Research on the Responses of GNSS Tracking Loop to Intermediate Spoofing

Chenxi Peng,Hong Li,Mingquan Lu
DOI: https://doi.org/10.33012/2019.16987
2019-01-01
Abstract:GNSS has become an indispensable information infrastructure in our daily life for its function in positioning and timing. But along with its wide application, the security of GNSS is receiving growing concern. Intermediate spoofing, which utilizes the working mechanism of GNSS tracking loop to covertly take over target receiver, poses the most serious near-term threat to GNSS receiver. In order to find corresponding defensive measures, it is essential to understand how GNSS tracking loop reacts to intermediate spoofing. In this paper, simulation framework that mimics actual attack scenario is developed. Through examination of simulation attack, the basic principle behind intermediate spoofing is reviewed. On the basis of above analysis, vulnerability of tracking loops with different loop parameters, such as loop bandwidth and phase discriminator to intermediate spoofing, is evaluated. Furthermore, innovative tracking loop which takes advantage of the redundancy of tracking are evaluated against intermediate spoofing.
What problem does this paper attempt to address?