Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/25428
Title: Blind Spoofing Detection for Multi-Antenna Snapshot Receivers using Machine-Learning Techniques
Authors: van der Merwe, Rossouw
Nikolikj, Ana
Kram, Sebastian
Lukcin, Ivana
Nadzinski, Gorjan
Rugamer, Alexander
Felber Wolfgang
Keywords: Spoofing detection, global navigation satellite system (GNSS), antenna array, snapshot processing, blind processing, anti-tamper, machine learning (ML), logistic regression (LR), K-nearest neighbors (KNN), na¨ıve Bayes (NB), decision tree (DT) and support vector machine (SVM)
Issue Date: Sep-2020
Publisher: 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation
Conference: 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation
Abstract: Spoofing, the transmission of false global navigation satellite system (GNSS) signals, is a problem for a GNSS receiver. Therefore, a spoofing attack should be detected by a receiver to ensure the integrity of the position, velocity, and time (PVT) solution. Detecting an attack is more difficult for a snapshot receiver, as temporal changes cannot be used as detection metrics. Further, if the spoofing attacker has access to the receiver, then ideal conditions for spoofing can be facilitated. This paper presents a machine learning (ML) approach of detecting a spoofing attack on a multi-antenna snapshot receiver. Blind detection methods are incorporated, as it is assumed that the antenna array could have been tampered with. The ML approaches include logistic regression (LR), K-nearest neighbors (KNN), na¨ıve Bayes (NB), decision tree (DT) and support vector machine (SVM) algorithms. To ensure sufficient variance for training of the models, a spoofing simulation platform is developed and described in the paper. Training and testing is done on both simulated and real world data sets. Preliminary results indicate good classification, when training on the simulated data and validating on the real recorded data. Several of the ML methods have a classification f1-score exceeding 99 %. Even simple ML methods, like LR, KNN and NB, show good performance, indicating that the selected features are already adequately separating the spoofing and real data. This paper represents the first adaption of ML methods to snapshot based spoofing detection.
URI: http://hdl.handle.net/20.500.12188/25428
DOI: 10.33012/2020.17564
Appears in Collections:Faculty of Electrical Engineering and Information Technologies: Conference Papers
Faculty of Electrical Engineering and Information Technologies: Conference Papers

Show full item record

Page view(s)

29
checked on Apr 24, 2024

Download(s)

39
checked on Apr 24, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.