CN117353985A - A GNSS generative spoofing attack detection method based on CNN-LSTM - Google Patents
A GNSS generative spoofing attack detection method based on CNN-LSTM Download PDFInfo
- Publication number
- CN117353985A CN117353985A CN202311219501.4A CN202311219501A CN117353985A CN 117353985 A CN117353985 A CN 117353985A CN 202311219501 A CN202311219501 A CN 202311219501A CN 117353985 A CN117353985 A CN 117353985A
- Authority
- CN
- China
- Prior art keywords
- gnss
- model
- signal
- lstm
- cnn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 45
- 238000000034 method Methods 0.000 claims abstract description 36
- 238000012360 testing method Methods 0.000 claims abstract description 27
- 238000013527 convolutional neural network Methods 0.000 claims abstract description 17
- 238000012549 training Methods 0.000 claims abstract description 12
- 238000013528 artificial neural network Methods 0.000 claims abstract description 7
- 230000000694 effects Effects 0.000 claims abstract description 7
- 238000011156 evaluation Methods 0.000 claims abstract description 7
- 230000002159 abnormal effect Effects 0.000 claims abstract description 4
- 238000010606 normalization Methods 0.000 claims abstract description 4
- 230000007787 long-term memory Effects 0.000 claims abstract description 3
- 230000006403 short-term memory Effects 0.000 claims abstract description 3
- 238000007781 pre-processing Methods 0.000 claims description 13
- 230000006870 function Effects 0.000 claims description 12
- 238000003062 neural network model Methods 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 claims description 9
- 239000013598 vector Substances 0.000 claims description 7
- 238000005457 optimization Methods 0.000 claims description 6
- 230000015654 memory Effects 0.000 claims description 4
- 230000004913 activation Effects 0.000 claims description 3
- 238000007405 data analysis Methods 0.000 claims description 3
- 238000013075 data extraction Methods 0.000 claims description 3
- 230000007613 environmental effect Effects 0.000 claims description 3
- 238000002474 experimental method Methods 0.000 claims description 3
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims description 3
- 238000012886 linear function Methods 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 230000003068 static effect Effects 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000002759 z-score normalization Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 abstract description 2
- 238000005242 forging Methods 0.000 abstract 1
- 238000010801 machine learning Methods 0.000 description 2
- 238000003672 processing method Methods 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/044—Recurrent networks, e.g. Hopfield networks
- G06N3/0442—Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
- G06N3/0455—Auto-encoder networks; Encoder-decoder networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/0464—Convolutional networks [CNN, ConvNet]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/088—Non-supervised learning, e.g. competitive learning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Computation (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Software Systems (AREA)
- Mathematical Physics (AREA)
- General Health & Medical Sciences (AREA)
- Molecular Biology (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A GNSS generation type deception attack detection method based on CNN-LSTM includes: 1) Performing a generative spoofing attack on the GNSS, i.e. misleading the GNSS receiver by forging a spoofing signal; 2) The acquired GNSS data is collected and pre-processed, including normalization and the like, to prepare the data sets for training and testing the model. 3) Constructing a CNN-LSTM network model: constructing a network model by using a method of combining a Convolutional Neural Network (CNN) and a long-term and short-term memory neural network, optimizing parameters of the model by using a self-adaptive moment estimation method, and applying the parameters to the network model; 4) Training a model and evaluating detection effects: training the constructed CNN-LSTM network model by using the mean square error and the accuracy as evaluation indexes, and evaluating the effect of the CNN-LSTM network model in the aspects of detecting and classifying abnormal signals; 5) Attack detection: the trained model is selected to be applied to the detection of GNSS generated spoofing attacks in the actual scene. The method combines the convolution network with the LSTM for detecting the deception signal, and improves the detection accuracy by using the CNN for feature extraction and the LSTM for sequence modeling.
Description
Technical Field
The invention relates to the technical field of signal security, in particular to a GNSS generation type spoofing attack detection method based on CNN-LSTM.
Background
Today, global positioning system (GNSS) services have been widely used in a variety of fields, including smartphones, wearable devices, and almost all traffic systems. These applications all rely on GNSS-provided location-based services such as navigation, vehicle monitoring, and self-positioning and rescue in emergency situations. Although GNSS is widely used today, it is also vulnerable to spoofing attacks that can lead to catastrophic results.
