Next Article in Journal
Up-down Taper Based In-Fiber Mach-Zehnder Interferometer for Liquid Refractive Index Sensing
Next Article in Special Issue
UWB Channel Impulse Responses for Positioning in Complex Environments: A Detailed Feature Analysis
Previous Article in Journal
Environmental Cross-Validation of NLOS Machine Learning Classification/Mitigation with Low-Cost UWB Positioning Systems
Previous Article in Special Issue
The Impact of Different Kernel Functions on the Performance of Scintillation Detection Based on Support Vector Machines
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blind Spoofing GNSS Constellation Detection Using a Multi-Antenna Snapshot Receiver †

by
Johannes Rossouw van der Merwe
*,
Alexander Rügamer
and
Wolfgang Felber
Satellite Based Positioning Systems Department, Fraunhofer IIS, Nordostpark 84, 90411 Nuremberg, Germany
*
Author to whom correspondence should be addressed.
This paper is an extended version of “Blind Spoofing Detection using a Multi-Antenna Snapshot Receiver” by Johannes Rossouw van der Merwe, Alexander Rügamer, Alejandro Fernández-Dans Goicoechea, and Wolfgang Felber, published in the Proceedings of the 2019 9th International Conference on Localization and GNSS (ICL-GNSS), Nuremberg, Germany, 4–6 June 2019.
Sensors 2019, 19(24), 5439; https://doi.org/10.3390/s19245439
Submission received: 29 October 2019 / Revised: 27 November 2019 / Accepted: 5 December 2019 / Published: 10 December 2019

Abstract

:
Spoofing of global navigation satellite system (GNSS) signals threatens positioning systems. A counter-method is to detect the presence of spoofed signals, followed by a warning to the user. In this paper, a multi-antenna snapshot receiver is presented to detect the presence of a spoofing attack. The spatial similarities of the array steering vectors are analyzed, and different metrics are used to establish possible detector functions. These include subset methods, Eigen-decomposition, and clustering algorithms. The results generated within controlled spoofing conditions show that a spoofed constellation of GNSS satellites can be successfully detected. The derived system-level detectors increase performance in comparison to pair-wise methods. A controlled test setup achieved perfect detection; however, in real-world cases, the performance would not be as ideal. Some detection metrics and features for blind spoofing detecting, with an array of antennas, are identified, which opens the field for future advanced multi-detector developments.

