Next Article in Journal
Comparison of Inspecting Non-Ferromagnetic and Ferromagnetic Metals Using Velocity Induced Eddy Current Probe
Previous Article in Journal
Effect of Electrode Shape and Flow Conditions on the Electrochemical Detection with Band Microelectrodes
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spoofing Detection Algorithm Based on Pseudorange Differences

1
College of Artificial Intelligence, National University of Defense Technology, Changsha 410073, China
2
College of Systems Engineering, National University of Defense Technology, Changsha 410073, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(10), 3197; https://doi.org/10.3390/s18103197
Submission received: 29 June 2018 / Revised: 18 September 2018 / Accepted: 19 September 2018 / Published: 21 September 2018
(This article belongs to the Section Remote Sensors)

Abstract

:
Intentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS). For spoofing interference, an anti-spoofing algorithm based on pseudorange differences for a single receiver is proposed, which can be used to detect simplistic and intermediate spoofing attacks, as well as meaconing attacks. Double-difference models using the pseudorange of two adjacent epochs are established followed by the application of Taylor expansion to the position relationship between the satellite and the receiver (or the spoofer). The authenticity of the signal can be verified by comparing the results of the proposed spoofing detection algorithm with the traditional least squares method. The results will differ when spoofing is present. The parameter setting of the proposed algorithm is introduced. The algorithm has the advantage of both simplicity and efficiency and needs only a single receiver and pseudorange data. A NovAtel receiver is adopted for the actual experiments. The Texas spoofing test battery (TEXBAT), as well as two other simulation experiments are used to verify the performance of the algorithm. The simulation results validate the feasibility and effectiveness of the algorithm.

1. Introduction

As global satellite navigation systems (GNSSs) play an increasingly important role in society and industry, the security of these systems is a crucial component. Intentional and unintentional spoofing interference affects normal use of navigation and timing terminals. Unlike jamming, the goal of spoofing is to take control of the user receiver. The receiver captures the spoofing signal and uses it for the calculation of an incorrect positioning. In [1], the authors analyzed the vulnerability of the satellite signal and the GNSS to attacks, illustrating how the spoofing signal enters and takes over the receiver. To facilitate a threat analysis, the authors divided the spoofing threat into three categories: simplistic, intermediate and sophisticated spoofing attacks [2]. In addition to these three categories, there is another case: meaconing. Meaconing is the interception and replay of navigation signals on the received frequency, typically with a power higher than the original signal, to confuse the navigation terminal [3].
The main form and the purpose of a spoofer is to generate a similar and false satellite signal and make the receiver capture it. The spoofer is defined as a system containing three elements: the receiving antenna, the spoofing signal generator and the transmitting antenna. The receiving antenna receives the signal and inputs it into the spoofing signal generator. Then, the generator generates the spoofing signal, which has the same form as the satellite signal according to the input and the spoofing interference intention and is finally transmitted by the transmitting antenna. The signal input to the generator and the signal output from the generator are not the same, but are similar. The main form of the meaconer is to delay the transmission of the real signal by the delay module. A meaconer contains the same three elements as the spoofer; however, the meaconer has a signal transponder with a delay module instead of the spoofing signal generator. The whole process can be described as: the receiving antenna receives the signal and inputs it into the signal transponder, and the signal is then transmitted by the transmitting antenna after a certain delay. The signal input into the transponder and the signal output from the transponder are the same. The structure of the signal in this spoofing scenario is not changed. Compared with the spoofer, meaconing has the advantage that it is easier to implement and has a lower cost. The coarse/acquisition code (C/A code) of the satellite signal is open and transparent, and its structure is well known to the public. Therefore, the spoofing signal, which is very similar to the real satellite navigation signal, can mislead the receiver from the correct position. The precision code (P code) is encrypted and cannot be simulated easily. Even so, meaconing still can use it by the time delay module.
For spoofing interference, the spoofer should first destroy the connection between the receiver and the real signal and should then make the receiver capture the spoofing signal, preferably by a higher signal power than the normal one. In [4], the authors point out that the tracking of the real signal can be destroyed as long as the power of the spoofing signal is at least four decibels (dB) higher than the real signal in the condition that the pseudo-code rate difference between the real signal and the spoofing signal is 1/3 Hertz (Hz) and the receiver’s coherent accumulated time is 1 ms. To suppress spoofing interference, the existence of the spoofing signal must first be accurately detected. Previous detection technologies mainly focused on signal distortion detection, by considering the signal power [5,6], the spatial distribution properties [7,8] and by observing the change rates of ranges and the clock offset/drifts [1]. The signal power is influenced by many factors during transmission, and transient power increase does not mean the spoofing signal exists.
Spoofing interference can be simple or complex:
Simplistic spoofing attacks and meaconing can be regarded as “simple spoofing”. This “simple spoofing” is defined as a non-overlapped spoofing scenario. The main characteristic of this kind of spoofing is that the correlation peak of the spoofing pseudo-random noises (PRNs) is not overlapped with that of the authentic ones. This attack is usually generated by a hardware simulator or replayed by a signal transponder. An effective way to spoof a receiver in a non-overlapped scenario is to first jam and make the receiver lose its lock on the real signal and instead capture the spoofing signal [9]. In this scenario, the spoofing signal appears as a noise and only affects the effective carrier noise power ratio (C/No). For example, in the simulation scenario of the “Beidou Open Laboratory test” in Section 3, the signal is switched from the real to the spoofing signal with an absolute power advantage. Another effective way to spoof a receiver in a non-overlapped scenario is that the receiver enters an area that the satellite signal cannot cover, then the signal is generated through the simulator or replayed through the transponder to achieve spoofing. In this case, even if the value of C/No is lower than that of the real signal, the spoofing signal can still be captured by the receiver. In this scenario, the value of C/No is mainly affected by the transmitting power. The simulation scenario of the “university test” in Section 3 is an example of this case.
The simulation scenarios of “the Texas spoofing test battery” used in this paper are more complex and can be regarded as “complex spoofing”. The “complex spoofing” is defined as overlapped spoofing scenarios. In an overlapped spoofing attack, the correlation peak of the spoofing signals and the real signals overlap, and this interaction misshapes the correlation peak. This kind of spoofing attack is generated by a receiver-based spoofing generator where the spoofer knows the current time, the observable satellites and the location and signal parameters of the target receiver. The real signal is separated from the composite signal (which is the overlap between the real signal and the spoofing signal) by a small power advantage to realize the signal switch. This kind of spoofing is harder to detect.
For simple spoofing, some related methods in [1] are valid. However, for complex spoofing, these methods become invalid.
Current research focuses on using the antenna array method [10], the receiver pseudorange or carrier phase difference [11,12], the correlation method [13,14], the inertial aided method [15,16] or the hypothesis testing method [17,18]. The antenna array method needs more than one antenna. Its detection performance is affected by the baseline length between the antennas. When there is only one single receiver or one single antenna, such a difference method cannot be used. The inertial aided method has some disadvantages. First, inertial devices are needed, and this increases the cost of the whole navigation system. Second, inertial navigation involves error accumulation over time. This makes it effective over a short period, but invalid over longer periods. There are also some studies on the hardware of the receiver needed to detect the signal [19,20]. All hardware-based methods require a change of the structure of existing receivers. Signal encryption is also a scheme to avoid spoofing interference, which is analyzed in [21]. However, the implementation of this solution requires a comprehensive and systematic modification from satellite to receiver, which is not feasible in a short time. If users want to use the signal, permission is needed from the operator. Furthermore, as meaconing does not change the signal structure, the scheme of signal encryption cannot effectively suppress meaconing.
In addition, some crossing methods are proposed. In Ref. [22], the authors proposed a method to monitor the spoofing signal based on machine learning and signal processing. Other methods can also detect spoofing signals to a certain extent, but still have limitations. Considering that some of such methods are complementary in spoofing detection, the authors adopted information fusion in combination with multiple spoofing detection strategies to improve the detection performance [23]. The information fusion method is useful, but requires more hardware and software to realize the different detection methods and requires more time to finish the signal processing. The performance of the fusion algorithm determines the effectiveness of detection. In Ref. [24], the authors proposed a network monitoring mechanism based on the time difference of arrival properties between spoofing and authentic signals. This network contains several receivers and one central processing component. From the simulation, we can see that the detection performance is influenced by the distance between the receiver and the central processing component. This structure is better suited for static testing.
If a single receiver can be used to implement detections, the disadvantages mentioned above can be overcome. The motivation of this paper is to use a single receiver or a single antenna to detect meaconing, simplistic and intermediate spoofing attacks by pseudorange differences. The main contributions of this paper can be summarized as follows: (1) we build the signal pseudorange model based on the signal transmission path; (2) a novel spoofing detection algorithm is proposed based on the pseudorange model, which only needs one single receiver and does not require changing the hardware; (3) we validate the proposed algorithm on real experiments, showing its effectiveness and simplicity in real engineering applications. The hardware of the receiver does not need to be changed, and no additional auxiliary equipment is required. This is the advantage compared with other algorithms. The authenticity of the signal can be confirmed by comparing the result of the proposed spoofing detection algorithm with the result of the traditional least squares method. The paper is organized as follows: Section 2 gives the theoretical analysis of a single receiver against the spoofing signal; Section 3 describes three different test datasets, which are used to validate the algorithm performance; Section 4 concludes the paper.

2. Spoofing Detection Algorithm

In this section, we introduce the theoretical analysis of the algorithm. We build the single receiver pseudorange double-difference model, then apply Taylor expansion and iterative calculation to the pseudorange double-difference model to obtain the position at the current epoch. By comparing the results of the traditional least squares method to the spoofing detection algorithm proposed in this paper, we can identify the authenticity of the signal. The parameter setting of the proposed algorithm is pointed out in Section 2.2. The algorithm summary and explicit flowchart are given in Section 2.3.

2.1. Theoretical Analysis

First, we define the distance between X i and X p as:
R X i , X p = x i x p 2 + y i y p 2 + z i z p 2
where X i = x i , y i , z i represents the satellite position in the Earth-centered Earth-fixed (ECEF) coordinates and X p = x p , y p , z p represents the vehicle position in the ECEF coordinates.
Suppose the pseudorange of the i th satellite at t k is ρ k i and at t k + 1 is ρ k + 1 i . We have:
ρ k i = R X k i , X p , k + δ t r , k δ t s , k i × c + δ t i o n , k i + δ t t r o p , k i × c + ε k i
ρ k + 1 i = R X k + 1 i , X p , k + 1 + δ t r , k + 1 δ t s , k + 1 i × c + δ t i o n , k + 1 i + δ t t r o p , k + 1 i × c + ε k + 1 i
where δ t r , m is the receiver clock offset at t m , δ t s , m i is the i th satellite clock offset at t m , δ t i o n , m i is the i th satellite ionosphere delay at t m , δ t t r o p , m i is the i th satellite troposphere delay at t m , c is the speed of light and ε m i is the i th satellite non-model errors, such as the measurement noise at t m .
We use the ionosphere delay correction, the troposphere delay correction and the satellite clock offset correction to correct the pseudorange. Then, the pseudorange single difference of Equations (2) and (3) is:
Δ ρ k + 1 , k i = ρ k + 1 i ρ k i = R X k + 1 i , X p , k + 1 R X k i , X p , k + δ t r , k + 1 δ t r , k × c + ε c k + 1 i ε c k i
where ε c m i represents the i th satellite’s non-model errors, such as the measurement noise and the ionosphere delay, the troposphere delay and the satellite clock offset correction residuals at t m .
Similarly, for the j th satellite, we have:
Δ ρ k + 1 , k j = ρ k + 1 j ρ k j = R X k + 1 j , X p , k + 1 R X k j , X p , k + δ t r , k + 1 δ t r , k × c + ε c k + 1 j ε c k j
The pseudorange double difference is calculated between Equations (4) and (5). Equation (6) is the pseudorange double-difference model.
Δ ρ k + 1 , k i j = Δ ρ k + 1 , k i Δ ρ k + 1 , k j = R X k + 1 i , X p , k + 1 R X k i , X p , k R X k + 1 j , X p , k + 1 R X k j , X p , k + ε c k + 1 i ε c k i ε c k + 1 j ε c k j
In Equation (6), the distances R X k i , X p , k and R X k j , X p , k are known when we detect the authenticity of the signal at t k + 1 , so Taylor expansion is only needed for R X k + 1 i , X p , k + 1 and R X k + 1 j , X p , k + 1 .
Taylor expansion of R X k + 1 i , X p , k + 1 is done at x k , y k , z k . We have:
R X k + 1 i , X p , k + 1 R X k + 1 i , X k + u x , k + 1 , k i Δ x + u y , k + 1 , k i Δ y + u z , k + 1 , k i Δ z
where,
u x , k + 1 , k i = x k + 1 i x k / R X k + 1 i , X k
u y , k + 1 , k i = y k + 1 i y k / R X k + 1 i , X k
u z , k + 1 , k i = z k + 1 i z k / R X k + 1 i , X k
x k + 1 , S D A = x k + Δ x y k + 1 , S D A = y k + Δ y z k + 1 , S D A = z k + Δ z
where u k + 1 , k i = u x , k + 1 , k i u y , k + 1 , k i u z , k + 1 , k i is the line-of-sight unit vector of the i th satellite. The subscripts k and k + 1 represent the time point t k and t k + 1 , respectively. x k + 1 , S D A , y k + 1 , S D A , z k + 1 , S D A is the position vector at t k + 1 , and it is the quantity we need to calculate by the algorithm proposed in this paper.
Similarly, Taylor expansion of R X k + 1 j , X p , k + 1 is done at x k , y k , z k . The two expansion equations are substituted into Equation (6), then we have:
R X k + 1 i , X k R X k + 1 j , X k + u x , k + 1 , k i x k + 1 , S D A x k + u y , k + 1 , k i y k + 1 , S D A y k + u z , k + 1 , k i z k + 1 , S D A z k u x , k + 1 , k j x k + 1 , S D A x k u y , k + 1 , k j y k + 1 , S D A y k u z , k + 1 , k j z k + 1 , S D A z k = Δ ρ k + 1 , k i Δ ρ k + 1 , k j + R X k i , X p , k R X k j , X p , k ε c k + 1 i ε c k i + ε c k + 1 j ε c k j
If there are n satellites with the same PRN number at t k and t k + 1 , the pseudorange double difference is calculated between the first satellite and the other n 1 satellites, respectively. Therefore, n 1 equations are obtained. Taylor expansion is applied to these equations and written in the matrix form.
M x k + 1 , S D A x k y k + 1 , S D A y k z k + 1 , S D A z k = L
where,
M = M 1 M 2 = u x , k + 1 , k 1 u y , k + 1 , k 1 u z , k + 1 , k 1 u x , k + 1 , k 1 u y , k + 1 , k 1 u z , k + 1 , k 1 u x , k + 1 , k 1 u y , k + 1 , k 1 u z , k + 1 , k 1 u x , k + 1 , k 2 u y , k + 1 , k 2 u z , k + 1 , k 2 u x , k + 1 , k 3 u y , k + 1 , k 3 u z , k + 1 , k 3 u x , k + 1 , k n u y , k + 1 , k n u z , k + 1 , k n
L = L 1 L 2 = Δ ρ k + 1 , k 1 + R X k 1 , X p , k R X k + 1 1 , X k ε c k + 1 1 ε c k 1 Δ ρ k + 1 , k 1 + R X k 1 , X p , k R X k + 1 1 , X k ε c k + 1 1 ε c k 1 Δ ρ k + 1 , k 1 + R X k 1 , X p , k R X k + 1 1 , X k ε c k + 1 1 ε c k 1 Δ ρ k + 1 , k 2 + R X k 2 , X p , k R X k + 1 2 , X k ε c k + 1 2 ε c k 2 Δ ρ k + 1 , k 3 + R X k 3 , X p , k R X k + 1 3 , X k ε c k + 1 3 ε c k 3 Δ ρ k + 1 , k n + R X k n , X p , k R X k + 1 n , X k ε c k + 1 n ε c k n
The size of M is n 1 × 3 , and the size of L is n 1 × 1 . To compare the differences between the position vector of the spoofing detection algorithm proposed in this paper and the position vector of the traditional least squares method in the analytic expression, we add a row to the matrix M and L , respectively. Equation (9) can then be rewritten as:
0 1 × 3 M M 1 0 1 × 3 M M 2 x k + 1 , S D A x k y k + 1 , S D A y k z k + 1 , S D A z k = 0 1 × 1 L L 1 0 1 × 1 L L 2
where,
0 1 × 3 M = u x , k + 1 , k 1 u y , k + 1 , k 1 u z , k + 1 , k 1
0 1 × 1 L = Δ ρ k + 1 , k 1 + R X k 1 , X p , k R X k + 1 1 , X k ε c k + 1 1 ε c k 1
As the following relationships exist:
0 1 × 3 M M 1 x k + 1 , S D A x k y k + 1 , S D A y k z k + 1 , S D A z k = ρ k + 1 1 R X k + 1 1 , X k δ t r , k + 1 × c ε c k + 1 1 ρ k + 1 1 R X k + 1 1 , X k δ t r , k + 1 × c ε c k + 1 1 ρ k + 1 1 R X k + 1 1 , X k δ t r , k + 1 × c ε c k + 1 1
ρ k i R X k i , X p , k ε c k i ρ k j R X k j , X p , k ε c k j = 0
We calculate the difference between 0 1 × 1 L L 1 0 1 × 1 L L 2 and 0 1 × 3 M M 1 x k + 1 , S D A x k y k + 1 , S D A y k z k + 1 , S D A z k . Combining the obtained difference result with Equations (11) and (12), Equation (10) can be rewritten as:
0 1 × 3 M M 2 x k + 1 , S D A y k + 1 , S D A z k + 1 , S D A = 0 1 × 3 M M 2 x k y k z k + ρ k + 1 1 R X k + 1 1 , X k ρ k + 1 2 R X k + 1 2 , X k ρ k + 1 n R X k + 1 n , X k δ t r , k + 1 × c δ t r , k + 1 × c δ t r , k + 1 × c ε c k + 1 1 ε c k + 1 2 ε c k + 1 n
By calculating Equation (13) iteratively, the position vector x k + 1 , S D A , y k + 1 , S D A , z k + 1 , S D A at t k + 1 for the spoofing detection algorithm can be obtained.
For the traditional least squares method [25], only the measurement information of one time epoch is needed. The pseudorange after corrections at t k + 1 can be written as:
ρ k + 1 i = R X k + 1 i , X p , k + 1 + δ t r , k + 1 × c + ε c k + 1 i
Taylor expansion for R X k + 1 i , X p , k + 1 is done at x k , y k , z k . Then, we have:
G e x k + 1 , L S y k + 1 , L S z k + 1 , L S δ t r , k + 1 × c = G e x k y k z k 0 + ρ k + 1 1 R X k + 1 1 , X k ρ k + 1 2 R X k + 1 2 , X k ρ k + 1 n R X k + 1 n , X k ε c k + 1 1 ε c k + 1 2 ε c k + 1 n
where,
G e = 0 1 × 3 M 1 1 × 1 M 2 1 n 1 × 1
By calculating Equation (15) iteratively, the position vector x k + 1 , L S , y k + 1 , L S , z k + 1 , L S at t k + 1 for the traditional least squares method can be obtained.
According to the signal transmission path presented in Figure 1, we can build the pseudorange model. Then, we have:
  • When the signal is real, it transmits directly from the satellite to the receiver. We have R X k + 1 i , X p , k + 1 = R X k + 1 i , X r , k + 1 .
  • When the signal is spoofing, according to the principle of the spoofing attack, we have: (1) for the meaconer, it includes the physical distance between the satellite and the meaconer R X k + 1 i , X s , k + 1 , and the physical distance between the meaconer and the receiver R X s , k + 1 , X r , k + 1 ; (2) for the spoofer, it includes the virtual distance R X k + 1 i , X s , k + 1 , which is controlled by the generator’s hardware and software and the physical distance between the spoofer and the receiver R X s , k + 1 , X r , k + 1 . We have R X k + 1 i , X p , k + 1 = R X k + 1 i , X s , k + 1 . For the algorithm proposed in this paper, the term R X s , k + 1 , X r , k + 1 is removed due to the difference, while for the traditional least squares method, the term R X s , k + 1 , X r , k + 1 can be included inside the receiver clock offset term δ t r , k + 1 × c .
By comparing Equations (13) and (15), we can see that the only difference is the clock offset term δ t r , k + 1 × c . In addition, the method proposed in this paper needs two epochs ( t k and t k + 1 ). Both of the clock offset term and the result at t k will affect our method’s result at t k + 1 . According to the above analysis, we can write the method as: the position obtained at t k + 1 is equal to the position at t k plus the position deviation caused by the change in pseudorange between t k and t k + 1 , plus the position deviation caused by the clock offset term. For the position result at t k , when the position deviation of the two algorithms at t k is less than the threshold, the traditional least squares method’s result at t k is used to calculate the position result at t k + 1 . When the position deviation of the two algorithms at t k is greater than the threshold, our method’s result at t k is used to calculate the position result at t k + 1 .
To sum up,
  • When the traditional least squares method’s result at t k is used, the position at t k + 1 can be written as: the position obtained at t k + 1 is equal to the position at t k , plus the position deviation caused by the change in the pseudorange between t k and t k + 1 , plus the position deviation caused by δ t r , k + 1 × c . From the simulation result in Section 3, we can see that the maximum equivalent distance of the clock offset is 10 6 × c , which is small enough to ignore its influence, and the position results of the two algorithms are approximately equal.
    x k + 1 , L S x k + 1 , S D A y k + 1 , L S y k + 1 , S D A z k + 1 , L S z k + 1 , S D A
  • When our method’s result at t k , t k 1 , t k N + 1 is used and the traditional least squares method’s result at t k N is used, the position at t k + 1 can be written as: the position obtained at t k + 1 is equal to the position at t k , plus the position deviation caused by the change in pseudorange between t k and t k + 1 , plus the position deviation caused by T = k N + 1 T = k + 1 δ t r , T × c . From the above analysis, we can see that, even though the influence of the clock offset at one epoch is small, the position deviation caused by the clock offset accumulates along with the existence of the spoofing signal. When the position deviation caused by T = k N + 1 T = k + 1 δ t r , T × c is greater than the threshold, the inequality of the two algorithms can be obtained.
    x k + 1 , L S x k + 1 , S D A y k + 1 , L S y k + 1 , S D A z k + 1 , L S z k + 1 , S D A