In view of the potential hazards of GNSS spoofing attacks, many effective countermeasures have been investigated. These countermeasures can be divided into three categories: cryptography-based methods, signal processing methods and external mobility characteristics. Cryptography-based methods utilize encryption techniques to encrypt GPS signals and require keys to decrypt. Signal processing methods extract spatial and geometric features from legitimate GPS signals, or extract physical layer features such as angle of arrival, signal strength, signal phase, and discontinuities. Whereas methods based on external mobility characteristics measure the speed and acceleration of the mobility device by means of sensors of the control system, such as barometers, inertial measurement units and compasses. However, these GPS spoofing detection methods have some drawbacks that limit their application. For example, encryption methods are not suitable for residential applications because these applications require acquisition of unencrypted GPS signals. While methods based on signal processing or external mobility characteristics may require additional hardware (sensors or antennas) or auxiliary equipment, may require changing interface specifications or increasing the overhead of signal processing, thereby adversely affecting the performance of the real-time system or adding additional communication overhead.
Therefore, the prior art does not achieve an obvious and accurate prediction effect in the aspect of abnormality detection. Some studies based on conventional machine learning techniques have been proposed to classify and detect GPS spoofing attacks against drones. These models provide an effective solution to the problem in GPS spoofing detection. In order to solve these problems, in the current complex attack environment, it is highly desirable to provide an effective fraud detection method.
Disclosure of Invention
In order to overcome the defects of the existing detection method, the invention provides a GNSS generated type spoofing attack detection method based on CNN-LSTM.
The technical scheme adopted for solving the technical problems is as follows:
a CNN-LSTM based GNSS generated spoofing attack detection method, the method comprising the steps of:
1) Global positioning System GNSS generated spoofing attack: generating GNSS deception signals in real time by using an online map through a signal transmitter to attack;
2) Data acquisition and preprocessing: collecting GNSS clean signal samples and deception signal samples respectively, and extracting key observables of the signal sample files to obtain feature vectors serving as input quantities of the neural network model; then preprocessing the data, including normalization and first-order differential processing;
3) Constructing a CNN-LSTM network model: constructing a neural network model combined by a convolutional neural network CNN and a long-short-term memory neural network LSTM based on unsupervised learning; training and verifying by using clean signal sample data, and testing by using deceptive signal sample data;
4) Model test: selecting a proper deception data set to test the model, and using a Mean Square Error (MSE) and an Accuracy (Accuracy) as evaluation indexes to evaluate the prediction and deception detection effects of the model;
5) Attack detection: the trained model is selected to be applied to the detection of GNSS generated spoofing attacks in the actual scene.
Further, in the step 1), the GNSS-generated spoofing attack includes the following procedures:
and step 101, acquiring fake GPS coordinate data through programming of a Web server based on PyWeb, and modifying the spoofed target position in real time by utilizing an online map to generate a spoofed signal file.
Step 102, sending the deception signal file to a specific input port of a signal generation transmitting terminal through a socket to realize real-time GNSS deception attack.
Still further, in the step 2), the data acquisition and preprocessing includes the following processes;
step 201, collecting clean signal samples and spoofed signal samples by using USRP, GNU Radio and UHD respectively, and performing observably data extraction on the signal sample file.
Step 202, screening out critical observable variables by comparing significant differences of amplitudes of observable variables of signal processing blocks (acquisition, tracking, observable and PVT) in the clean signal samples and the spoofed signal samples in different modes, and obtaining feature vectors input as a neural network model. The eigenvectors include doppler shift, signal-to-noise ratio, values of the hinting correlation factor in the in-phase component, and values of the hinting correlation factor in the quadrature component.
Step 203, preprocessing the screened observable variable data, including Z-Score normalization and first order difference processing, and calculating the following formula:
wherein μ, σ are the mean and variance of the original dataset, respectively.
A(n)=A(n)-A(n-1) (2)
Where A (n) is the value of the current data point and A (n-1) represents the value of the previous data point.
