NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Detecting GNSS Spoofing using a Network of Hardware Oscillators
Published
Author(s)
Dhananjay Anand, Tanvir M. Arafin, Gang Qu
Abstract
In the face of growing concern about spoofing attacks on GNSS transmissions, we propose a scheme to cross validate GNSS based timing against intrinsic properties of local hardware oscillators. We demonstrate our approach as being able to detect certain types of spoofing attacks on the timing reference signal using an ensemble detector test-bed currently in development. Our primary contribution is a linear belief filter applied to a set of low-cost oscillators, organized in a maximum likelihood clock ensemble. Our approach is intended to improve the sensitivity of conventional threshold based detectors that compare time offset between the GNSS stabilized reference and a local free running detector clock to detect changes in offset or slew rate.
Proceedings Title
48th Annual Precise Time and Time Interval Systems and Applications Meeting
Anand, D.
, Arafin, T.
and Qu, G.
(2016),
Detecting GNSS Spoofing using a Network of Hardware Oscillators, 48th Annual Precise Time and Time Interval Systems and Applications Meeting, Monterey, CA
(Accessed October 1, 2025)