2.2. Setting Parameters of the Proposed Algorithm

If the spoofing signal is present at the beginning of the data collection, the calculation generally starts from the second epoch. Therefore, the position value at the first epoch needs to be set. When the receiver is in a dynamic state, the traditional least squares method’s result at the first epoch is adopted and set as the initial value. When the receiver is in a static state, we always need to set the initial position value as the vehicle’s real position to guarantee that the algorithm is valid.
In addition, we need at least four satellites for the vehicle positioning in the actual calculation of each epoch. We need to select the satellite before the calculation to ensure the accuracy of the navigation and positioning algorithm. Different schemes can be adopted, such as the comprehensive geometric dilution of precision (GDOP) minimum. In this paper, we use the satellite with C/No greater than or equal to 45 dB-Hz in the calculation. If the number of satellites is smaller than four when this constraint is applied (usually in dynamic scenarios), it is appropriate to reduce the value of C/No. For example, for the dynamic position spoofing scenario in the Texas spoofing test battery, we select the satellite with C/No greater than or equal to 40 dB-Hz in the calculation.
The existence of measurement noises, correction residuals, differential calculus and the receiver clock offset’s influence makes the traditional least squares method’s result inconsistent with the spoofing detection algorithm’s result when the signal is real. Therefore, it is necessary to set a reference threshold value. When the position deviation is less than the threshold value, the signal is real, otherwise it is spoofing. As this is an empirical method, the threshold value should be fixed in advance. We determine the threshold value mainly by some prior experiments. In these experiments, the acceptable positioning error, the acceptable false alarm rate and the missed detection rate are considered. When the signal is real, a lower threshold will increase the false alarm rate; while when the signal is spoofing, a higher threshold will increase the missed detection rate. For example, for the static position spoofing scenario in Section 3, when the threshold value is set as 3.5 m, the false alarm rate is 4.7% and the missed detection rate is 1.16%; when the threshold value is set as 5 m, the false alarm rate is 0% and the missed detection rate is 1.55%; when the threshold value is set as 7 m, the false alarm rate is 0% and the missed detection rate is 2.17%. To balance the positioning error, the false alarm rate and the missed detection rate, we chose 5 m and 10 m respectively for the static scenarios and the dynamic scenarios.

2.3. Algorithm Summary and Flowchart

To sum up, the proposed algorithm has three steps: (1) pseudorange differences calculation; (2) iterative solution; (3) comparison with the traditional least squares method. The conclusion can be drawn as: the spoofing detection algorithm’s result approximates the traditional least squares method’s result when the signal is real. Otherwise, the results of these two algorithms are different. Based on this, the authenticity of the signal can be determined. To implement the algorithm, we need to get the pseudorange and the ephemeris from the GNSS receiver. The satellite position is determined based on the information of the ephemeris. Using the information of the pseudorange, the difference calculation and the iterative solution are carried out. Explicit algorithm flows are given in Figure 2 and Figure 3. In Figure 2, the detailed spoofing detection process is presented. In Figure 3, we give the analysis explanation of the pseudorange double-difference model establishment and solution.
When there are n satellites with the same pseudo-random noise (PRN) number at t k and t k + 1 , the first difference calculation needs to be executed once, and the second difference calculation needs to be executed n 1 times. Therefore, the algorithm complexity is O n .

3. Simulation Tests

To verify the feasibility and effectiveness of the algorithm, different kinds of test datasets, including the university test dataset, the Beidou Open Laboratory test dataset and the Texas spoofing test battery (TEXBAT), are used in the simulation. We generated the first two datasets at our university and Beidou Open Laboratory, respectively, and the TEXBAT comprised the only public spoofing test datasets published by The University of Texas at Austin [26,27,28,29]. The data generation of these datasets is described in the following subsections. The performance of the algorithm is also verified in the dynamic whole-time duration position spoofing scenario. In all spoofing scenarios, all satellites are spoofed, and there is only one spoofer. Other characteristics of different scenarios are summarized in Table 1. The false alarm rate and the missed detection rate in each scenario are calculated. The false alarm rate indicates the probability that the algorithm misjudges the real signal as the spoofing one. The missed detection rate indicates the probability that the algorithm misjudges the spoofing signal as the real one.

3.1. University Test

In this scenario, the receiver is in a static state first, and it receives the real signal. This process lasts about 80 s. Then, the signal transponder is turned on. The receiver is held by hand and approaches the signal transponder’s transmitting antenna slowly. This process is repeated twice and lasts about 100 s. We adopt the algorithm proposed in this paper and the traditional least squares method to analyze the collected data; the result is shown in Figure 4.
From Figure 4, we can see that the position deviations are smaller than the threshold value when the signal is real. When the signal transponder is turned on, the receiver starts to receive the replayed signal, and the position deviations start to increase and become larger than the threshold value. Based on these differences, we can determine the existence of the spoofing signal. The false alarm rate when the signal is real is 0%, and the missed detection rate when the signal is spoofing is 18%. The missed detections mainly occur within the short period after the signal is switched from real to spoofing. In this period, the position deviations caused by the spoofing signal are smaller than the threshold value.

3.2. Beidou Open Laboratory Test

To further verify the effectiveness of the algorithm, we conducted Experiment No. 2 in Beidou Open Laboratory. We used the antenna on the roof of the building to introduce the satellite’s signal into the room and assumed this signal to be real. The signal is input into the spoofing signal simulator, and the spoofing signal is output after the computer calculation. The output spoofing signal from the simulator moves circularly. The receiver is adopted in the whole duration. In this duration, the signal is real at first, and this process lasts about 90 s. Then, the spoofing signal simulator is turned on. The absolute power advantage guarantees that the receiver can receive the spoofing signal. The circular motion signal is then acquired. This process lasts about 135 s. Finally, the simulator is turned off, and the signal becomes real. This process lasts about 90 s.
We apply the traditional least squares method and the spoofing detection algorithm to the datasets and use (−2,185,955.407, 5,181,417.961, 2,999,272.014) as a reference point for coordinate transformation in the results shown in Figure 5.
From Figure 5, we can see that, for the real signal, the results of the two algorithms are basically the same. For the spoofing signal with circular motion, the difference of the results of the two algorithms is obvious. In Figure 6, we can see that the position deviations in the first segment and the third segment are always small. The position deviations perform a significant change and remain large when the signal is switched from real to spoofing. These differences can help us to validate the signal authenticity. The false alarm rate when the signal is real is 2.91%, and the missed detection rate when the signal is spoofing is 2.04%.

3.3. The Texas Spoofing Test Battery

Finally, we adopt the only public spoofing test datasets, the Texas spoofing test battery (TEXBAT), to verify the detection performance of the algorithm. This involves eight separate spoofing scenarios and two clean scenarios. In this paper, we mainly focus on the positioning terminal. Therefore, for the spoofing experiments, we adopt the static position spoofing scenario and the dynamic position spoofing scenario. As a reference, we also adopt the two clean scenarios, which are the clean static scenario and the clean dynamic scenario. The remaining five datasets are the static or dynamic time spoofing scenarios and the signal switch scenario. Time spoofing scenarios focus mainly on the timing terminal.
In the clean static scenario, the receiver is placed on the roof of the Aerospace Engineering Building at the University of Texas to receive and record the real signal. In the clean dynamic scenario, the receiver platform is dynamic rather than static. The clean dynamic dataset was originally recorded by an antenna on a traveling vehicle. The static position spoofing scenario is based on the clean static scenario. The static signal is real in the first segment (around 170 s). Then, the receiver captures the spoofing signal with the power advantage of 0.4 dB higher than the real one. The spoofing signal slowly drives the receiver off the real position, and the ultimate bias is an offset of 600 m in the Z direction. In the dynamic position spoofing scenario, which is based on the clean dynamic scenario, the receiver is in a dynamic state. The signal is real at first. The spoofing signal slowly drives the receiver off the real position with a 0.8-dB power advantage in about 100 s. The ultimate bias is also an offset of 600 m in the Z direction.
For the TEXBAT datasets, we replay them with National Instruments (NI) equipment (NI equipment model numbers: NI PXIe-5450: 400 MS/s In-phase/Quadrature (I/Q) Signal Generator, NI PXIe-5611: I/Q Vector Modulator, NI PXI-5652: Radio Frequency (RF) Signal Generator) at Shanghai Advanced Research Institute, Chinese Academy of Sciences. The traditional least squares method and the spoofing detection algorithm proposed in this paper are used in the experiments.
Figure 7, Figure 8, Figure 9 and Figure 10 show the position deviations of the two algorithms in the clean static scenario, the clean dynamic scenario, the static position spoofing scenario and the dynamic position spoofing scenario, respectively.
As can be seen from Figure 7, the real signal is received in the clean static scenario, and the position deviations are always small. The false alarm rate when the signal is real is 1.12%. The false alarms mainly occur at the beginning, due to the code smoothing process embedded in the receiver. In Figure 8, the real signal is received in the clean dynamic scenario. Though the position deviations in Figure 8 are larger than those in Figure 7, no big jump occurs in the whole duration. The false alarm rate when the signal is real is 0%. In Figure 9 and Figure 10, we can also observe that there exist obvious jumps in the position deviations of the two algorithms when the signal is switched from real to spoofing and that these jumps remain in the following duration. In the static position spoofing scenario, the false alarm rate when the signal is real is 0%, and the missed detection rate when the signal is spoofing is 1.55%. In the dynamic position spoofing scenario, the false alarm rate when the signal is real is 8%, and the missed detection rate when the signal is spoofing is 2.57%.