In the step 3), constructing the CNN-LSTM network model comprises the following steps:
step 301, constructing a neural network model formed by combining a convolutional neural network CNN based on unsupervised learning and a long-term and short-term memory neural network LSTM. The model includes an input layer, an encoder, a hidden layer, a decoder, and an output layer.
The encoder and decoder consist of two convolutional layers and two transposed convolutional layers, respectively, with the hidden layer being the LSTM used to extract meaningful feature representations to reconstruct the data. The number of nodes of the input layer and the output layer is 4, the number of nodes of the hidden layer is 8, and the numbers of nodes of the encoder and the decoder are 16 and 8 respectively.
The loss function uses a mean square error. The optimization method selects the self-adaptive moment estimation to realize the fastest convergence of model training and the optimization of model parameters, and the calculation formula is as follows:
wherein m is the first moment of the gradient, beta1 is the first moment attenuation coefficient, dx is the original gradient, v is the second moment of the gradient, bata2 is the second moment attenuation coefficient, x is the updated parameter, learning_rate is the learning rate, eps is the steady state value, in order to ensure that the square root term in the denominator does not become too small, prevent the divide by 0 error, and thereby avoid numerical instability.
The activation function is selected from elu function and linear function, and the calculation formula is as follows:
where α is a constant used to control the curve shape of the elu function in the negative region.
f(x)=mx+b (5)
Where m is the slope and m+.0, b is the intercept of f (x) on the y-axis.
The filling mode adopts the same method.
Step 302, clean signal sample data is used for training and verification, and spoof signal sample data is used for testing.
Further, eps is a very small number defaulting to 1e-8; typically α takes a small positive number, such as 1.0.
In the step 4), the model test comprises the following steps:
step 401, model test is performed using a real acquisition spoof dataset TEXBAT published by the university of texas, which contains eight scene datasets. Wherein, the data is set to instantaneous switch in ds1 scene. ds2 allows the GNSS receiver to track the spoofed signal with greater power advantage. The power of the spoofing signal in ds3, ds4 gradually increases from low to high, and finally remains substantially the same as the true satellite signal power. ds5, ds6 are both dynamic data collected by in-vehicle experiments. Because the dynamic data is greatly influenced by environmental factors such as multipath, the invention only considers the influence of the deception signal on the GNSS receiver in the static environment, and therefore, the invention does not test on ds5 and ds 6. ds7 is similar to ds3, but the carrier phase of the spoofed signal in ds7 is perfectly matched to the true signal. ds8 is substantially the same as ds7 but contains zero delay security code estimates. In the test phase, predictions and detections are made on spoof data samples using models that have been trained on clean signal sample data.
In step 402, in order to quantitatively evaluate the prediction and detection performance of the CNN-LSTM model, a Mean Square Error (MSE) and an Accuracy (Accuracy) are used as evaluation indexes, and the calculation formula is as follows:
wherein, right_prediction is the number of correctly detected labels, and test_total_num is the total number of test labels.
The attack detection in step 5) specifically includes:
in step 501, the trained attack detection model is integrated into the unmanned GNSS receiver module. Once the unmanned aerial vehicle starts, the receiver will constantly monitor unmanned aerial vehicle's GNSS signal, and the embedded model can monitor whether there is abnormal signal to interfere normal satellite signal simultaneously.
In step 502, the receiver integrated with the attack detection model performs real-time GNSS signal data analysis to identify whether a rogue signal exists. When a spoofing signal is detected, the receiver module of the drone may sound an alarm.
The technical concept of the invention is that the invention provides a method for combining LSTM with convolutional neural network, carrying out data preprocessing by using spoofing signal data acquired by USRP and other systems, and then adopting CNN-LSTM method to detect the data.
The beneficial effects of the invention are mainly shown in the following steps: the two network structures are combined together, so that detection is successfully performed, and compared with the traditional machine learning method, a better detection effect is achieved.
Drawings
Fig. 1 is a flow chart of the method of the present invention.
Fig. 2 is a block diagram of a CNN-LSTM network model.
