Sahte GPS L1 Taşıyıcısı C/A Kodu Manipülasyonu Saldırısı

Translated title of the contribution: Spoofed GPS L1 Carrier C/A Code Manipulation Attack

Mustafa Tanış, Müştak Erhan Yalçın

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In our hyper-connected world, where navigation is just a tap away and used by almost all smart hardware, the Global Positioning System (GPS) is of great importance. However, spoofing GPS signal attacks on the security of this data are carried out with easily accessible software-based radios (SDR). In this study, attacks were carried out in different scenarios using SDR and open source software. The results of how these attacks threaten data security are shared.

Translated title of the contributionSpoofed GPS L1 Carrier C/A Code Manipulation Attack
Original languageTurkish
Title of host publication32nd IEEE Conference on Signal Processing and Communications Applications, SIU 2024 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798350388961
DOIs
Publication statusPublished - 2024
Event32nd IEEE Conference on Signal Processing and Communications Applications, SIU 2024 - Mersin, Turkey
Duration: 15 May 202418 May 2024

Publication series

Name32nd IEEE Conference on Signal Processing and Communications Applications, SIU 2024 - Proceedings

Conference

Conference32nd IEEE Conference on Signal Processing and Communications Applications, SIU 2024
Country/TerritoryTurkey
CityMersin
Period15/05/2418/05/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Fingerprint

Dive into the research topics of 'Spoofed GPS L1 Carrier C/A Code Manipulation Attack'. Together they form a unique fingerprint.

Cite this