Novel Spoofing Mitigation Method using Wavelet Transform Based on PSO Algorithm in the Acquisition Stage of GPS Receiver
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 10, Issue 4
Abstract
The spoofing attack is one of the most serious interferences in the Global Positioning System (GPS). By propagating a signal structurally similar to the original GPS signal, the spoofers try to influence the function of different parts of the receiver and force it to make a wrong positioning. This study focus on the acquisition stage. During the acquisition process, GPS receivers estimate the values of Doppler frequency and Pseudo Random Noise (PRN) code phase of the received signal, which are necessary for tracking the GPS satellite signals. One of the effects of the spoofing signal in the acquisition unit of the receiver is to increase the interactions in the Quadrate correlation taps (Q-correlation tap). In 2018, adding a denoising unit on the Q-correlation tap in the acquisition stage to reduce the interactions mentioned above was presented as a spoofing mitigation method. In this paper, the mentioned method is placed as the primary basis of the work. Here, by using powerful methods of evolutionary computing, the denoising unit added in the Q-correlation tap is tried to be optimally adjusted to mitigate the spoofing attack. Specifically, to achieve a more efficient denoising method for spoofing mitigation, the Particle Swarm Optimization (PSO) algorithm is proposed to determine the critical parameters of the Discrete Wavelet Transform (DWT) based on the Haar wavelet. In order to evaluate the proposed method, first, the noise reduction performance of the algorithm is measured on four benchmark signals, namely Blocks, Bumps, Heavy Sine, and Doppler. Then, compared to four traditional methods, namely, Rigrsure, Heursure, Sqtwolog, and Minimaxi, the developed de-nosing method outperformed the former methods by 47.3%, 38.4%, 47,3%, and 30%, respectively. Finally, the proposed algorithm was placed in the Q-correlation tap of the GPS receiver acquisition stage, and its performance in reducing the spoof effects was investigated. The results show that the proposed algorithm is 37.74% more efficient compared to the method that was considered the primary method.
Authors and Affiliations
Reza Soleimani Majd,S. Tohidi,Mohammad Reza Mosavi,
A Trust Evaluation Model for Cloud Computing Using Bayesian Network
In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud...
Reducing the Effects of Deception Attack on GPS Receivers of Phasor Measurement Units using Neural Networks
Accurate timing is one of the key features of the Global Positioning System (GPS), which is employed in many critical infrastructures. Any imprecise time measurement in GPS-based structures, such as smart power grids, an...
Improve the detection of dangerous objects in x-ray images in security and military inspections using image processing approaches
Detection of dangerous objects in images obtained by X-ray scanners in security inspections has played an important role in protecting the public space from security threats such as terrorism and the occurrence of danger...
Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis
Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...
A Greedy Algorithm for Constructing Region-Fault Tolerant Geometric Spanners
In this paper, we consider the problem of constructing the region-fault tolerant geometric spanners when the problem is restricted to a subclass of convex regions. Let S be a set of n points in the plane. In particular,...