Detailed Description
The invention will be further described with reference to the accompanying drawings,
referring to fig. 1, a GNSS-generated spoofing attack detecting method based on CNN-LSTM includes the steps of:
1) Global positioning System GNSS generated spoofing attack: generating GNSS deception signals in real time by using an online map through a signal transmitter to attack;
2) Data acquisition and preprocessing: collecting GNSS clean signal samples and deception signal samples respectively, and extracting key observables of the signal sample files to obtain feature vectors serving as input quantities of the neural network model; then preprocessing the data, including normalization and first-order differential processing;
3) Constructing a CNN-LSTM network model: constructing a neural network model combined by a convolutional neural network CNN and a long-short-term memory neural network LSTM based on unsupervised learning; training and verifying by using clean signal sample data, and testing by using deceptive signal sample data;
4) Model test: selecting a proper deception data set to test the model, and using a Mean Square Error (MSE) and an Accuracy (Accuracy) as evaluation indexes to evaluate the prediction and deception detection effects of the model;
5) Attack detection: the trained model is selected to be applied to the detection of GNSS generated spoofing attacks in the actual scene.
Further, in the step 1), the GNSS-generated spoofing attack includes the following procedures:
and step 101, acquiring fake GPS coordinate data through programming of a Web server based on PyWeb, and modifying the spoofed target position in real time by utilizing an online map to generate a spoofed signal file.
Step 102, sending the deception signal file to a specific input port of a signal generation transmitting terminal through a socket to realize real-time GNSS deception attack.
Still further, in step 2), the data acquisition and preprocessing includes the following steps;
step 201, collecting clean signal samples and spoofed signal samples by using USRP, GNU Radio and UHD respectively, and performing observably data extraction on the signal sample file.
Step 202, screening out critical observable variables by comparing significant differences of amplitudes of observable variables of signal processing blocks (acquisition, tracking, observable and PVT) in the clean signal samples and the spoofed signal samples in different modes, and obtaining feature vectors input as a neural network model. The eigenvectors include doppler shift, signal-to-noise ratio, values of the hinting correlation factor in the in-phase component, and values of the hinting correlation factor in the quadrature component.
Step 203, preprocessing the screened observable variable data, including Z-Score normalization and first order difference processing, and calculating the following formula:
wherein μ, σ are the mean and variance of the original dataset, respectively.
A(n)=A(n)-A(n-1) (2)
Where A (n) is the value of the current data point and A (n-1) represents the value of the previous data point.
In the step 3), constructing the CNN-LSTM network model comprises the following steps:
step 301, a neural network model formed by combining a convolutional neural network CNN based on unsupervised learning and a long-short-term memory neural network LSTM is constructed, referring to fig. 2. The model includes an input layer, an encoder, a hidden layer, a decoder, and an output layer.
The encoder and decoder consist of two convolutional layers and two transposed convolutional layers, respectively, with the hidden layer being the LSTM used to extract meaningful feature representations to reconstruct the data. The number of nodes of the input layer and the output layer is 4, the number of nodes of the hidden layer is 8, and the numbers of nodes of the encoder and the decoder are 16 and 8 respectively.
The loss function uses a mean square error. The optimization method selects the self-adaptive moment estimation to realize the fastest convergence of model training and the optimization of model parameters, and the calculation formula is as follows:
wherein m is the first moment of the gradient, beta1 is the first moment attenuation coefficient, dx is the original gradient, v is the second moment of the gradient, bata2 is the second moment attenuation coefficient, x is the updated parameter, learning_rate is the learning rate, eps is the steady state value, in order to ensure that the square root term in the denominator does not become too small, prevent the divide by 0 error, and thereby avoid numerical instability.
The activation function is selected from elu function and linear function, and the calculation formula is as follows:
where α is a constant used to control the curve shape of the elu function in the negative region.
f(x)=mx+b (5)
Where m is the slope and m+.0, b is the intercept of f (x) on the y-axis.
The filling mode adopts the same method.
Step 302, clean signal sample data is used for training and verification, and spoof signal sample data is used for testing.
eps is a very small number defaulting to 1e-8; typically α takes a small positive number, such as 1.0.
