Detecting GNSS Spoofing using a Network of Hardware Oscillators

Published: March 11, 2016


Dhananjay Anand, Tanvir M. Arafin, Gang Qu


In the face of growing concern about spoofing attacks on GNSS transmissions, we propose a scheme to cross validate GNSS based timing against intrinsic properties of local hardware oscillators. We demonstrate our approach as being able to detect certain types of spoofing attacks on the timing reference signal using an ensemble detector test-bed currently in development. Our primary contribution is a linear belief filter applied to a set of low-cost oscillators, organized in a maximum likelihood clock ensemble. Our approach is intended to improve the sensitivity of conventional threshold based detectors that compare time offset between the GNSS stabilized reference and a local free running detector clock to detect changes in offset or slew rate.
Proceedings Title: 48th Annual Precise Time and Time Interval Systems and Applications Meeting
Conference Dates: January 25-28, 2016
Conference Location: Monterey, CA
Pub Type: Conferences


Timing assurance, Security, GPS
Created March 11, 2016, Updated February 19, 2017