Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation

View through CrossRef
To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theoretically analyzes the shortcomings of existing detection algorithms in terms of minor spoofing termination detection performance, and proposes comprehensively utilizing two types of control charts and robust estimation to detect the spoofing end moment, laying a foundation for spoofing duration identification and intermittent minor spoofing detection. The Shewhart control chart-based spoofing detection algorithm (M1) is proposed to achieve rapid spoofing termination detection, serving as one of the baseline algorithms for the joint algorithm. The strengths and weaknesses of the two baseline algorithms (M1 and existing EWMA control chart and robust estimation-based detection algorithm (M2)) in minor spoofing detection are analyzed. Under the robust estimation mechanism, a joint spoofing detection metric that can effectively indicate spoofing termination is constructed by combining their respective spoofing test statistics; then, anomaly detection on the joint detection metric is performed based on sample quantiles to identify the spoofing end moment. The experimental results under various typical abrupt spoofing and slowly varying spoofing scenarios demonstrate that the proposed joint spoofing detection algorithm based on dual control charts and robust estimation satisfies the spoofing alert time requirements specified by the International Civil Aviation Organization (ICAO) for the cruise phase. Compared with existing detection algorithms, the joint algorithm maintains excellent spoofing initiation detection performance while significantly improving both the speed and accuracy of spoofing termination detection. This effectively integrates the advantages of the two baseline algorithms and compensates for their individual limitations when operating independently. Upon timely and effective detection of the start and end moments of minor spoofing, it becomes possible to achieve spoofing duration identification and intermittent minor spoofing detection.
Title: Joint Spoofing Detection Algorithm Based on Dual Control Charts and Robust Estimation
Description:
To address the issue that existing GNSS spoofing detection methods are not suitable for intermittent minor spoofing detection and spoofing duration identification, this paper theoretically analyzes the shortcomings of existing detection algorithms in terms of minor spoofing termination detection performance, and proposes comprehensively utilizing two types of control charts and robust estimation to detect the spoofing end moment, laying a foundation for spoofing duration identification and intermittent minor spoofing detection.
The Shewhart control chart-based spoofing detection algorithm (M1) is proposed to achieve rapid spoofing termination detection, serving as one of the baseline algorithms for the joint algorithm.
The strengths and weaknesses of the two baseline algorithms (M1 and existing EWMA control chart and robust estimation-based detection algorithm (M2)) in minor spoofing detection are analyzed.
Under the robust estimation mechanism, a joint spoofing detection metric that can effectively indicate spoofing termination is constructed by combining their respective spoofing test statistics; then, anomaly detection on the joint detection metric is performed based on sample quantiles to identify the spoofing end moment.
The experimental results under various typical abrupt spoofing and slowly varying spoofing scenarios demonstrate that the proposed joint spoofing detection algorithm based on dual control charts and robust estimation satisfies the spoofing alert time requirements specified by the International Civil Aviation Organization (ICAO) for the cruise phase.
Compared with existing detection algorithms, the joint algorithm maintains excellent spoofing initiation detection performance while significantly improving both the speed and accuracy of spoofing termination detection.
This effectively integrates the advantages of the two baseline algorithms and compensates for their individual limitations when operating independently.
Upon timely and effective detection of the start and end moments of minor spoofing, it becomes possible to achieve spoofing duration identification and intermittent minor spoofing detection.

Related Results

Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS Integrated Navigation System under GNSS Spoofing Attack
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing a...
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
GNSS Spoofing Detection Based on Coupled Visual/Inertial/GNSS Navigation System
Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UA...
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
Detection of Spoofing Used Against the GNSS-Like Underwater Navigation Systems
The purpose of the work is an underwater positioning safety study that used the GNSS-like underwater navigation systems. In the process of research, we used the methods of software...
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
Effect of Facial Shape Information Reflected on Learned Features in Face Spoofing Detection
<p>Face recognition is a convenient and non-contact biometric method used widely for secure personal authentication. However, the face is an exposed body part, and face spoof...
How the power of machine – machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks
How the power of machine – machine learning, data science and NLP can be used to prevent spoofing and reduce financial risks
This paper discusses the potential of machine learning, data science, and natural language processing (NLP) in mitigating the incidence of spoofing and financial risks hinged on cy...
Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems
Global Navigation Satellite System Spoofing Detection in Inertial Satellite Navigation Systems
The susceptibility of global navigation satellite systems (GNSSs) to interference significantly limits the possibility of their use. From the standpoint of possible consequences, t...
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Differential Diagnosis of Neurogenic Thoracic Outlet Syndrome: A Review
Abstract Thoracic outlet syndrome (TOS) is a complex and often overlooked condition caused by the compression of neurovascular structures as they pass through the thoracic outlet. ...

Back to Top