3.4. Dynamic Whole-Time Duration Spoofing Scenario

Further, we select the spoofing part of the dynamic position spoofing scenario in the TEXBAT datasets to construct the dynamic whole-time duration spoofing scenario to verify the performance of the algorithm. The simulation results are shown in Figure 11.
The traditional least squares method’s result at the first epoch is used as the initial value in the calculation. From Figure 11, we can see that the position deviations are larger than the threshold, and this indicates the existence of the spoofing signal. In this scenario, the missed detection rate when the signal is spoofing is 0.82%. This proves that the proposed spoofing detection algorithm is effective for the dynamic whole-time duration position spoofing scenario.
For the spoofing scenarios, the positions obtained by the traditional least squares method and the spoofing detection algorithm are different, and the position deviations will always be larger than the threshold value as long as the spoofing signal exists. The authenticity of the signal can then be determined. The spoofing detection algorithm’s results do not represent the receiver’s real position, thus the position deviations do not represent the position bias caused by the spoofing signal. Therefore, we cannot see the effect of the 600-m offset. If it is only solved by the traditional least squares method, we can observe that the receiver is slowly driven by the spoofing signal and reaches its final offset of 600 m.

3.5. Comparison with Other Methods

To further evaluate the performance of the algorithm, we select the related methods (range rates jump detection, C/No jump detection, the clock offset and the clock drift jump detection) from [1] in the simulation, and the results are shown in Figure 12, Figure 13, Figure 14 and Figure 15.
As shown on Figure 12a,c, there is a slow convergence at the beginning; this is due to the code smoothing process within the receiver. From the simulation results, we can see that when the spoofing signal appears, the clock offset presents an oscillating state, and the amplitude of the oscillation is related to the motion state. For example, Figure 12a,d shows the cases where the receiver is in a moving state and the clock offset oscillation range is larger than that of Figure 12b,c. In the Beidou Open Laboratory test, the large oscillation only occurs in the process of signal switching. When the signal is locked in the spoofing signal, the clock offset oscillation is not so obvious, and the spoofing signal has completely taken over the receiver at this time. In addition, it can be seen from the four subfigures in Figure 12 that the clock offset is not the same magnitude, which limits the application of the method based on the jump detection of the clock offset, as the detection threshold needs to be set in advance. This method cannot be applied to the scenario in which the signal is spoofing from the beginning. From the simulation results in Figure 13, we can see that the clock drift shows similar characteristics as the clock offset. The range and magnitude of the oscillation will limit the application of this method. Moreover, as can be seen from Figure 12c and Figure 13c, there is no obvious change in the clock offset and the clock drift, which poses a challenge for the signal detection based on the method in [1].
From the simulation result in Figure 14a,b, we can see that the C/No has a relatively significant change when the spoofing signal is acquired. At this time, we can use the method of C/No jump detection. For the static and dynamic position spoofing scenario, the spoofing signal is switched by a 0.4-dB and a 0.8-dB power advantage, respectively. Therefore, we cannot observe any obvious changes. The method of C/No jump detection is invalid for these two kinds of spoofing scenarios. From the simulation result in Figure 15, we can see that none of the changes of range rates for these four kinds of spoofing scenarios is obvious. Therefore, the method of range rate jump detection is invalid.
We summarize the detection ability of different methods in Table 2. From Table 2, we can see that range rates jump detection is invalid for all scenarios in this paper (in fact, it is only effective for the simplest spoofing attacks). The other three methods (C/No jump detection, clock offset jump detection, clock drift jump detection) would be effective at detecting only some of the spoofing attacks. Our algorithm, proposed in this paper, shows effective detection performance for all the above scenarios.

4. Conclusions

In this paper, we propose an effective spoofing detection algorithm. We establish the pseudorange double-difference model. The ionosphere delay correction, the troposphere delay correction and the satellite clock offset correction are considered and used to correct the pseudorange. Taylor expansion is applied to the position relationship between the vehicle and the satellite. To guarantee the performance of the algorithm, we give the parameter setting of the proposed algorithm. Different kinds of test datasets are used to verify the effectiveness and the feasibility of the algorithm. From the simulation results, we can verify the advantageous performance of the algorithm.
The algorithm has the advantage of simplicity for use in engineering applications. First, the requirement for the equipment is low compared to multi-antenna detection algorithms. Only one single receiver is required, and the hardware of the receiver does not need to be changed. Second, the requirement for the measurement information is low compared to multi-algorithm fusion detection methods. Only the pseudorange is required. Last, the algorithm has a low complexity. The calculation of the pseudoranges is executed only twice before the iterative calculation.

Author Contributions

K.L. and W.W. discussed this problem and gave the ideas of spoofing signal detection. K.L. wrote the paper, performed the whole experiment and completed the data analysis. W.W., K.T. and L.H. provided valuable feedback, advice and mentoring during the manuscript’s modification. Z.W. contributed to the whole experiment implementation and gathered information from the literature.

Funding

This work was supported in part by the Research Fund for the Doctoral Program of Higher Education of China (grant number 20124307110006) and the Human Project on Science and Technology in China (grant number 2017RS3045).

Acknowledgments

Thanks are due to Beidou Open Laboratory for assistance with experiments and to Shanghai Advanced Research Institute, Chinese Academy of Sciences, for equipment support. We acknowledge Koos van der Linden and Canmanie Ponnambalam at Delft University of Technology for reading our paper and providing valuable comments. Thanks are due to the referees for their valuable comments.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this paper:
GNSSGlobal navigation satellite system
TEXBATTexas spoofing test battery
PRNPseudo-random noise
ECEFEarth-centered Earth-fixed
GDOPGeometric dilution of precision
NINational Instruments
I/QIn-phase/quadrature
RFRadio frequency
P codePrecision code
C/A codeCoarse/acquisition code
C/NoCarrier noise power ratio

References

  1. Wen, H.Q.; Huang, P.Y.-R.; Dyer, J.; Archinal, A.; Fagan, J. Countermeasures for GPS Signal Spoofing. In Proceedings of the 18th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2005), Long Beach, CA, USA, 13–16 September 2005. [Google Scholar]
  2. Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In Proceedings of the 21st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2008), Savannah, GA, USA, 16–19 September 2008. [Google Scholar]
  3. U.S. Military Definition of Meaconing. Available online: http://www.dtic.mil/doctrine/jel/doddict/data/m/03301.html (accessed on July 2012).
  4. Huang, L.; Lv, Z.C.; Wang, F.X. Spoofing pattern research on GNSS receivers. J. Astronaut. 2012, 33, 884–890. [Google Scholar] [CrossRef]
  5. Dehghanian, V.; Nielsen, J.; Lachapelle, G. GNSS spoofing detection based on signal power measurements: Statistical analysis. Int. J. Navig. Obs. 2012, 7, 1–8. [Google Scholar] [CrossRef]
  6. Jafarnia-Jahromi, A.; Broumandan, A.; Nielsen, J.; Lachapelle, G. Pre-despreading authenticity verification for GPS L1 C/A signals. Navig. J. Inst. Navig. 2014, 61, 1–11. [Google Scholar] [CrossRef]
  7. Borio, D. PANOVA tests and their application to GNSS spoofing detection. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 381–394. [Google Scholar] [CrossRef]
  8. Zhang, Y.T.; Wang, L.; Wang, W.Y.; Lu, D.; Wu, R.B. Spoofing jamming suppression techniques for GPS based on DoA estimating. In Proceedings of the China Satellite Navigation Conference (CSNC 2014), Nanjing, China, 21–23 May 2014. [Google Scholar]
  9. Broumandan, A.; Jafarnia-Jahromi, A.; Daneshmand, S.; Lachapelle, G. Effect of Tracking Parameters on GNSS Receiver Vulnerability to Spoofing Attack. In Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016. [Google Scholar]
  10. Wang, W.Y.; Chen, G.; Wu, R.B.; Lu, D.; Wang, L. A low-complexity spoofing detection and suppression approach for ADS-B. In Proceedings of the Integrated Communications Navigation and Surveillance (ICNS) Conference, Herdon, VA, USA, 21–23 April 2015. [Google Scholar]
  11. Borio, D.; Gioia, C. A sum-of-squares approach to GNSS spoofing detection. IEEE Trans. Aerosp. Electron. Syst. 2016, 52, 1756–1768. [Google Scholar] [CrossRef]
  12. Radin, D.S.; Swaszek, P.F.; Seals, K.C.; Hartnet, R.J. GNSS Spoof Detection Based upon Pseudoranges from Multiple Receivers. In Proceedings of the 2015 International Technical Meeting of the Institute of Navigation, Dana Point, CA, USA, 26–28 January 2015. [Google Scholar]
  13. Broumandan, A.; Jafarnia-Jahromi, A.; Lachapelle, G. Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solut. 2015, 19, 475–487. [Google Scholar] [CrossRef]
  14. Psiaki, M.L.; O’ Hanlon, B.W.; Bhatti, J.A.; Shepard, D.P.; Humphreys, T.E. GPS spoofing detection via dual-receiver correlation of military signals. IEEE Trans. Aerosp. Electron. Syst. 2013, 49, 2250–2267. [Google Scholar] [CrossRef]
  15. Lee, J.H.; Kwon, K.C.; An, D.S.; Shim, D.S. GPS Spoofing Detection Using Accelerometers and Performance Analysis with Probability of Detection. Int. J. Control Autom. Syst. 2015, 13, 951–959. [Google Scholar] [CrossRef]
  16. White, N.A.; Maybeck, P.S.; DeVilbiss, S.L. Detection of Interference/Jamming and Spoofing in a DGPS-Aided Inertial System. IEEE Trans. Aerosp. Electron. Syst. 1998, 34, 1208–1217. [Google Scholar] [CrossRef]
  17. Gamba, M.T.; Truong, M.D.; Motella, B.; Falletti, E.; Ta, T.H. Hypothesis testing methods to detect spoofing attacks: A test against the TEXBAT datasets. GPS Solut. 2017, 2, 577–589. [Google Scholar] [CrossRef]
  18. Wang, F.; Li, H.; Lu, M.Q. GNSS Spoofing Detection and Mitigation Based on Maximum Likelihood Estimation. Sensors 2017, 17, 1532. [Google Scholar] [CrossRef] [PubMed]
  19. Manfredini, E.G.; Dovis, F. On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection. Sensors 2016, 16, 2051. [Google Scholar] [CrossRef] [PubMed]
  20. Kim, T.H.; Sin, C.S.; Lee, S.; Kim, J.H. Analysis of effect of anti-spoofing signal for mitigating to spoofing in GPS L1 signal. In Proceedings of the 2013 13th International Conference on Control, Automation and Systems (ICCAS), Gwangju, Korea, 20–23 October 2013. [Google Scholar]
  21. Pozzobon, O.; Canzian, L.; Danieletto, M.; Chiara, A.D. Anti-spoofing and open GNSS signal authentication with signal authentication sequences. In Proceedings of the IEEE Satellite Navigation Technologies and European Workshop on Gnss Signals and Signal, Noordwijk, The Netherlands, Noordwijk, The Netherlands, 8–10 December 2010. [Google Scholar]
  22. Li, W.T.; Huang, Z.G.; Lang, R.L.; Qin, H.L.; Zhou, K.; Cao, Y.B. A Real-Time Interference Monitoring Technique for GNSS Based on a Twin Support Vector Machine Method. Sensors 2016, 16, 329. [Google Scholar] [CrossRef] [PubMed]
