this assumption and works without any prior information about the spoofer. The proposed method is designed for multi-user systems and is suitable for any classifier model or communication protocol. The feasibility and the performance of the proposed method are investigated via computer simulations and compared with a benchmark model. The results proved the feasibility of the proposed method as it can detect spoofers successfully without requiring spoofers' channel information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. A Real-Time Spoofing Detection Method Using Three Low-Cost Antennas in Satellite Navigation.
- Author
-
Chen, Jiajia, Wang, Xueying, Fang, Zhibo, Jiang, Cheng, Gao, Ming, and Xu, Ying
- Subjects
ANTENNAS (Electronics) ,GLOBAL Positioning System ,ARTIFICIAL satellites in navigation ,SIGNAL detection ,STATISTICAL models ,SUM of squares - Abstract
The vulnerability of civil receivers of the Global Satellite Navigation System (GNSS) to spoofing jamming has raised significant concerns in recent times. Traditional multi-antenna spoofing detection methods are limited in application scenarios and come with high hardware costs. To address this issue, this paper proposes a novel GNSS spoofing detection method utilizing three low-cost collinear antennas. By leveraging the collinearity information of the antennas, this method effectively constrains the observation equation, leading to improved estimation accuracy of the pointing vector. Furthermore, by employing a binary statistical detection model based on the sum of squares (SSE) between the observed value and the estimated value of the pointing vector, real-time spoofing signal detection is enabled. Simulation results confirm the efficacy of the proposed statistical model, with the error of the skewness coefficient not exceeding 0.026. Experimental results further demonstrate that the collinear antenna-based method reduces the standard deviation of the angle deviation of the pointing vector by over 55.62% in the presence of spoofing signals. Moreover, the experiments indicate that with a 1 m baseline, this method achieves 100% spoofing detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Generalized Likelihood Ratio Satellite Navigation Spoofing Detection Algorithm Based on Moving Variance
- Author
-
Pingping Qu, Tianfeng Liu, Tengli Yu, Ershen Wang, Song Xu, and Zibo Yuan
- Subjects
Satellite navigation ,moving variance ,generalized likelihood ratio test ,spoofing detection ,pseudo-range ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The vulnerability of Global Navigation Satellite Systems (GNSS) to spoofing limits their widespread use in military security and national economy. Therefore, fast and accurate detection of GNSS spoofing is of great significance. When spoofing cannot be accurately detected in the capture tracking phase, spoofing detection needs to be performed again at the localization solver. In order to detect the spoofing jamming of Global Navigation Satellite System in pseudo-range measurements, a generalized likelihood ratio satellite navigation spoofing detection algorithm based on moving variance is proposed by analyzing the pseudo-ranges cleared by the positioning of global satellite navigation signals. A new data subset is created by calculating the variance of the pseudo-range of different satellites at the same time and moving it forward. The variance is calculated again by this data subset to obtain the moving variance, the generalized likelihood ratio detection model is used to calculate the detection statistics of the pseudo-range movement variance, the detection statistic is then compared to the detection threshold under the condition that the probability of false alarm is $1\times 10 ^{-7}$ , so as to realize the spoofing jamming detection of global satellite navigation receiver for pseudo-range. Taking the software receiver as the experimental platform, the effectiveness of the proposed algorithm is verified by comparing it with two other algorithms. The result show that when the number of spoofed satellites is less than 9, the algorithm has a good detection effect. When the false alarm rate is $1\times 10 ^{-7}$ , the average prediction accuracy rate is kept above 98 %.
- Published
- 2024
- Full Text
- View/download PDF
31. An effective facial spoofing detection approach based on weighted deep ensemble learning.
- Author
-
Sabri, My Abdelouahed, Ennouni, Assia, and Aarab, Abdellah
- Abstract
Deep learning has seen successful implementation in various domains, such as natural language processing, image classification, and object detection in recent times. In the field of biometrics, deep learning has also been used to develop effective anti-spoofing systems. Facial spoofing, the act of presenting fake facial information to deceive a biometric system, poses a significant threat to the security of face recognition systems. To address this challenge, we propose, in this paper, an effective and robust facial spoofing detection approach based on weighted deep ensemble learning. Our method combines the strengths of two powerful deep learning architectures, DenseNet201 and MiniVGG. The choice of these two architectures is based on a comparative study between DenseNet201, DenseNet169, VGG16, MiniVGG, and ResNet50, where DenseNet201 and MiniVGG obtained the best recall and precision scores, respectively. Our proposed weighted voting ensemble leverages each architecture-specific capabilities to make the final prediction. We assign weights to each classification model based on its performance, which are determined by a mathematical formulation considering the trade-off between recall and precision. To validate the effectiveness of our proposed approach, we evaluate it on the challenging ROSE-Youtu face liveness detection dataset. Our experimental results demonstrate that our proposed method achieves an impressive accuracy rate of 99% in accurately detecting facial spoofing attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Rapid detection of GNSS time synchronization attacks via the enhanced code and carrier Doppler consistency test.
