GNSS Aldatma Karşıtı Bir Almaç Mimarisinin Geliştirilmesi
View/ Open
Date
2024Author
Kuralay, Melih Timurcan
xmlui.dri2xhtml.METS-1.0.item-emb
Acik erisimxmlui.mirage2.itemSummaryView.MetaData
Show full item recordAbstract
GNSS spoofing attacks are conducted to deceive a GNSS receiver by imitating
satellite signals, making it appear to be at a different location than it actually is.
These attacks threaten the security of GNSS receivers used in critical applications
such as aviation, military operations, and autonomous vehicles, and, consequently,
the security of these applications. With the proliferation of radio frequency modules,
these attacks have rapidly advanced, making the development of anti-spoofing
measures essential. Anti-spoofing measures are features added to receivers to
counter these spoofing attacks, and an anti-spoofing receiver architecture involves
integrating various techniques and methods into receivers to effectively detect and
mitigate such threats.
In this study, spoofing attacks found in the literature were comprehensively
examined. Different types of spoofing attacks, their underlying mechanisms, and
their potential impacts on various systems were systematically described. The
effects of these attacks, their complexity levels, and the challenges encountered in
detecting and preventing them have been systematically described in detail. These
descriptions aim to emphasize the severity of the threats posed by various spoofing
iv
techniques and the complexities involved in their detection and mitigation
processes.
Additionally, various anti-spoofing methods applied against these attacks were also
examined. Each method was critically evaluated in terms of its effectiveness, with
attention given to the scenarios in which they are most and least effective. Through
a series of experimental studies, specific weaknesses and limitations of the existing
anti-spoofing measures were identified. These weaknesses were carefully analyzed
to explain their causes and potential risks.
Based on the findings from these analyses, a new and reliable anti-spoofing
architecture was proposed to address the shortcomings of current measures. This
proposed architecture aims not only to mitigate known vulnerabilities but also to
offer a more adaptable and resilient defense mechanism capable of responding to
emerging threats. The proposed solution was thoroughly evaluated for its
practicality and effectiveness in real-world applications, making a significant
contribution to efforts to enhance security. GNSS spoofing attacks are conducted to deceive a GNSS receiver by imitating
satellite signals, making it appear to be at a different location than it actually is.
These attacks threaten the security of GNSS receivers used in critical applications
such as aviation, military operations, and autonomous vehicles, and, consequently,
the security of these applications. With the proliferation of radio frequency modules,
these attacks have rapidly advanced, making the development of anti-spoofing
measures essential. Anti-spoofing measures are features added to receivers to
counter these spoofing attacks, and an anti-spoofing receiver architecture involves
integrating various techniques and methods into receivers to effectively detect and
mitigate such threats.
In this study, spoofing attacks found in the literature were comprehensively
examined. Different types of spoofing attacks, their underlying mechanisms, and
their potential impacts on various systems were systematically described. The
effects of these attacks, their complexity levels, and the challenges encountered in
detecting and preventing them have been systematically described in detail. These
descriptions aim to emphasize the severity of the threats posed by various spoofing
iv
techniques and the complexities involved in their detection and mitigation
processes.
Additionally, various anti-spoofing methods applied against these attacks were also
examined. Each method was critically evaluated in terms of its effectiveness, with
attention given to the scenarios in which they are most and least effective. Through
a series of experimental studies, specific weaknesses and limitations of the existing
anti-spoofing measures were identified. These weaknesses were carefully analyzed
to explain their causes and potential risks.
Based on the findings from these analyses, a new and reliable anti-spoofing
architecture was proposed to address the shortcomings of current measures. This
proposed architecture aims not only to mitigate known vulnerabilities but also to
offer a more adaptable and resilient defense mechanism capable of responding to
emerging threats. The proposed solution was thoroughly evaluated for its
practicality and effectiveness in real-world applications, making a significant
contribution to efforts to enhance security.