Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/116019
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Aeronautical and Aviation Engineering-
dc.contributorMainland Development Office-
dc.creatorHe, Y-
dc.creatorZhuang, X-
dc.creatorXu, B-
dc.date.accessioned2025-11-18T06:49:02Z-
dc.date.available2025-11-18T06:49:02Z-
dc.identifier.urihttp://hdl.handle.net/10397/116019-
dc.language.isoenen_US
dc.publisherMDPI AGen_US
dc.rightsCopyright: © 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).en_US
dc.rightsThe following publication He, Y., Zhuang, X., & Xu, B. (2025). Sparse Decomposition-Based Anti-Spoofing Framework for GNSS Receiver: Spoofing Detection, Classification, and Position Recovery. Remote Sensing, 17(15), 2703 is available at https://doi.org/10.3390/rs17152703.en_US
dc.subjectGNSS receiveren_US
dc.subjectPosition recoveryen_US
dc.subjectSparse decompositionen_US
dc.subjectSpoofing attacken_US
dc.titleSparse decomposition-based anti-spoofing framework for GNSS receiver : spoofing detection, classification, and position recoveryen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume17-
dc.identifier.issue15-
dc.identifier.doi10.3390/rs17152703-
dcterms.abstractAchieving reliable navigation is critical for GNSS receivers subject to spoofing attacks. Utilizing the inherent sparsity and inconsistency of spoofing signals, this paper proposes an anti-spoofing framework for GNSS receivers to detect, classify, and recover positions from spoofing attacks without additional devices. A sparse decomposition algorithm with non-negative constraints limited by signal power magnitudes is proposed to achieve accurate spoofing detections while extracting key features of the received signals. In the classification stage, these features continuously refine each channel of the receiver’s code tracking loop, ensuring that it tracks either the authentic or counterfeit signal components. Moreover, by leveraging the inherent inconsistency of spoofing properties, we incorporate the Hausdorff distance to determine the most overlapped position sets, distinguishing genuine trajectories and mitigating spoofing effects. Experiments on the TEXBAT dataset show that the proposed algorithm detects 98% of spoofing attacks, ensuring stable position recovery with an average RMSE of 6.32 m across various time periods.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationRemote sensing, Aug. 2025, v. 17, no. 15, 2703-
dcterms.isPartOfRemote sensing-
dcterms.issued2025-08-
dc.identifier.scopus2-s2.0-105013088923-
dc.identifier.eissn2072-4292-
dc.identifier.artn2703-
dc.description.validate202511 bcch-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberOA_Scopus/WOSen_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThis work was supported by the Open Fund from the State Key Laboratory of Satellite Navigation System and Equipment Technology (Grant No. CEPNT2022A05).en_US
dc.description.pubStatusPublisheden_US
dc.description.oaCategoryCCen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
remotesensing-17-02703.pdf12.35 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.