- Author
-
Feng, Fan, Chen, Zhengkun, Chen, Longjiang, and Zhu, Xiangwei
- Abstract
Many critical infrastructures, such as smart grids, communication systems, and industrial networks, rely on the global navigation satellite system (GNSS) to ensure accurate time synchronization. However, the vulnerability of GNSS receivers to time synchronization attacks (TSAs) poses a significant threat to these infrastructures, potentially leading to severe consequences. Thus, it is imperative to promptly detect TSAs before they have an impact. We propose a method called the enhanced code and carrier Doppler consistency test (E-CCDCT) to address this issue. The proposed method monitors the consistency between the code Doppler shift and carrier Doppler shift to rapidly detect any inconsistency between them caused by a TSA. An additional advantage of E-CCDCT is its ability to provide early warning if a TSA signal attempts phase alignment before spoofing. Experiments for comparison with off-the-shelf TSA detection techniques were conducted using the Texas Spoofing Test Battery datasets. The results confirm that the proposed method exhibits superior detection speed compared to other methods. Furthermore, the proposed method achieves a detection probability of at least 90% at a false alarm rate of 0.1%. Consequently, this method offers exceptional efficiency and accuracy and can serve as a valuable complement to existing TSA detection techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Stochastic Reachability-Based GPS Spoofing Detection with Chimera Signal Enhancement.
- Author
-
Mina, Tara, Kanhere, Ashwin, Kousik, Shreyas, and Gao, Grace
- Subjects
- *
SIGNAL detection , *GLOBAL Positioning System , *MONTE Carlo method , *MEASUREMENT errors , *BOUND states , *UNITS of measurement - Abstract
To protect civilian global positioning system (GPS) users from spoofing attacks, the U.S. Air Force Research Lab has proposed the chips-message robust authentication (Chimera) enhancement for the L1C signal. In particular, the Chimera fast channel allows users to authenticate the received GPS signal once every 1.5 or 6 s, depending on the out-of-band source utilized for receiving the fast channel marker keys. However, for many moving receiver applications, receivers often use much higher GPS measurement rates, at 5-20 Hz. In this work, we derive a stochastic reachability (SR)-based detector to perform continuous GPS signal verification and state estimation between Chimera authentications. Our SR detector validates the received GPS measurement against any self-contained sensor, such as an inertial measurement unit, in the presence of bounded biases in the sensor error distributions. We demonstrate via Monte Carlo simulations that our detector satisfies a user-defined false alarm requirement during nominal conditions, while successfully detecting a simulated spoofing attack. We further demonstrate that our SR state estimation filter successfully bounds the true state during both authentic and spoofed conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems.
