Claudio Sulas
Study and development of innovative technique to detect GNSS spoofing attack relying on inertial sensor data in automotive domain.
Rel. Fabio Dovis, Alex Minetto. Politecnico di Torino, Corso di laurea magistrale in Ict For Smart Societies (Ict Per La Società Del Futuro), 2026
|
|
PDF (Tesi_di_laurea)
- Tesi
Accesso limitato a: Solo utenti staff fino al 27 Marzo 2029 (data di embargo). Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (16MB) |
Abstract
Global Navigation Satellite Systems (GNSS) are widely employed in safety-critical applications such as intelligent transportation systems, autonomous vehicles, and unmanned platforms. Despite their extensive adoption, civilian GNSS receivers remain highly vulnerable to spoofing attacks, in which counterfeit signals are transmitted to manipulate the position, velocity, and timing estimates of a victim receiver. Depending on the level of temporal alignment between genuine and counterfeit signals, GNSS spoofing attacks can be broadly classified into asynchronous spoofing, synchronous spoofing, and meaconing. From an adversarial perspective, the complexity of execution varies significantly across these categories. Asynchronous attacks and simple meaconing are becoming increasingly accessible due to the proliferation of low-cost Commercial Off-The-Shelf (COTS) Software-Defined Radios (SDRs), allowing even non-expert actors to disrupt navigation services.
Synchronous spoofing represents a sophisticated threat requiring precise alignment of the counterfeit code phase, carrier phase, and Doppler shift to seamlessly hijack tracking loops without triggering integrity alarms
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
