56
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Use of Supervised Machine Learning for GNSS Signal Spoofing Detection with Validation on Real-World Meaconing and Spoofing Data—Part II

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Global Navigation Satellite System (GNSS) meaconing and spoofing are being considered as the key threats to the Safety-of-Life (SoL) applications that mostly rely upon the use of open service (OS) signals without signal or data-level protection. While a number of pre and post correlation techniques have been proposed so far, possible utilization of the supervised machine learning algorithms to detect GNSS meaconing and spoofing is currently being examined. One of the supervised machine learning algorithms, the Support Vector Machine classification (C-SVM), is proposed for utilization at the GNSS receiver level due to fact that at that stage of signal processing, a number of measurements and observables exists. It is possible to establish the correlation pattern among those GNSS measurements and observables and monitor it with use of the C-SVM classification, the results of which we present in this paper. By adding the real-world spoofing and meaconing datasets to the laboratory-generated spoofing datasets at the training stage of the C-SVM, we complement the experiments and results obtained in Part I of this paper, where the training was conducted solely with the use of laboratory-generated spoofing datasets. In two experiments presented in this paper, the C-SVM algorithm was cross-fed with the real-world meaconing and spoofing datasets, such that the meaconing addition to the training was validated by the spoofing dataset, and vice versa. The comparative analysis of all four experiments presented in this paper shows promising results in two aspects: (i) the added value of the training dataset enrichment seems to be relevant for real-world GNSS signal manipulation attempt detection and (ii) the C-SVM-based approach seems to be promising for GNSS signal manipulation attempt detection, as well as in the context of potential federated learning applications.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Article: not found

          On the training of radial basis function classifiers

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            GNSS Spoofing and Detection

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              A SVM-based detection approach for GPS spoofing attacks to UAV

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                25 March 2020
                April 2020
                : 20
                : 7
                : 1806
                Affiliations
                [1 ]Department of Communication, Information, Systems & Sensors, Royal Military Academy, 1000 Brussels, Belgium
                [2 ]Department of Industrial Systems Engineering and Product Design, Ghent University, 9052 Ghent, Belgium; ivana.semanjski@ 123456ugent.be (I.S.); sidharta.gautama@ 123456ugent.be (S.G.)
                [3 ]Industrial Systems Engineering (ISyE), Flanders Make, Ghent University, 9052 Ghent, Belgium
                [4 ]Septentrio N.V., 3000 Leuven, Belgium; wim.dewilde@ 123456septentrio.com
                Author notes
                [* ]Correspondence: silvio.semanjski@ 123456rma.ac.be ; Tel.: + 32-2-441-4169
                [†]

                This paper is a Part II of the extended version of the paper “Use and Validation of Supervised Machine Learning Approach for Detection of GNSS Signal Spoofing” presented at the 9th International Conference on Localization and GNSS (ICL-GNSS 2019).

                Author information
                https://orcid.org/0000-0002-9226-4112
                https://orcid.org/0000-0003-2795-8094
                https://orcid.org/0000-0001-5628-6974
                Article
                sensors-20-01806
                10.3390/s20071806
                7181202
                32218107
                fc277f1d-2f47-4466-af54-88aa6b9d0eed
                © 2020 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 25 February 2020
                : 23 March 2020
                Categories
                Article

                Biomedical engineering
                global navigation satellite system,spoofing,meaconing,support vector machines,principal component analysis,model validation,safety-of-life,position-navigation-timing,federated learning,gps,gnss,pnt,svm,sol

                Comments

                Comment on this article

                scite_
                0
                0
                0
                0
                Smart Citations
                0
                0
                0
                0
                Citing PublicationsSupportingMentioningContrasting
                View Citations

                See how this article has been cited at scite.ai

                scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

                Similar content517

                Cited by1

                Most referenced authors92