- Author
-
Zharkov, Maksim, Veremeenko, Konstantin, Kuznetsov, Ivan, and Pronkin, Andrei
- Subjects
GLOBAL Positioning System ,INERTIAL navigation systems ,HARDWARE-in-the-loop simulation ,ANTENNAS (Electronics) ,ARTIFICIAL satellites in navigation - Abstract
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, the most dangerous interference is the so-called spoofing. Simultaneously, in most cases of GNSS use, an inertial navigation system (INS) or an attitude and heading reference system (AHRS) is also present on the board of mobile objects. In this regard, the research goal is to assess the possibility of detecting GNSS spoofing in inertial satellite navigation systems. This paper examines the method for detecting GNSS spoofing by combining a pair of commercially available GNSS receivers and antennas with an INS or AHRS. The method is based on a comparison of the double differences of GNSS carrier phase measurements performed by receivers under conditions of resolved integer ambiguity and the values of the range double differences predicted using an INS. GNSS carrier phase integer ambiguity can be resolved using a strapdown inertial navigation system (SINS) or AHRS data. The mathematical model of GNSS phase difference measurements and the SINS-predicted satellite range differences model are given. The proposed algorithm calculates the moving average of the residuals between the SINS-predicted satellite range double differences and the measured GNSS carrier phase double differences. The primary criterion for spoofing detection is the specified threshold excess of the moving average of the double difference residuals. Experimental studies are performed using simulation and hardware-in-the-loop simulation. The experimental results allow us to evaluate the efficiency of the proposed approach and estimate the potential characteristics of the spoofing detection algorithm based on it. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Conspiracy Spoofing Orders Detection with Transformer-Based Deep Graph Learning
- Author
-
Kang, Le, Mu, Tai-Jiang, Ning, Xiaodong, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Yang, Xiaochun, editor, Suhartanto, Heru, editor, Wang, Guoren, editor, Wang, Bin, editor, Jiang, Jing, editor, Li, Bing, editor, Zhu, Huaijie, editor, and Cui, Ningning, editor
- Published
- 2023
- Full Text
- View/download PDF
36. An Experimental Analysis on Mapping Strategies for Cepstral Coefficients Multi-projection in Voice Spoofing Detection Problem
- Author
-
Contreras, Rodrigo Colnago, Viana, Monique Simplicio, Guido, Rodrigo Capobianco, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Rutkowski, Leszek, editor, Scherer, Rafał, editor, Korytkowski, Marcin, editor, Pedrycz, Witold, editor, Tadeusiewicz, Ryszard, editor, and Zurada, Jacek M., editor
- Published
- 2023
- Full Text
- View/download PDF
37. GNSS Spoofing Detection via Power and Code Phase Monitoring
- Author
-
Shang, Xiangyong, Sun, Fuping, Wang, Daming, Cui, Jianyong, Xiao, Kai, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Fu, Wenxing, editor, Gu, Mancang, editor, and Niu, Yifeng, editor
- Published
- 2023
- Full Text
- View/download PDF
38. GNSS Spoofing Detection Using Q Channel Energy.
- Author
-
Wang, Jiaqi, Tang, Xiaomei, Ma, Pengcheng, Wu, Jian, Ma, Chunjiang, and Sun, Guangfu
- Subjects
- *
GLOBAL Positioning System - Abstract
Spoofing interference poses a significant challenge to the Global Navigation Satellite System (GNSS). To effectively combat intermediate spoofing signals, this paper presents an enhanced spoofing detection method based on abnormal energy of the quadrature (Q) channel correlators. The detailed principle of this detection method is introduced based on the received signal model under spoofing attack. The normalization parameter used in this method was the estimation of the noise floor. The performance of the proposed Q energy detector is validated through simulations, the Texas Spoofing Test Battery dataset and field tests. The results demonstrate that the proposed detector significantly enhances detection performance compared to signal quality monitoring methods, particularly in overpowered scenarios and dynamic scenarios. By increasing the detection probability in the presence of spoofing signals and decreasing the false alarm probability in the absence of spoofing signals, the proposed detector can better meet the requirements of practical applications. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
39. 基于紧组合残差滑动方差的GNSS 欺骗干扰检测与实验.
- Author
-
丁继成, 任尚垠, 赵 琳, 程建华, and 高洪涛
- Abstract
Copyright of Experimental Technology & Management is the property of Experimental Technology & Management Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
40. Experimental Case Study of Self-Supervised Learning for Voice Spoofing Detection
- Author
-
Yerin Lee, Narin Kim, Jaehong Jeong, and Il-Youp Kwak
- Subjects
Spoofing detection ,self-supervised learning ,contrastive learning ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
This study aims to improve the performance of voice spoofing attack detection through self-supervised pre-training. Supervised learning needs appropriate input variables and corresponding labels for constructing the machine learning models that are to be applied. It is necessary to secure a large number of labeled datasets to improve the performance of supervised learning processes. However, labeling requires substantial inputs of time and effort. One of the methods for managing this requirement is self-supervised learning, which uses pseudo-labeling without the necessity for substantial human input. This study experimented with contrastive learning, a well-performing self-supervised learning approach, to construct a voice spoofing detection model. We applied MoCo’s dynamic dictionary, SimCLR’s symmetric loss, and COLA’s bilinear similarity in our contrastive learning framework. Our model was trained using VoxCeleb data and voice data extracted from YouTube videos. Our self-supervised model improved the performance of the baseline model from 6.93% to 5.26% for a logical access (LA) scenario and improved the performance of the baseline model from 0.60% to 0.40% for a physical access (PA) scenario. In the case of PA, the best performance was achieved when random crop augmentation was applied, and in the case of LA, the best performance was obtained when random crop and random shifting augmentations were considered.
