Citation: | YUAN Dingbo, LI Hong, WANG Fei, et al., “A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation,” Chinese Journal of Electronics, vol. 27, no. 1, pp. 213-222, 2018, doi: 10.1049/cje.2017.11.001 |
U.S. Goverment, "Global positioning system", http://www.gps.gov, 2017-10-01.
|
X. Chen, G. Lenzini, M. Martins, et al., "A trust framework for evaluating GNSS signal integrity", 2013 IEEE 26th Computer Security Foundations Symposium (CSF), pp.179-192, 2013.
|
T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, et al., "Assessing the spoofing threat:Development of a portable GPS civilian spoofer", Proceedings of the ION GNSS International Technical Meeting of the Satellite Division, Vol.5, pp.56-67, 2008.
|
J.S. Warner and R.G. Johnston, "A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing", Journal of Security Administration, Vol.25, No.2, pp.19-27, 2002.
|
B.M. Ledvina, W. J. Bencze, B. Galusha, et al., "An in-line anti-spoofing device for legacy civil GPS receivers", Proceedings of the 2010 International Technical Meeting of the Institute of Navigation, pp.698-712, 2001.
|
M. Nicola, L. Musumeci, M. Pini, et al., "Design of a GNSS spoofing device based on a GPS/Galileo software receiver for the development of robust countermeasures", Proceeding of European Navigation Conference (ENC 2010), pp.19-21, 2010.
|
T.E. Humphreys, "GPS spoofing and the financial sector", http://radionavlab.ae.utexas.edu/publications/196-gpsspoofing-and-the-financial-sector, 2017-10-01.
|
Z. Zhang, S. Gong, A.D. Dimitrovski, et al., "Time synchronization attack in smart grid:Impact and analysis", IEEE Transactions on Smart Grid, Vol.4, No.1, pp.87-98, 2013.
|
D. Divis, "GPS spoofing experiment knocks ship off course", http://www.insidegnss.com/node/3659, 2013-07-31.
|
A. Cavaleri, B. Motella, M. Pini, et al., "Detection of spoofed GPS signals at code and carrier tracking level", 20105th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), pp.1-6, 2010.
|
E.D. Kaplan and C.J. Hegarty, Understanding GPS:Principles and Applications, Second Edition, Artech House, Boston, USA, 2005.
|
D. Yuan, H. Li and M. Lu, "GNSS spoofing mitigation based on joint detection of code doppler and carrier doppler in acquisition", Proceedings of China Satellite Navigation Conference (CSNC), Vol.1, pp.763-774, 2014.
|
G. McLachlan and T. Krishnan, The EM Algorithm and Extensions, John Wiley & Sons, New York, 2001.
|
D.H. Ballard, "Generalizing the Hough transform to detect arbitrary shapes", Pattern Recognition, Vol.13, No.1, pp.111-122, 1981.
|
S.M. Kay, Foundamentals of Statistic Signal Processing Volume Ⅱ:Detection Theory, First Edition, NJ, USA:Prentice Hall, 1993.
|
B.W. Parkinson and J.J. Spilker, Global Positioning System:Theory and Applications, Vol.1, AIAA, Washington DC, 1996.
|
M.A. Wong and T. Lane, "A kth nearest neighbour clustering procedure", in Computer Science and Statistics:Proceedings of the 13th Symposium on the Interface, pp.308-311, 1981.
|
J. Proakis and M. Salehi, Fundamentals of communication systems, NJ, USA:Prentice Hall, 2005.
|