1. Introduction

Spoofing, the transmission of false signals to manipulate a receiver, is a significant threat to the security, reliability, and integrity of the global navigation satellite system (GNSS) users [1,2]. A spoofer aims to manipulate the position, velocity, and time (PVT) solution of the receiver and is consequently associated with criminal, terrorism, and military activities. Transmitting, and by extension spoofing, in unallocated radio frequency (RF) spectrum, or transmitting without permission is illegal, according to international spectral policies and agreements [3,4]. However, this does not deter spoofing attacks [5]. There are many anti-spoofing methods and schemes to detect spoofing [2,6,7,8]; however, many of these fail when a spoofing attack is more sophisticated (e.g., a synchronized attack) or cooperative (i.e., the owner of the receiver assists with the attack) [9]. A transmitter in a spoofing attack is usually terrestrial [5]. Therefore, the spatial distribution over the open-sky of real GNSS signals is not emulated. Consequently, spatial detection methods have proven a continued success, independent of the spoofing method used [10,11]. Spatial detection methods require either the utilization of an array of antennas or a highly directional antenna [12]. Most commonly, an array of antennas that is time and frequency-synchronized is required, such that detection methods, like direction-of-arrival (DOA) estimation, can be applied.
This article applies array-based spoofing detection methods to server-based GNSS processing methods. Server-based GNSS processing allows for the remote evaluation of GNSS signals, based on a signal recording (i.e., baseband samples) made by a receiver [13]. As the processing is done remotely, it is also referred to as cloud GNSS [14], or snapshot processing, as a small snapshot of baseband or intermediate frequency data is sent from the receiver to the server for processing [15,16]. In turn, the server computes the PVT solution of the snapshot. One aim of this technique is to remove the processing burden from the receiver and to transfer it to the server. Server-based processing can be applied to low-power devices [17,18], which cannot afford a full GNSS receiver for positioning. This saves on power and weight requirements for the receiver as well as the associated system. Hence, it is often used for low size, weight and power (SWAP) devices. Applications such as remote sensing and animal tracking can benefit from this technique [19]. Mobile devices can also profit from this approach [13]. Another application for server-based processing is the verification of a receiver’s position using encrypted GNSS signals [20,21]. Inexpensive receivers typically do not have the required security module to allow cryptographically protected GNSS signals to be used on-board, but a server containing this security module can outsource the capability without exposing sensitive information. A snapshot of data may be sent to this server for authentication. Snapshot receivers have a limited window of data. Therefore, many popular temporal spoofing detection methods are not applicable [9]. This further emphasizes the need for spatial detection methods for snapshot-based receivers.
This article presents multiple spoofing detection methods using an antenna array in conjunction with a snapshot receiver. It extends on the previous snapshot-based blind spoofing detection methods [22], by considering a system of detectors to improve the overall detector performance. An exploratory approach is used with empirical analysis, to identify suitable detection metrics. The snapshot concept aims to transfer the processing load to the server and to maintain receiver complexity and requirements as low as possible. Therefore, the benefits of array processing can be applied to SWAP devices. The drawback of using multiple antennas is that it requires synchronized receiver channels. This increases the system complexity and cost which makes this technique counter-productive for low SWAP devices. However, it can be argued that this is a necessity for reliable spoofing detection. DOA based detection requires the array to be calibrated, which further increases the cost and complexity of the system. The focus of this research was to develop and assess blind detection methods which do not require DOA, thereby reducing the receiver complexity, cost, and the need for array calibration.
A background on snapshot receivers, server-based processing, and the implementation of beamforming to improve performance is provided in Section 2. The spoofing detection algorithm for a single pair of spoofed satellites is presented in Section 3, with additional theoretical analysis to support performance expectations. An expansion to system-level detection methods is done in Section 4. The experimental setup is introduced in Section 5, results are presented in Section 6, and discussed in Section 7. Finally, conclusions are drawn in Section 8.

2. Snapshot Receivers and Beamforming

A snapshot receiver operates with a few milliseconds of raw data obtained by the analog-to-digital converter (ADC) output following the RF front-end [15]. This raw data snapshot is sent to a server for processing. As there are limited data available, the server can only achieve signal acquisition: there are not enough data available for a tracking process, nor sufficient data to obtain any information from the navigation message. Since the ephemeris cannot be decoded, this information is obtained from a secondary source. A direct pseudorange cannot be derived from the acquisition results since the transmission time of the satellite is not available. However, given a rough receiver position and time estimate together with the ephemeris data, pseudorange reconstruction can be achieved [23]. Once the PVT has been calculated and verified, the result might be sent back to the receiver, depending on the architecture and needs of the receiver.

2.1. Acquisition Signal Model

Acquisition forms the base of the entire processing chain—not just for initialization like with a conventional receiver. Therefore, it is important to have high performance during this stage. Since the transport channel between the receiver and the server is often limited, the snapshot size is reduced to satisfy data transmission requirements. This is a trade-off for the receiver, since the smaller the snapshot is, due to length, sample-rate, and quantization reduction, the poorer the acquisition performance [24]. Acquisition performance with snapshot receivers using multiple antennas has been investigated in a previous study [25]. This method has shown good performance, as it uses both spatially incoherent and spatially coherent integration (i.e., beamforming) to improve acquisition performance.
The received signal system x ( t ) can be described as:
x ( t ) = A × s ( t ) + n ( t ) ,
where x ( t ) is the received signal for each antenna element, represented as a number of antenna elements N e sized column vector; n ( t ) is a N e sized noise vector and is assumed to be additive white Gaussian noise (AWGN); A is a N e × N s matrix containing the array vectors for each of the N s signals. This A matrix is defined as:
A = a 1 , a 2 , , a N s ,
where a i is a column vector of size N e describing the complex array coefficients. These are a function of the DOA of the signal, the position of the antenna elements, the gain of the receiver channels, and the phase offset for the receiver channels. The received signal vector s ( t ) is a N e × 1 vector, where each element represents a different GNSS signal form a different satellite. For the i-th satellite, the received signal is defined as:
s i ( t ) = α i · r i ( t τ ) · d i ( t τ ) · e 2 π j · f D t ,
where α i is the complex gain for the signal (i.e., amplitude and phase); τ is the code phase (i.e., the time offset); r i ( t ) is the pseudo random noise (PRN) code for the specific satellite; d i ( t ) is the modulated data on the signal and is—dependent on the signal type—a combination of the navigation message and the secondary code [26]; and f D is the Doppler frequency offset induced by the relative movement between the satellite and the receiver. To isolate a single signal, the acquisition stage correlates the received signal with a replica. The replica typically contains a single iteration of the PRN code. In general, PRN codes are selected to have good cross- and auto-correlation properties; hence, the correlation enhances the correct signal while suppressing other signals, interference, and noise. As an example, a single received signal will be:
y i , j ( t ) = s i ( t ) r j ( t ) = α i · d i ( t ) · R i , i ( τ ) τ int sin c τ int f D if i = j 0 if i j ,
where “⋆” is the correlation function; R i , i ( · ) is the cross ambiguity function (CAF) for the given PRN sequence; τ int is the integration time used during correlation; and sin c ( · ) is the sinc-function, also called the sampling function [27]. From this equation, it is clearly illustrated how the PRN sequence can isolate the selected signal. Further, if the code phase offset τ and the Doppler offset f D is zero, the correlation will have a maximum value. To find these values, which are the maximum correlation peak, is the purpose of the acquisition processing. This is done by modulating the replica with different Doppler frequencies and by shifting the replica code with different time delays.
Typically, the longer the integration time τ int is, the more processing gain is achieved, which results in better performance and noise suppression. However, this is limited by the bit-transitions of the modulated data d i ( t ) . In the worst case, a bit-transition can result in deconstructive self-interference, which will completely remove the signal during the correlation stage. As such, either the bit-transitions need to be estimated or incoherent integration is required. As the PRN sequence r ( t ) is periodic in time, the correlation output y i , j ( t ) is also quasi-periodic: the magnitude of the correlation function is periodic in time, but the phase is not, due to the modulated bit-stream. To combine these values incoherently in time, the squared values are summed:
y i , j N inco ( t ) = l = 0 N inco 1 y i , j ( t l · T rep ) × y i , j ( t l · T rep ) = l = 0 N inco 1 y i , j ( t l · T rep ) 2 ,
where N inco is the number of temporal incoherent epochs to use, T rep is the repetition interval for the PRN code, ( · ) is the complex conjugate of the function, and · is the magnitude function. As these values are added incoherently, longer effective integration times can be achieved. However, due to the incoherent addition, there is also a squaring loss. This makes this method less effective in comparison to temporal coherent integration, but it is significantly more robust to bit-transitions.

