kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Securing GNSS Receivers with a Density-based Clustering Algorithm
KTH, School of Electrical Engineering (EES), Communication Networks.
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Global Navigation Satellite Systems (GNSS) is in widespread use around the world for numerous purposes. Even though it was first developed for military purposes, nowadays, the civilian use has surpassed it by far. It has evolved to its finest state in recent days and still being developed further towards pinpoint accuracy. With all the improvements, several vulnerabilities have been discovered by researchers and exploited by the attackers. Several countermeasures have been and still being implemented to secure the GNSS. Studies show that GNSS-based receivers are still vulnerable to a very fundamentally simple, yet effective, attack; known as the replay attack. The replay attack is particularly harmful since the attacker could make the receiver calculate an inaccurate position, without even breaking the encryption or without employing any sophisticated technique. The Multiple Combinations of Satellites and Systems (MCSS) test is a powerful test against replay attacks on GNSS. However, detecting and identifying multiple attacking signals and determining the correct position of the receiver simultaneously remain as a challenge. In this study, after the implementation of MCSS test, a mechanism to detect the attacker controlled signals has been demonstrated. Furthermore, applying a clustering algorithm on the product of MCSS test, a method of correctly determining the position, nullifying the adversarial effects has also been presented in this report.

Place, publisher, year, edition, pages
2015. , p. 60
Keywords [en]
security, positioning
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:kth:diva-182117OAI: oai:DiVA.org:kth-182117DiVA, id: diva2:903430
Educational program
Master of Science - Network Services and Systems
Supervisors
Examiners
Available from: 2016-05-17 Created: 2016-02-15 Last updated: 2022-06-23Bibliographically approved

Open Access in DiVA

fulltext(2737 kB)350 downloads
File information
File name FULLTEXT02.pdfFile size 2737 kBChecksum SHA-512
c1a9b9928f18fe6ae8eae0a64bc578afc4ee798a1e26f4def442b9914fd67edbd81a89facece3218d3da59132a6273aa1d8856fea56545f3a51b3dfb37d0e96c
Type fulltextMimetype application/pdf

By organisation
Communication Networks
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 350 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 420 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf