Si-Qi Wang;Jiang Liu;Bai-gen Cai;Jian Wang;De-biao Lu
{"title":"Multidomain Joint Spoofing Detection Based on a Semi-Supervised Detection Network for GNSS-Based Train Positioning","authors":"Si-Qi Wang;Jiang Liu;Bai-gen Cai;Jian Wang;De-biao Lu","doi":"10.1109/TAES.2024.3496414","DOIUrl":null,"url":null,"abstract":"As the positioning technology advances, the global navigation satellite system (GNSS) has been highly concerned in railway systems. Meanwhile, the attack surface to GNSS-enabled train positioning has expanded, and thus, the concerns regarding the positioning security have increased. To deal with potential threats from a GNSS spoofing attack, research on active detection is conducted. A framework of multi-domain-feature-based spoofing detection is established, under which the semi-supervised GANomaly network is designed to generate the data-driven model. Different blocks, including the multiscale group dilated convolution, the attention gate, and double-dilated temporal convolutional network residual block, are involved to improve the reconstruction ability of the vanilla GANomaly network. A dynamic threshold mechanism is adopted in identifying the existence of the spoofing attack. The experimental results with the open-source Texas Spoofing Test Battery dataset under the ds7 static scenario and a railway train dataset from the spoofing injection test demonstrate the certain advantages of the proposed solution over the reference single-feature-based methods and existing networks, which highlight the potential for achieving the resilient train positioning under the observing conditions with respect to the adopted datasets.","PeriodicalId":13157,"journal":{"name":"IEEE Transactions on Aerospace and Electronic Systems","volume":"61 2","pages":"3936-3949"},"PeriodicalIF":5.7000,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Aerospace and Electronic Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10750484/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, AEROSPACE","Score":null,"Total":0}
引用次数: 0
Abstract
As the positioning technology advances, the global navigation satellite system (GNSS) has been highly concerned in railway systems. Meanwhile, the attack surface to GNSS-enabled train positioning has expanded, and thus, the concerns regarding the positioning security have increased. To deal with potential threats from a GNSS spoofing attack, research on active detection is conducted. A framework of multi-domain-feature-based spoofing detection is established, under which the semi-supervised GANomaly network is designed to generate the data-driven model. Different blocks, including the multiscale group dilated convolution, the attention gate, and double-dilated temporal convolutional network residual block, are involved to improve the reconstruction ability of the vanilla GANomaly network. A dynamic threshold mechanism is adopted in identifying the existence of the spoofing attack. The experimental results with the open-source Texas Spoofing Test Battery dataset under the ds7 static scenario and a railway train dataset from the spoofing injection test demonstrate the certain advantages of the proposed solution over the reference single-feature-based methods and existing networks, which highlight the potential for achieving the resilient train positioning under the observing conditions with respect to the adopted datasets.
期刊介绍:
IEEE Transactions on Aerospace and Electronic Systems focuses on the organization, design, development, integration, and operation of complex systems for space, air, ocean, or ground environment. These systems include, but are not limited to, navigation, avionics, spacecraft, aerospace power, radar, sonar, telemetry, defense, transportation, automated testing, and command and control.