In the step 4), the model test comprises the following steps:
step 401, model test is performed using a real acquisition spoof dataset TEXBAT published by the university of texas, which contains eight scene datasets. Wherein, the data is set to instantaneous switch in ds1 scene. ds2 allows the GNSS receiver to track the spoofed signal with greater power advantage. The power of the spoofing signal in ds3, ds4 gradually increases from low to high, and finally remains substantially the same as the true satellite signal power. ds5, ds6 are both dynamic data collected by in-vehicle experiments. Because the dynamic data is greatly influenced by environmental factors such as multipath, the invention only considers the influence of the deception signal on the GNSS receiver in the static environment, and therefore, the invention does not test on ds5 and ds 6. ds7 is similar to ds3, but the carrier phase of the spoofed signal in ds7 is perfectly matched to the true signal. ds8 is substantially the same as ds7 but contains zero delay security code estimates. In the test phase, predictions and detections are made on spoof data samples using models that have been trained on clean signal sample data.
In step 402, in order to quantitatively evaluate the prediction and detection performance of the CNN-LSTM model, a Mean Square Error (MSE) and an Accuracy (Accuracy) are used as evaluation indexes, and the calculation formula is as follows:
wherein, right_prediction is the number of correctly detected labels, and test_total_num is the total number of test labels.
The attack detection in step 5) specifically includes:
in step 501, the trained attack detection model is integrated into the unmanned GNSS receiver module. Once the unmanned aerial vehicle starts, the receiver will constantly monitor unmanned aerial vehicle's GNSS signal, and the embedded model can monitor whether there is abnormal signal to interfere normal satellite signal simultaneously.
In step 502, the receiver integrated with the attack detection model performs real-time GNSS signal data analysis to identify whether a rogue signal exists. When a spoofing signal is detected, the receiver module of the drone may sound an alarm.
The present invention combines a convolutional network with an LSTM for spoofing signal detection. By using CNN for feature extraction and LSTM for sequence modeling, the method aims to improve detection accuracy. The method belongs to the technical field of anomaly detection, and successfully realizes accurate detection of the deception signal.
The embodiments described in the present specification are merely examples of implementation forms of the inventive concept, and the scope of protection of the present invention should not be construed as being limited to the specific forms set forth in the embodiments, and the scope of protection of the present invention and equivalent technical means that can be conceived by those skilled in the art based on the inventive concept.
Claims (7)
1. A GNSS generation type deception attack detection method based on CNN-LSTM is characterized in that: the method comprises the following steps:
1) Global positioning System GNSS generated spoofing attack: generating GNSS deception signals in real time by using an online map through a signal transmitter to attack;
2) Data acquisition and preprocessing: collecting GNSS clean signal samples and deception signal samples respectively, and extracting key observables of the signal sample files to obtain feature vectors serving as input quantities of the neural network model; then preprocessing the data, including normalization and first-order differential processing;
3) Constructing a CNN-LSTM network model: constructing a neural network model combined by a convolutional neural network CNN and a long-short-term memory neural network LSTM based on unsupervised learning; training and verifying by using clean signal sample data, and testing by using deceptive signal sample data;
4) Model test: selecting a proper deception data set to test the model, and using a Mean Square Error (MSE) and an Accuracy (Accuracy) as evaluation indexes to evaluate the prediction and deception detection effects of the model;
5) Attack detection: the trained model is selected to be applied to the detection of GNSS generated spoofing attacks in the actual scene.
2. The method for detecting GNSS-generated spoofing attack of claim 1 wherein the method is based on CNN-LSTM, wherein: the GNSS-generated spoofing attack described in step 1) specifically includes:
step 101, acquiring fake GPS coordinate data through programming of a Web server based on PyWeb, and modifying a spoofing target position in real time by utilizing an online map to generate a spoofing signal file;
step 102, sending the deception signal file to a specific input port of a signal generation transmitting terminal through a socket to realize real-time GNSS deception attack.
3. The method for detecting GNSS-generated spoofing attack of claim 1 wherein the method is based on CNN-LSTM, wherein: the data acquisition and preprocessing in the step 2) specifically comprises the following steps:
step 201, respectively collecting a clean signal sample and a deception signal sample by using USRP, GNU Radio and UHD, and performing observably data extraction on a signal sample file;
step 202, screening out key observable variables by comparing significant differences of amplitudes of observable variables of signal processing blocks in clean signal samples and spoofed signal samples in different modes, and obtaining feature vectors input as a neural network model; the feature vector comprises Doppler frequency shift, signal to noise ratio, and value of prompt correlation factor in-phase component, and value of prompt correlation factor in quadrature component;
step 203, preprocessing the screened observable variable data, including Z-Score normalization and first order difference processing, and calculating the following formula:
wherein μ and σ are the mean and variance of the original dataset, respectively;
A(n)=A(n)-A(n-1) (2)
where A (n) is the value of the current data point and A (n-1) represents the value of the previous data point.
