Hostname: page-component-8448b6f56d-t5pn6 Total loading time: 0 Render date: 2024-04-24T23:55:16.663Z Has data issue: false hasContentIssue false

GNSS Spoofing Detection Technique Using Fraction Parts of Double-difference Carrier Phases

Published online by Cambridge University Press:  30 April 2018

Yanfeng Hu*
Affiliation:
(Department of Navigation Engineering, Naval University of Engineering, Wuhan, China)
Shaofeng Bian
Affiliation:
(Department of Navigation Engineering, Naval University of Engineering, Wuhan, China)
Bing Ji
Affiliation:
(Department of Navigation Engineering, Naval University of Engineering, Wuhan, China)
Juan Li
Affiliation:
(College of Electromechanical Engineering, Qingdao Agricultural University, Qingdao, China)

Abstract

With electronic warfare increasingly complicated and military confrontations increasingly intense, the potential security threat to satellite navigation has become a difficult issue to deal with. Traditional satellite navigation anti-interference technology generally refers to jamming, but less consideration has been given to spoofing. It should be noted that the potential risk induced by spoofing interference is worse than that caused by jamming as the loss of positioning integrity may not be immediately obvious. This paper introduces a spoofing detection method based on a two-antenna structure using fraction parts of double-difference carrier phase observables. If all spoofing signals are transmitted by one single antenna, a spoofing detection hypothesis test can be carried out through the normalisation of double-difference carrier phase observables, without need to consider the integer ambiguity problem, measure the baseline vector and estimate the real directions of signals. The detection scheme adopts an M of N algorithm (if M or more of the test values exceed the threshold, the algorithm declares the presence of a spoofing signal), integrating carrier phase measurements of all the available satellites. Finally, the proposed method is verified by real experiments. This spoofing detection method can easily be applied to GNSS anti-spoofing receivers without changing their architecture and has simple and effective characteristics.

Type
Research Article
Copyright
Copyright © The Royal Institute of Navigation 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Akos, D. (2012). Who's afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC). Navigation, 59, 281290.Google Scholar
Bardout, Y. (2011). Authentication of GNSS position: An assessment of spoofing detection methods. Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation, Portland, OA.Google Scholar
Betz, J. W. (2000). Effect of narrowband interference on GPS code tracking accuracy. Proceedings of the National Technical Meeting of the ION, Anaheim, CA.Google Scholar
Broumandan, A., Jafarnia-Jahromi, A., Dehghanian, V., Nielsen, J. and Lachapelle, G. (2012). GNSS spoofing detection in handheld receivers based on signal spatial correlation. Position, Location and Navigation Symposium-PLANS IEEE, Myrtle Beach, SC.Google Scholar
Broumandan, A., Jafarnia-Jahromi, A., Daneshmand, S., and Lachapelle, G. (2016). Overview of Spatial Processing Approaches for GNSS Structural Interference Detection and Mitigation. Proceedings of the IEEE, 104, 12461257.Google Scholar
Dehghanian, V., Nielsen, J. and Lachapelle, G. (2012). GNSS spoofing detection based on receiver C/No estimates. Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation, Nashville, TN.Google Scholar
Heng, L., Work, D. and Gao, G. (2015). GPS Signal Authentication from Cooperative Peers. IEEE Transactions on Intelligent Transportation Systems, 16, 17941805.Google Scholar
Humphreys, T., Ledvina, B., Psiaki, M., O'Hanlon, B. and Kintner, M. (2008). Assessing the spoofing threat: Development of a portable GPS civilian spoofer. Proceedings of the 21st International Technical Meeting of The Satellite Division of the Institute of Navigation, Savannah, GA.Google Scholar
Humphreys, T. (2013). Detection Strategy for Cryptographic GNSS Anti-Spoofing. IEEE Transactions on Aerospace and Electronic Systems, 49, 10731090.Google Scholar
Hu, Y., Bian, S., Cao, K., and Ji, B. (2018). GNSS spoofing detection based on new signal quality assessment model. GPS Solutions, (online, https://doi.org/10.1007/s10291-017-0693-7).Google Scholar
Hwang, P. and McGraw, G. (2014). Receiver Autonomous Signal Authentication (RASA) based on clock stability analysis. Position, Location and Navigation Symposium-PLANS IEEE, Monterey, CA.Google Scholar
Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J. and Lachapelle, G. (2012). GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements. International Journal of Satellite Communications and Networking, 30, 181191.Google Scholar
Jafarnia-Jahromi, A., Daneshmand, S., Broumandan, A., Nielsen, J. and Lachapelle, G. (2013). PVT Solution Authentication Based on Monitoring the Clock State for a Moving GNSS Receiver. European Navigation Conference, Vienna, Austria.Google Scholar
Jafarnia-Jahromi, A, Broumandan, A, Daneshmand, S, Sokhandan, N. and Lachapelle, G. (2014). A double antenna approach toward detection, classification and mitigation of GNSS structural interference. Proceedings of NAVITEC, Noordwijk, Netherlands.Google Scholar
Kerns, A., Wesson, K. and Humphreys, T. (2014). A blueprint for civil GPS navigation message authentication. Position, Location and Navigation Symposium-PLANS IEEE, Monterey, CA.Google Scholar
Khanafseh, S., Roshan, N., Langel, S., Chan, F., Joerger, M. and Pervan, B. (2014). GPS spoofing detection using RAIM with INS coupling. Position, Location and Navigation Symposium-PLANS IEEE, Monterey, CA.Google Scholar
Kuhn, M. (2005). An asymmetric security mechanism for navigation signals. Information Hiding. Springer Berlin Heidelberg.Google Scholar
Lee, J., Kwon, K., An, D. and Shim, D. (2015). GPS spoofing detection using accelerometers and performance analysis with probability of detection. International Journal of Control, Automation and Systems, 13, 951959.Google Scholar
O'Hanlon, B., Psiaki, M., Humphreys, T. and Bhatti, J. (2010). Real-time spoofing detection in a narrow-band civil GPS receiver. Proceedings of the 23th International Technical Meeting of The Satellite Division of the Institute of Navigation, Portland, OA.Google Scholar
Psiaki, M., Powell, S. and O'Hanlon, B. (2013a). GNSS Spoofing Detection: Correlating Carrier Phase with Rapid Antenna Motion. GPS World, 24, 5358.Google Scholar
Psiaki, M., O'Hanlon, B., Bhatti, J., Shepard, D. and Humphreys, T. (2013b). GPS spoofing detection via dual-receiver correlation of military signals. IEEE Transactions on Aerospace and Electronic Systems, 49, 22502267.Google Scholar
Psiaki, M., O'Hanlon, B., Powel, S., Wesson, D. and Humphreys, T. (2014). GNSS Spoofing Detection using Two-Antenna Differential Carrier Phase. Proceedings of the 27th International Technical Meeting of The Satellite Division of the Institute of Navigation, Tampa, FL.Google Scholar
Shepard, D., Humphreys, T. and Fansler, A. (2012). Evaluation of the vulnerability of phasor measurement units to GPS spoofing attacks. International Journal of Critical Infrastructure Protection, 5, 146153.Google Scholar
Volpe, J. (2001). Vulnerability assessment of the transportation infrastructure relying on the global positioning system. US Department of Transportation.Google Scholar
Wesson, K., Shepard, D. and Humphreys, T. (2012a). Straight talk on anti-spoofing. GPS World, 23, 3239.Google Scholar
Wesson, K., Rothlisberger, M. and Humphreys, T. (2012b). Practical cryptographic civil GPS signal authentication. Navigation, 59, 177193.Google Scholar