Font Size: a A A

The Design And Implementation Of GNSS Spoofing Jamming Simulation System

Posted on:2017-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:L HeFull Text:PDF
GTID:2308330482481314Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
The GNSS spoofing attack is an emerging technology that jams the satellite navigation receivers effectively with lower power.If the receiver tracks the spoofing signal which contains false information,such as ephemeris,it will cause positioning or timing errors.The distance between the satellites and ground is about 26,000 kilometers and the transmitting power of the satellite is about 26.8 watts,so the power of satellite signal is extremely weak when it arrives at the ground and is about-160 dBW.Within several kilometers,even a low-power interference can block or spoof a GNSS receiver.Moreover,GNSS is a backward-compatible technology and its signal structure is public.The spoofing attack may mislead receivers which are mounted on unmanned aerial vehicles,trucks,fishing vessels.If the receiver tracks the spoofing signal,it will bring a variety of adverse consequences.The main contents of this thesis are divided into four parts:1.Points out the disadvantage of the repeater spoofing attack.The additional delay of the spoofing signal and the relationship of spacial position make the arrival time of the spoofing signal lag that of the authentic signal,so the clock error of the receiver will change.It overcomes the defect through revising navigation data.2.Proposes a scheme of how to avoid the spoofing signal to be treated as multipath,so restrained or eliminated,that is,the difference of code phase between the spoofing signal and the authentic signal is small enough,or the code phase of the spoofing signal outstrips that of the authentic signal.3.For the generated spoofing attack,analyzes the scheme of the signal synchronization and distance-measuring error.Through building the spoofing model and the analysis of the working principle of the receiver’s tracking loops,it can conclude that to allow the spoofing signal to enter into the receiver’s tracking loops,the code phase of the spoofing signal can not exceed one chip compared with the authentic signal.The attack includes two stages:signal synchronization and the way of spoofing,and the signal synchronization includes the estimation of the authentic signal’s parameters,such as the signal power,code phase,and Doppler frequency,and signal parameter alignment at any time.It explores how the ionospheric delay and distance-measuring error between the target receiver and the spoofer influence the signal synchronization.4.The signal power condition of successful spoofing is analyzed quantitatively.Most documents published just described the way of spoofing and did not refer to quantitative analysis.Via increasing the spoofing signal’s power and code rate after signal synchronization,the correlation peak of the authentic signal will be stripped gradually.Finally,a simulation test is presented.
Keywords/Search Tags:GNSS spoofing attacks, signal synchronization, tracking loops, correlation peak, distance-measuring error
PDF Full Text Request
Related items