4. The method for detecting GNSS-generated spoofing attack of claim 1 wherein the method is based on CNN-LSTM, wherein: the constructing the CNN-LSTM network model in the step 3) specifically comprises the following steps:
step 301, constructing a neural network model formed by combining a convolutional neural network CNN based on unsupervised learning and a long-term and short-term memory neural network LSTM; the model comprises an input layer, an encoder, a hidden layer, a decoder and an output layer;
the encoder and decoder are respectively composed of two convolution layers and two transposed convolution layers, the hidden layer being an LSTM for extracting meaningful feature representations to reconstruct the data; the number of nodes of the input layer and the output layer is 4, the number of nodes of the hidden layer is 8, and the numbers of nodes of the encoder and the decoder are 16 and 8 respectively;
the loss function selects mean square error; the optimization method selects the self-adaptive moment estimation to realize the fastest convergence of model training and the optimization of model parameters, and the calculation formula is as follows:
wherein m is the first moment of the gradient, beta1 is the first moment attenuation coefficient, dx is the original gradient, v is the second moment of the gradient, bata2 is the second moment attenuation coefficient, x is the updated parameter, learning_rate is the learning rate, eps is the steady state value, in order to ensure that the square root term in the denominator does not become too small, prevent 0 removal error, and avoid numerical instability;
the activation function is selected from elu function and linear function, and the calculation formula is as follows:
where α is a constant for controlling the curve shape of the elu function in the negative region;
f(x)=mx+b (5)
wherein m is the slope and m is not equal to 0, b is the intercept of f (x) on the y axis;
the filling mode adopts the same method;
step 302, clean signal sample data is used for training and verification.
5. The method for detecting GNSS-generated fraud based on CNN-LSTM according to claim 4, wherein: eps is a very small number defaulting to 1e-8; α takes a small positive number, such as 1.0.
6. The method for detecting GNSS-generated fraud based on CNN-LSTM according to claim 1, wherein:
the model test in the step 4) specifically comprises the following steps:
step 401, performing model testing using a real acquisition spoof dataset TEXBAT published by university of texas, which dataset contains eight scene datasets; wherein, the data under ds1 scene is set as instantaneous switching; ds2 allows the GNSS receiver to track the spoofing signal with greater power advantage; the power of the deception signals in ds3 and ds4 is gradually changed from low to high, and finally, the power is basically consistent with the power of the real satellite signals; ds5, ds6 are both dynamic data collected by in-vehicle experiments; because the dynamic data is greatly influenced by environmental factors such as multipath and the like, only the influence of the deception signal on the GNSS receiver in the static environment is considered, so that the testing is not performed on ds5 and ds 6; ds7 is similar to ds3, but the carrier phase of the spoofed signal in ds7 is perfectly matched to the true signal; ds8 is substantially the same as ds7, but contains zero delay security code estimates; in the test stage, predicting and detecting on the deception data samples using a model trained on clean signal sample data;
in step 402, in order to quantitatively evaluate the prediction and detection performance of the CNN-LSTM model, a Mean Square Error (MSE) and an Accuracy (Accuracy) are used as evaluation indexes, and the calculation formula is as follows:
where a smaller value of MSE represents a higher accuracy of the predictive model because it measures the square of the average error between the model's predictions and the actual observations. The right_prediction is the number of correctly detected labels, and the test_total_num is the total number of test labels.
7. The method for detecting GNSS-generated fraud based on CNN-LSTM according to claim 1, wherein: the attack detection in step 5) specifically includes:
in step 501, the trained attack detection model is integrated into the unmanned GNSS receiver module. Once the unmanned aerial vehicle starts, the receiver will constantly monitor unmanned aerial vehicle's GNSS signal, and the embedded model can monitor whether there is abnormal signal to interfere normal satellite signal simultaneously.
