dc.contributorZanetti, Marcelo Serrano
dc.creatorMachado, Vinícius
dc.date.accessioned2020-01-06T14:33:36Z
dc.date.accessioned2022-10-07T21:55:22Z
dc.date.available2020-01-06T14:33:36Z
dc.date.available2022-10-07T21:55:22Z
dc.date.created2020-01-06T14:33:36Z
dc.date.issued2019-12-10
dc.identifierhttp://repositorio.ufsm.br/handle/1/19286
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/4032767
dc.description.abstractThe vulnerability of the GNSS constellation extends beyond blocking and signal loss to fake attacks, where communication signal spoofs are generated to manipulate the position, speed, and information a receiver receives. Considering that several systems are part of the GNSS constellation, it was necessary to carry out a study of the systems and verify how each system behaves when receiving a spoofing attack. The main systems, GPS, GLONASS, Galileo and Beidou, were analyzed in relation to communication frequencies and their methods to avoid a spoofing attack. The data from some systems because they are more used and even better known, are found in open documents available on the Internet, while others less known, are obtained through studies conducted at universities. The combination of known signal structure and data bit predictability makes GNSS civil signals an easy target for spoofing attacks. The paper analyzes the countermeasures of each system, whether each one has a specific type or if they all use the same pattern of defense and in that, an approach to some existing countermeasures.
dc.publisherUniversidade Federal de Santa Maria
dc.publisherBrasil
dc.publisherUFSM
dc.publisherCentro de Tecnologia
dc.rightsAcesso Aberto
dc.subjectGNSS
dc.subjectSpoofing
dc.subjectAnti-spoofing
dc.titleVulnerabilidade dos sistemas GNSS a ataques do tipo Spoofing
dc.typeTrabalho de Conclusão de Curso de Graduação


Este ítem pertenece a la siguiente institución