- Published
- 2023
- Full Text
- View/download PDF
41. Detection and Orientation of GNSS Spoofing Based on Positioning Solutions of Three Receivers
- Author
-
Shimiao Chen, Shuyan Ni, Lingfeng Cheng, Tuofeng Lei, Zhuoya Jia, and Qiwei Fu
- Subjects
Spoofing detection ,spoofing orientation ,positioning solutions ,clock offset ,interacting multiple model ,volume Kalman filter ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Spoofing poses a serious security threat to the satellite navigation system. Most of the current spoofing detection methods are based on the information in the receiver-solving process. Applying the above spoofing detection algorithm on the receiver requires a redesign of the original receiver, which limits the application of the deceptive detection method on the ex-factory receiver. In the case of single-station spoofing, the positions of the successfully spoofed multiple receivers are the same according to the deception signal, but the clock offset is different. The single-difference clock offset is positively correlated with the distance between the two receivers. Based on the above principles, this paper proposes a spoofing detection and spoofing direction method based on the positioning solutions of three receivers. The observation value of the baseline length is calculated from the position information in the positioning solution, and spoofing detection is realized by hypothesis testing. The clocks of the three receivers are synchronized. The Adaptive Delta Gradient Descent(ADGD) method is adopted to calculate the spoofing direction according to the single-difference clock offset in the positioning solution. The direction angle is optimized through the Interacting Multiple Model based on the volume Kalman Filter. The relationship between several parameters and the direction accuracy of spoofing is analyzed through simulation tests. Experimental results show that this method can effectively detect and orient spoofing. In addition, the detection and orientation method of spoofing has the advantage of fast response speed, which can realize fast spoofing detection and direction finding in a deception environment.
- Published
- 2023
- Full Text
- View/download PDF
42. Geo-Tagged Spoofing Detection using Jaccard Similarity
- Author
-
Shweta Koparde and Vanita Mane
- Subjects
Spoofing detection ,Dicerete Cosine Transform ,Tanimoto similarity ,Fuzzy filter ,Science ,Mathematics ,QA1-939 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In recent years, position evaluation of mobile devices has developed as an essential part of social movement. Meantime, the criminals may interfere with the information of geographical position (geo-position), and they can adjust the geo-position for their convenience. Therefore, it is important to identify the authenticity of geo-position. In this paper, an instant messaging platform-based geo-tagged spoof image detection system is created using Jaccard similarity. With the help of a Fuzzy filter, the input, as well as spoofing images, are subjected to camera footprint extraction, and their corresponding outputs are fused by Dice Coefficient. Moreover, the input as well as spoofed images is subjected to geotagged process, and their corresponding geotagged input, and geotagged spoofed images are fused by Tanimoto similarity. At last, the fused images from Dice Coefficient, and Tanimoto similarity are employed for the spoof detection process, where the Jaccard similarity compares the two images using Dicerete Cosine Transform (DCT). Consequently, the spoofed images are detected, and their effectiveness is measured in terms of accuracy, False Positive Rate (FPR), and True Positive Rate (TPR), as well as the corresponding values are attained like 0.099, 0.892, and 0.896 respectively.
- Published
- 2023
- Full Text
- View/download PDF
43. Noise-Robust Spoofed Speech Detection Using Discriminative Autoencoder.
- Author
-
Dişken, Gökay and Tüfekçi, Zekeriya
- Subjects
VECTORS (Calculus) ,SIGNAL-to-noise ratio ,DEEP learning ,MACHINE learning ,ARTIFICIAL neural networks - Abstract
Audio spoof detection gained the attention of the researchers recently, as it is vital to detect spoofed speech for automatic speaker recognition systems. Publicly available datasets also accelerated the studies in this area. Many different features and classifiers have been proposed to overcome the spoofed speech detection problem, and some of them achieved considerably high performances. However, under additive noise, the spoof detection performance drops rapidly. On the other hand, the number of studies about robust spoofed speech detection is very limited. The problem becomes more interesting as the conventional speech enhancement methods reportedly performed worse than no enhancement. In this work, i-vectors are used for spoof detection, and discriminative denoising autoencoder (DAE) network is used to obtain enhanced (clean) i-vectors from their noisy counterparts. Once the enhanced i-vectors are obtained, they can be treated as normal i-vectors and can be scored/classified without any modifications in the classifier part. Data from ASVspoof 2015 challenge is used with five different additive noise types, following a similar configuration of previous studies. The DAE is trained in a multicondition manner, using both clean and corrupted i-vectors. Three different noise types at various signal-to-noise ratios are used to create corrupted i-vectors, and two different noise types are used only in the test stage to simulate unknown noise conditions. Experimental results showed that the proposed DAE approach is more effective than the conventional speech enhancement methods. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
44. 基于 GNSS 多通道跟踪接收机的阵列反欺骗方.
- Author
-
张佳琪, 李 归, 姚 元, and 伍光新
- Subjects
GLOBAL Positioning System ,ANTENNA arrays ,SIGNAL processing ,RECEIVING antennas ,SIGNALS & signaling - Abstract
Copyright of Telecommunication Engineering is the property of Telecommunication Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
45. A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components.
- Author
-
Mao, Pengrui, Yuan, Hong, Chen, Xiao, Gong, Yingkui, Li, Shuhui, Li, Ran, Luo, Ruidan, Zhao, Guangyao, Fu, Chengang, and Xu, Jiajia
- Subjects
- *
ANTENNAS (Electronics) - Abstract
The Global Navigation Satellite System (GNSS) is vulnerable to deliberate spoofing signal attacks. Once the user wrongly locks on the spoofing signal, the wrong position, velocity, and time (PVT) information will be calculated, which will harm the user. GNSS spoofing signals are difficult to carry out spoofing attacks in the direction of arrival (DOA) of the real signal, so the spoofing detection method based on DOA is very effective. On the basis of identifying spoofing signals, accurate DOA information of the signal can be further used to locate the spoofer. At present, the existing DOA monitoring methods for spoofing signals are mainly based on dedicated antenna arrays and receivers, which are costly and difficult to upgrade and are not conducive to large-scale deployment, upgrade, and maintenance. This paper proposes a spoofing detection and direction-finding method based on a low-cost commercial GNSS board component (including an antenna). Based on the traditional principle of using a multi-antenna carrier phase to solve DOA, this paper innovatively solves the following problems: the poor direction-finding accuracy caused by the unstable phase center of low-cost commercial antennas, the low success rate of spoofing detection in a multipath environment, and the inconsistent sampling time among multiple low-cost commercial GNSS boards. Moreover, the corresponding prototype equipment for spoofing detection and direction-finding is developed. The measured results show that it can effectively detect spoofing signals in open environments. Under a certain false alarm rate, the detection success rate can reach 100%, and the typical direction-finding accuracy can reach 5 ° . [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. Detection of Voice Conversion Spoofing Attacks Using Voiced Speech
- Author
-
Muttathu Sivasankara Pillai, Arun Sankar, L. De Leon, Phillip, Roedig, Utz, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Reiser, Hans P., editor, and Kyas, Marcel, editor
- Published
- 2022
- Full Text
- View/download PDF
47. Improving Wireless Devices Identification Using Deep Learning Algorithm
- Author
-
Pan, Kefeng, Qiu, Xiaoying, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Sun, Songlin, editor, Hong, Tao, editor, Yu, Peng, editor, and Zou, Jiaqi, editor
- Published
- 2022
- Full Text
- View/download PDF
48. Efficient Physical-Layer Authentication with a Lightweight C&S Model
- Author
-
Pan, Kefeng, Qiu, Xiaoying, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Sun, Songlin, editor, Hong, Tao, editor, Yu, Peng, editor, and Zou, Jiaqi, editor
- Published
- 2022
- Full Text
- View/download PDF
49. Developing a Webpage Phishing Attack Detection Tool
- Author
-
Almutairi, Abdulrahman, Alshoshan, Abdullah I., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
50. Research on Multi-parameter-based Spoofing Detection Method for Satellite-Based Train Positioning
- Author
-
Liu, Jun-xi, Liu, Jiang, Cai, Bai-gen, Wang, Jian, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Yang, Changfeng, editor, and Xie, Jun, editor
- Published
- 2022
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.