In step 502, the receiver integrated with the attack detection model performs real-time GNSS signal data analysis to identify whether a rogue signal exists. When a spoofing signal is detected, the receiver module of the drone may sound an alarm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311219501.4A CN117353985A (en) | 2023-09-20 | 2023-09-20 | A GNSS generative spoofing attack detection method based on CNN-LSTM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311219501.4A CN117353985A (en) | 2023-09-20 | 2023-09-20 | A GNSS generative spoofing attack detection method based on CNN-LSTM |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117353985A true CN117353985A (en) | 2024-01-05 |
Family
ID=89367453
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311219501.4A Pending CN117353985A (en) | 2023-09-20 | 2023-09-20 | A GNSS generative spoofing attack detection method based on CNN-LSTM |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117353985A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117896176A (en) * | 2024-03-12 | 2024-04-16 | 西安电子科技大学 | Learning-driven physical layer authentication approach for industrial IoT spoofing attacks |
CN118642132A (en) * | 2024-05-21 | 2024-09-13 | 北京交通大学 | GNSS satellite navigation deception attack state recognition method, device and medium |
-
2023
- 2023-09-20 CN CN202311219501.4A patent/CN117353985A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117896176A (en) * | 2024-03-12 | 2024-04-16 | 西安电子科技大学 | Learning-driven physical layer authentication approach for industrial IoT spoofing attacks |
CN117896176B (en) * | 2024-03-12 | 2024-05-17 | 西安电子科技大学 | Learning-driven physical layer authentication approach for industrial IoT spoofing attacks |
CN118642132A (en) * | 2024-05-21 | 2024-09-13 | 北京交通大学 | GNSS satellite navigation deception attack state recognition method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafique et al. | Detecting signal spoofing attack in uavs using machine learning models | |
CN117353985A (en) | A GNSS generative spoofing attack detection method based on CNN-LSTM | |
Ceccato et al. | Generalized likelihood ratio test for GNSS spoofing detection in devices with IMU | |
CN106443598A (en) | Convolutional neural network based cooperative radar network track deception jamming discrimination method | |
Xue et al. | DeepTAL: Deep learning for TDOA-based asynchronous localization security with measurement error and missing data | |
CN103424735A (en) | Near field source locating method, device and system based on minimum description length | |
Guo et al. | Multi-source localization using time of arrival self-clustering method in wireless sensor networks | |
Formaggio et al. | GNSS spoofing detection techniques by cellular network cross-check in smartphones | |
Khalid et al. | Physical layer authentication in line-of-sight underwater acoustic sensor networks | |
Adardour et al. | Estimation of the spectrum sensing for the cognitive radios: Test analysing using Kalman filter | |
Tu et al. | GNSS intermediate spoofing detection via dual‐peak in frequency domain and relative velocity residuals | |
Chen et al. | Detection and orientation of GNSS spoofing based on positioning solutions of three receivers | |
Chen et al. | SLAM using LTE multipath component delays | |
El Alami et al. | Comparative Study of Machine Learning Techniques for Detecting GPS Spoofing Attacks on Mission Critical Military IoT Devices | |
Wielandner et al. | Multipath-based SLAM with multiple-measurement data association | |
Zhang et al. | LSTM Network based spoofing detection and recognition in a GNSS receiver | |
Foliadis et al. | Deep learning based positioning with multi-task learning and uncertainty-based fusion | |
Asaad et al. | Fingerprinting Based Positioning Techniques Using Machine Learning Algorithms Principles, Approaches and Challenges | |
Kavoosi et al. | Selective geometry for near‐field three‐dimensional localisation using one‐pair sensor | |
Chen et al. | GNSS spoofing detection method based on the intersection angle between two directions of arrival (IA‑DOA) for single-antenna receivers | |
Ibwe et al. | Filtering Effect on RSSI-Based Indoor Localization Methods | |
Qiu et al. | An improved time delay estimation method based on generalized cyclic correntropy | |
CN116156505B (en) | WiFi equipment detection method based on denoising self-encoder and metric learning | |
Ibrahim et al. | Fuzzy-based Wi-Fi localisation with high accuracy using fingerprinting | |
Wang et al. | Multi-Domain Joint Spoofing Detection Based on a Semi-Supervised Detection Network for GNSS-Based Train Positioning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |