Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Detecting GNSS Spoofing using a Network of Hardware Oscillators

Published

Author(s)

Dhananjay Anand, Tanvir M. Arafin, Gang Qu

Abstract

In the face of growing concern about spoofing attacks on GNSS transmissions, we propose a scheme to cross validate GNSS based timing against intrinsic properties of local hardware oscillators. We demonstrate our approach as being able to detect certain types of spoofing attacks on the timing reference signal using an ensemble detector test-bed currently in development. Our primary contribution is a linear belief filter applied to a set of low-cost oscillators, organized in a maximum likelihood clock ensemble. Our approach is intended to improve the sensitivity of conventional threshold based detectors that compare time offset between the GNSS stabilized reference and a local free running detector clock to detect changes in offset or slew rate.
Proceedings Title
48th Annual Precise Time and Time Interval Systems and Applications Meeting
Conference Dates
January 25-28, 2016
Conference Location
Monterey, CA

Keywords

Timing assurance, Security, GPS

Citation

Anand, D. , Arafin, T. and Qu, G. (2016), Detecting GNSS Spoofing using a Network of Hardware Oscillators, 48th Annual Precise Time and Time Interval Systems and Applications Meeting, Monterey, CA (Accessed August 1, 2021)
Created March 11, 2016, Updated February 19, 2017