• Title/Summary/Keyword: 코드기만

Search Result 22, Processing Time 0.017 seconds

The Anti-Spoofing Methods Using Code Antiphase of Spoofing Signal (역 위상 코드를 이용한 기만신호 대응방법)

  • Kim, Taehee;Lee, Sanguk;Kim, Jaehoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1044-1050
    • /
    • 2013
  • This paper analyzes what is mitigated as spoofing attack using the U-Blox Receiver and GPS RF signal generator developed at ETRI. Generally the spoofing attack made the target receiver to be wrong navigation solution by providing false measurement of code and carrier. So we analyzed the impact of spoofing attack through the signal strength and navigation solution. In oder to test of effect of anti-spoofing signal, we consider the signal with antiphase code to spoofing signal and generated GPS normal signal and spoofing signal and anti-spoofing signal using GPS RF signal generator. This paper analyzed that the GPS receiver was responded to the spoofing attack according to code phase difference between spoofing and anti-spoofing signal. We confirmed that the spoofing signal was disappeared by anti-spoofing signal if code phase is an exact match.

Analysis of Effect of Spoofing Signal According to Code Delay in GPS L1 Signal (GPS L1 신호에서 코드지연에 따른 기만신호 영향 분석)

  • Kim, Tae-Hee;Sin, Cheon-Sig;Lee, Sang-Uk
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.128-133
    • /
    • 2012
  • In this paper, we analysis the effect of error of code tracking and frequency tracking according to the chip delay of spoofing signal through the simulation. Firstly, we investigate the type of spoofing signal and defense technical of spoofing attack. For simulation, we generated the intermediate spoofing signal using the software GNSS signal generator simulator(SGGS), the intermediate spoofers synchronize its counterfeit GPS signals with the current broadcast GPS signals. The software GPS receiver simulator(SGRS) received the spoofing signal and normal signal from SGGS, and process the signals. In paper, we can check that the DLL and PLL tracking loop error are generated and pseudo-range is changed non-linear according to chip delay of spoofing signal when the spoofing signal is entered. As a result, we can check that navigation solution is incorrectly effected by spoofing signal.

Analysis of GPS Spoofing Characteristics and Effects on GPS Receiver (GPS 신호기만의 특성 및 수신기에 미치는 영향 분석)

  • Shin, Mi-Young;Cho, Sung-Lyong;Kim, Jun-Oh;Song, Ki-Won;Lee, Sang-Jeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.2
    • /
    • pp.296-303
    • /
    • 2010
  • The term "spoofing" refers to the transmission of counterfeit signals to provide undetectable falsification of GPS service. A spoofing can be accomplished using information from open literature which defines the signal format and the data structure. Spoofing is intended either to produce erroneous navigation solutions or saturate the processor of the victim receiver. The GPS receiver has no way to get rid of the effect of a spoofing because GPS receivers for civil service do not have an anti-spoofing scheme. This paper analyzes the spoofing characteristics, spoofing methods and environment conditions. And the spoofing effects on GPS receiver are analyzed in detail using the designed software-based spoofer and the Nordnav receiver.

Simulation of GNSS Spoofing Detection Method Using Encrypted Ranging Signal (암호화 신호원을 이용한 위성항법 기만 검출기법 모의)

  • So, Hyoungmin
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.5
    • /
    • pp.394-400
    • /
    • 2016
  • It is well known that the encrypted ranging signal, such as GPS P(Y) code, is immune to spoofing attack. However, in order for users to use the signal, there needs permission from the operator. And also there are many restrictions for use because of security issues. In this paper, a ground reference station equipped with high-gain directional antenna and a user receiver were simulated. In the reference station, the encrypted code can be demodulated from the high-gain signal. And then the code can be used to detect spoofing attack in the user receiver. This paper proposes the spoofing detection method using the encrypted signal and deals with simulation results.

Susceptibility of Spoofing On A GPS L1 C/A Signal Tracking Loop (GPS L1 C/A 신호추적루프에서의 기만에 의한 영향)

  • Im, Sung-Hyuck;Im, Jun-Hyuck;Song, Jong-Hwa;Baek, Seung-Woock;Lee, In-Won;Lee, Dae-Yearl;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2011
  • In this paper, code and carrier tracking error which resulted from spoofing signal was analyzed by simulation. For a start, the types of spoofing signals and methods were classified. For the simulation, search spoofing method is assumed because a perfect position and velocity are not generally informed to spoofing device. In most cases, the tracking error is increased but a complete deception does not happen because of the inherent anti-spoofing characteristics of the GPS signal.

Anti-Spoofing Method Using Double Peak Detection in the Two-Dimensional C/A Code Search Space (이차원 C/A 코드 검색 공간에서의 이중피크 검출을 이용한 기만신호 대응 기법)

  • Kwon, Keum-Cheol;Yang, Cheol-Kwan;Shim, Duk-Sun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.157-164
    • /
    • 2013
  • In the presence of spoofing signal the GPS signal having the same PRN with the spoofer is hard to be acquired since the power of spoofing signal is usually stronger than that of GPS signal. If a spoofing signal exists for the same PRN, there are double peaks in two-dimensional space of frequency and code phase in acquisition stage. Using double peak information it is possible to detect spoofing signal and acquire GPS information through separate channel tracking. In this paper we introduce an anti-spoofing method using double peak detection, and thus can acquire GPS navigation data after two-channel tracking for the same PRN as the spoofing signal.

Design of Software-based GPS Spoofing Signal Generator (소프트웨어 기반 GPS 기만 신호 생성기 설계)

  • Lim, Soon;Shin, Mi-Young;Cho, Sung-Lyong;Park, Chan-Sik;Lee, Sang-Jeong
    • Proceedings of the KIEE Conference
    • /
    • 2008.04a
    • /
    • pp.63-64
    • /
    • 2008
  • GPS의 활용 분야는 군용 항법 시스템에서 항공, 선박 등의 개인 항법 시스템으로 확장되었다. GPS가 넓은 범위에서 응용됨에 따라 Jamming과 같은 고의적인 간섭 신호의 제거에 대하여 많은 연구가 진행되었다. 그러나 기만 신호의 특성이나 기만 기법에 대한 연구는 미비하다. 본 논문에서는 기만 신호의 구조와 기만 개념을 연구하였으며 기만신호의 생성 기법으로 항법 메시지를 이용한 기법과 GPS PRN 코드를 이용하여 TOA(Time of Arrival)에 오차를 인가하는 기법을 정리하고 이중 TOA에 오차를 인가하는 방식을 GPS 소프트웨어 플랫폼에 구현하여 기만신호를 생성하였다. 또한 기만 신호 대응 기법의 개발 텐 성능 분석을 위하여 소프트웨어 GPS 수신기를 이용하여 생성한 기만 신호가 GPS 수신기에 미치는 영향을 분석하였다.

  • PDF

Random PRF Pulse Design for Signal Processing Unit of Small Tracking Radar (소형 추적 레이더 신호처리기용 Random PRF 펄스 설계)

  • Hong-Rak Kim;Man-Hee Lee;Sung-Ho Park;Youn-Jin Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.59-64
    • /
    • 2024
  • The small tracking radar randomly changes the transmission period to avoid deceptive signals such as RGPO (Range Gaet Pull Off) operated on the target. Since the code repeats after a specific section, it becomes difficult to avoid a deceptive signal when the repetition is exposed. In this paper, a more realistic transmission pulse code is generated by adding random code generation through FPGA and system white noise. We present the research results of code generation that generates PRF that can avoid repetition while using pseudo-random code in EPROM using FPGA. Also, the result of designing random PRF pulse was confirmed by applying it to tracking radar.

Research on the Implementation of Infrared Threat Surrogate for DIRCM Performance Analysis (지향성 적외선 방해장치 성능분석을 위한 위협체모사기 구축에 관한 연구)

  • Chun, Seung-Woo;Kim, Joy;Cho, Soo-Hyung;Kim, Jae-Hyup;Yu, Hyun-Geun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.97-106
    • /
    • 2015
  • In this paper, the development of infrared threat surrogate system is described and it can be used to verify the performance of DIRCM system. In this research, threat surrogates are manufactured using same F# and reflective optics used in 1st- and 2nd-Gen. real seeker so that the threat surrogate system can be used to develop code-based jamming techniques. Also the threat surrogate system can analyze the saturation jamming effect for image seeker using FPA detector. The result shows that 1st- and 2nd-generation threat surrogates have relatively precise tracking performance and jamming effect.

Design of GPS L1 C/A Spoofing Signal Detection Algorithm (GPS L1 C/A 기만 신호 검출 기법 설계)

  • Lim, Soon;Lim, Deok-Won;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.7-13
    • /
    • 2014
  • In this paper, an effect on a GPS receiver by spoofing signal is analyzed and a GPS spoofing signal detection algorithm for GPS L1 C/A spoofing signal is proposed. A proposed detection algorithm monitors the correlation function distortion by the spoofing signal. If detected distortion is over a detection threshold, we can determine that the spoofing signal is received. The detection threshold is calculated from the statistical characteristics of a thermal noise. For verifying the suggested algorithm, a MATLAB-based simulation platform is implemented. This platform has functionalities to track GPS signal and measure the correlation values. By using this platform, the correlation function distortion by spoofing signal is observed. Also a performance of the algorithm proposed in this paper is applied and confirm the detection of a spoofing signal.