  23. Tao, H.Q.; Li, H.; Lu, M.Q. A Method of Detections’ Fusion for GNSS Anti-Spoofing. Sensors 2016, 16, 2187. [Google Scholar] [CrossRef] [PubMed]
  24. Zhang, Z.J.; Zhan, X.Q. GNSS Spoofing Network Monitoring Based on Differential Pseudorange. Sensors 2016, 16, 1771. [Google Scholar] [CrossRef] [PubMed]
  25. Groves, P.D. Navigation Processor. In Principles of GNSS, Inertial, and Multisensor Integrated Navigation Systems; Artech House: Boston, MA, USA, 2013; pp. 258–273. ISBN 13.978-1-58053-255-6. [Google Scholar]
  26. Humphreys, T.E.; Bhatti, J.A.; Shepard, D.P.; Wesson, K.D. The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques. In Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2012), Nashville, TN, USA, 17–21 September 2012. [Google Scholar]
  27. Humphreys, T.E. Texbat Data Sets 7 and 8. Technical Report. Available online: http://radionavlab.ae. utexas.edu/datastore/texbat/texbat_ds7_and_ds8.pdf. (accessed on 16 March 2016).
  28. Lemmenes, A.; Corbell, P.; Gunawardena, S. Detailed Analysis of the TEXBAT Datasets Using a High Fidelity Software GPS Receiver. In Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016. [Google Scholar]
  29. The TEXBAT Datasets. Available online: http://radionavlab.ae.utexas.edu/datastore/texbat/ (accessed on November 2012).
Figure 1. The signal transmission path.
Figure 1. The signal transmission path.
Sensors 18 03197 g001
Figure 2. The detailed spoofing detection process.
Figure 2. The detailed spoofing detection process.
Sensors 18 03197 g002
Figure 3. Pseudorange double-difference model establishment and solution.
Figure 3. Pseudorange double-difference model establishment and solution.
Sensors 18 03197 g003
Figure 4. Position deviations of the two algorithms (Experiment No. 1).
Figure 4. Position deviations of the two algorithms (Experiment No. 1).
Sensors 18 03197 g004
Figure 5. Three-dimensional results of the two algorithms (Experiment No. 2).
Figure 5. Three-dimensional results of the two algorithms (Experiment No. 2).
Sensors 18 03197 g005
Figure 6. Position deviations of the two algorithms (Experiment No. 2).
Figure 6. Position deviations of the two algorithms (Experiment No. 2).
Sensors 18 03197 g006
Figure 7. Position deviations of the two algorithms (clean static scenario).
Figure 7. Position deviations of the two algorithms (clean static scenario).
Sensors 18 03197 g007
Figure 8. Position deviations of the two algorithms (clean dynamic scenario).
Figure 8. Position deviations of the two algorithms (clean dynamic scenario).
Sensors 18 03197 g008
Figure 9. Position deviations of the two algorithms (static position spoofing scenario).
Figure 9. Position deviations of the two algorithms (static position spoofing scenario).
Sensors 18 03197 g009
Figure 10. Position deviations of the two algorithms (dynamic position spoofing scenario).
Figure 10. Position deviations of the two algorithms (dynamic position spoofing scenario).
Sensors 18 03197 g010
Figure 11. Position deviations of the two algorithms (dynamic whole-time duration position spoofing scenario).
Figure 11. Position deviations of the two algorithms (dynamic whole-time duration position spoofing scenario).
Sensors 18 03197 g011
Figure 12. Curve of the clock offset in different experimental scenarios.
Figure 12. Curve of the clock offset in different experimental scenarios.
Sensors 18 03197 g012
Figure 13. Curve of the clock drift in different experimental scenarios.
Figure 13. Curve of the clock drift in different experimental scenarios.
Sensors 18 03197 g013
Figure 14. Curve of the carrier noise power ratio (C/No) in different experimental scenarios.
Figure 14. Curve of the carrier noise power ratio (C/No) in different experimental scenarios.
Sensors 18 03197 g014
Figure 15. Curve of the range rates in different experimental scenarios.
Figure 15. Curve of the range rates in different experimental scenarios.
Sensors 18 03197 g015
Table 1. The characteristics of different experiments.
Table 1. The characteristics of different experiments.
ExperimentScenario TypeReceiver StateSignal Type
No. 1 (University Test)meaconing attackstatic and dynamicreal and spoofing
No. 2 (Beidou Open Laboratory Test)simplistic attackstaticreal and spoofing
No. 3 (The Texas Spoofing Test Battery)realstaticreal
No. 4 (The Texas Spoofing Test Battery)realdynamicreal
No. 5 (The Texas Spoofing Test Battery)intermediate attackstaticreal and spoofing
No. 6 (The Texas Spoofing Test Battery)intermediate attackdynamicreal and spoofing
No. 7 (The Texas Spoofing Test Battery)intermediate attackdynamicspoofing
Table 2. Different methods’ detection ability.
Table 2. Different methods’ detection ability.
No. 1No. 2No. 5No. 6
Range Rates Jump Detection
C/No Jump DetectionDetectsDetects
Clock Offset Jump DetectionDetects Detects
Clock Drift Jump DetectionDetects Detects
Algorithm in This PaperDetectsDetectsDetectsDetects

Share and Cite

MDPI and ACS Style

Liu, K.; Wu, W.; Wu, Z.; He, L.; Tang, K. Spoofing Detection Algorithm Based on Pseudorange Differences. Sensors 2018, 18, 3197. https://doi.org/10.3390/s18103197

AMA Style

Liu K, Wu W, Wu Z, He L, Tang K. Spoofing Detection Algorithm Based on Pseudorange Differences. Sensors. 2018; 18(10):3197. https://doi.org/10.3390/s18103197

Chicago/Turabian Style

Liu, Ke, Wenqi Wu, Zhijia Wu, Lei He, and Kanghua Tang. 2018. "Spoofing Detection Algorithm Based on Pseudorange Differences" Sensors 18, no. 10: 3197. https://doi.org/10.3390/s18103197

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop