Hostname: page-component-89b8bd64d-b5k59 Total loading time: 0 Render date: 2026-05-10T02:06:56.549Z Has data issue: false hasContentIssue false

Advanced Anti-Spoofing Methods in Tracking Loop

Published online by Cambridge University Press:  04 March 2016

M. R. Mosavi*
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
Z. Nasrpooya
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
M. Moazedi
Affiliation:
(Department of Electrical Engineering, Iran University of Science and Technology Narmak, Tehran 16846-13114, Iran)
*
Rights & Permissions [Opens in a new window]

Abstract

The Global Positioning System (GPS) has become widespread in many civilian applications. GPS signals are vulnerable to interference and even low-power interference can easily spoof GPS receivers. In this paper, two techniques are proposed based on correlators and adaptive filtering to diminish the effect of spoofing on GPS-based positioning. The suggested algorithms are implemented in the tracking loop of the receiver. As a first method, a high-resolution correlator is utilised to avoid big parts of the influence of interference. To improve the results, a multicorrelator technique is also employed. In the second method, an adaptive filter is used for estimating the parameters of authentic plus spoof signals. Interference elimination is performed by subtracting the estimated conflict effects from the measured correlation function. These techniques provide easy-to-implement quality assurance tools for anti-spoofing. As a primary step, in this article, the proposed algorithms have been implemented in a Software Receiver (SR) to prove the concept of idea in multipath-free environments.

Information

Type
Research Article
Copyright
Copyright © The Royal Institute of Navigation 2016 
Figure 0

Figure 1. Spoofing model in tracking loop.

Figure 1

Figure 2. Code tracking loop block diagram (Borre et al., 2007).

Figure 2

Figure 3. Code tracking: (a) the late replica (b) the prompt code has the highest correlation (Borre et al., 2007).

Figure 3

Figure 4. (a) Narrow correlation function and (b) HRC in the tracking loop.

Figure 4

Figure 5. Block diagram for multicorrelator-based DLL implementation.

Figure 5

Figure 6. Block diagram of spoof mitigation system.

Figure 6

Figure 7. Block diagram for adaptive filtering algorithm.

Figure 7

Figure 8. Block diagram of the total implemented system.

Figure 8

Figure 9. Acquisition results for (a) authentic and (b) fake signals.

Figure 9

Figure 10. Navigation solution of authentic data.

Figure 10

Figure 11. Navigation solution of authentic plus interference data.

Figure 11

Figure 12. E coordinate of counterfeit and authentic signals.

Figure 12

Figure 13. N coordinate of counterfeit and authentic signals.

Figure 13

Figure 14. N coordinate of counterfeit and authentic signals.

Figure 14

Figure 15. Navigation results before and after applying HRC.

Figure 15

Figure 16. DLL discriminator output error before and after applying HRC.

Figure 16

Table 1. Results of error mitigation using HRC approach.

Figure 17

Table 2. Results of error mitigation using multicorrelator approach.

Figure 18

Figure 17. Navigation results before and after applying multicorrelator algorithm.

Figure 19

Figure 18. DLL discriminator output error before and after applying multicorrelator.

Figure 20

Figure 19. Navigation results before and after applying LMS algorithm.

Figure 21

Table 3. Results of error mitigation using LMS algorithm.

Figure 22

Figure 20. Navigation results before and after applying BP algorithm.

Figure 23

Table 4. Results of error mitigation using BP algorithm.

Figure 24

Table 5. Comparative performance of spoof mitigation techniques on spoof data sets.

Figure 25

Table 6. Comparative performance of spoof mitigation techniques.