2.2. Spatial Acquisition Techniques

Combining all spatial channels coherently results in improved acquisition performance [25]. This is also referred to as beamforming or array processing [28]. It can be done before or after correlation [29,30], referred to as pre- and post-correlation beamforming. Typically, pre-correlation beamforming is preferred, as this is more processing efficient than post-correlation beamforming since fewer correlation operations are required. An array steering vector is used to combine the data from each of the channels. The function of the array steering vector is to correct the amplitude and phase offsets from each channel, such that signals are aligned and can be coherently combined. An array steering vector b i is a column vector of size N e × 1 . Pre-correlation beamforming can be described as:
y i , j pre ( τ , f D ) = b i T × x ( t ) r j ( t τ , f D ) ,
and post-correlation beamforming as:
y i , j post ( τ , f D ) = b i T × x ( t ) r j ( t τ , f D ) ,
As both these correlation processes and the matrix multiplications are linear, these operations are per definition associative. Therefore, the outputs of both functions are mathematically equal. The disadvantage of coherent spatial integration is that the array steering vector b i should be known. This can either be estimated or be determined theoretically if sufficient a-priori information is available. An alternative approach is incoherent spatial integration. This follows a similar approach to incoherent temporal integration, but instead of exploiting the periodicity of the signal, it exploits the temporal similarities between the antenna channels. Once again, the correlation functions have peaks at the same locations; however, with different phases. Incoherent spatial integration for y j inco ( τ , f D ) can be described as:
y j inco ( τ , f D ) = i = 1 N e x i ( t ) r j ( t τ , f D ) .
Using spatial incoherent acquisition does not suppress interferences or other signals. Further, it also has a squaring loss. Hence, it is less effective against noise in comparison to coherent beamforming. However, it allows the correlation peak to be found more reliable than only using a single channel. Once the corrected code phase τ and Doppler offset f D is found, the array steering vector can be determined. Let the correlation output vector y i ( τ , f D ) for each channel be defined as:
y i ( τ , f D ) = x ( t ) r i t τ , f D .
If the code phase τ and Doppler offset f D are correctly estimated, it can be shown to be equal to:
y i ( τ , f D ) = a i α i · R i , i ( 0 ) + n c ,
where ∘ is the Hadamard product, and n c is the noise vector after correlation. From these values the array steering vector can be simply estimated:
b i = y i ( τ , f D ) 1 ,
where ( · ) 1 is the Hadamard inverse (i.e., an element wise inverse). Note that in this case the array steering vector also contains the corrections to the receiver phase and amplitude errors ( α i ). Hence, these do not need to be estimated separately. More sophisticated methods to determine the array steering vector can also be implemented [31,32,33,34]. Lastly, if incoherent temporal integration was used, like with Equation (5), then the average phase and magnitude offsets relative to the first element is done. This removes the bit-transitions in the code as well:
b i = l = 0 N inco 1 y i ( t l · T rep , f D ) 1 · e 2 π j · y 1 , i ( t l · T rep , f D ) ,
where “∠” is the angle operator.

2.3. Combined Acquisition Strategy

An effective blind acquisition technique, which firstly implements incoherent spatial integration to find the correct correlation peak, secondly estimates the array steering vector, and thirdly does coherent spatial integration, has already been developed [25]. This method is completely blind, as no DOA estimation is done. Figure 1 shows the method that was used for acquisition and to estimate the array steering vector. Consequently, no calibration or information about the array configuration or orientation is required. The acquisition method first applies incoherent spatial acquisition followed by coherent spatial acquisition with an estimated array steering vector to improve performance. As this application focuses primarily on beamforming, the array steering vector is also referred to as the beamforming steering vector or the beamforming weights. Hence, these terms in this scenario can be used interchangeably.
Firstly, blind incoherent acquisition is carried out for each receiver channel. The received signals from every array element are correlated simultaneously with the replica of the current satellite (denoted by “Cor”). The absolute squared values of the correlations are added (“ | · | 2 ”) in order to estimate the code phase τ ( I ) and carrier Doppler f D ( I ) in the acquisition stage (“Acq”). If the satellite is acquired, then the array steering vector is estimated (“Est”) with the code phase τ ( I ) and carrier Doppler f D ( I ) from the incoherent acquisition results. Once the vector is estimated, the receiver channels are weighted accordingly (denoted by “BF”) and a second acquisition takes place. This time the coherent τ ( C ) and carrier Doppler f D ( C ) are determined. After the second acquisition stage, the code phases and Doppler frequencies from the first (incoherent), and the second (coherent) acquisitions are compared. If there is a significant difference, the satellite will be discarded and not used after acquisition. This allows a secondary test to remove false positives from the acquisition process. This double acquisition is processing-intensive, but it has shown high reliability and false acquisition suppression in previous studies [25].
A limitation of this method is that the estimation of the array steering vector is based upon the results of incoherent acquisition. These values may contain multi-path or cross-correlation components from other signals, which can obscure the estimation process. In turn, the erroneous array steering vector may form a beam that does not sufficiently suppress these unwanted signal components. This raises concerns, especially in harsh environments with significant multi-path components, as it may result in offsets in the acquisition estimates, which in turn result in a degraded PVT solution.

3. Single Detection

Spoofing detection with an array of antennas has been proven successfully [11,35,36]. However, this requires a calibrated array, known array orientation, known receiver phase offsets, and a synchronized receiver. These methods are DOA based and estimate the direction to each satellite. As the snapshot concept aims to outsource the processing to the server, it implicitly shifts the cost of the system away from the receiver. However, all calibrations required for array processing would increase teh cost and complexity of the receivers. One solution to counteract high complexity and cost is to use blind array processing. Further, most array steering methods are also applied to conventional receivers where successive and recursive estimation on a continuous signal is available.
A drawback of blind methods is that the detection is relative: a single signal originating from the wrong direction cannot be detected. However, if multiple signals originate from the same direction, they can be detected. Since a constellation of signals is usually spoofed, this would not be an issue in real-life scenarios. However, in the case of distributed spoofing attacks (i.e., multiple spoofing transmitters) [37], it would be significantly more difficult to detect. Fortunately, distributed attacks are rare, due to the associated difficulty [7,37].
The spoofing detection algorithm presented in this article uses the array steering vector obtained in acquisition (see Section 2), as this information is already available and can be used. The array steering vector is tested for similarity by correlating each pair of vectors with each other. If the signals originate from the same direction, then they have similar vectors and have a high correlation value. The detector is based on this correlation value and implements a detection for each pair of array steering vectors.
The detector implements a detection for each pair of steering vectors. Hence, a system of detections is developed. This makes the detection process more efficient. First, all the estimated array steering vectors b n are stacked in a matrix B :
B = b 1 , b 2 , , b N s ,
where b n is a column vector for the array steering vector for the n-th satellite. The constellation consists of a total of N s satellites. B is a number of elements N e by the number of estimated steering vectors N s sized matrix. The matrix is correlated to get a non-normalized correlation matrix C :
C = B H × B ,
where ( · ) H is the Hermitian transpose of the signal and “×” is a matrix multiplication. Each element in the matrix is equivalent to the dot product between each pair of steering vectors. C is a N s by N s Hermitian matrix. To normalize the matrix, the magnitude values of the auto-correlations need to be determined:
c = diag C ,
where c is a column vector containing the magnitude values, and diag · takes the diagonal of a matrix. The normalized correlation matrix C norm is calculated as:
C norm = C c × c T 1 ,
where · takes the real component of the correlation, ∘ is the Hadamard product, and ( · ) 1 is the Hadamard inverse. C norm is also an Hermitian matrix. Each element of this matrix has the form:
C norm ( n , m ) = b n · b m b n b m = cos ξ n , m ,
where b n is the magnitude of the n-th beamforming vector. Each correlation can be regarded as the cosine of the angle ξ n , m between two array steering vectors. This is not the spatial angle of the DOA between two satellites (also referred to as the incident angle of the array), but a measure of how similar the two steering vectors are. For the remainder of this article, this angle will be referred to as the steering vector angle.
As an example, a uniform linear array (ULA) with an inter-element spacing of half a wavelength has beamforming steering vectors in the form of:
b = [ e j π · 1 · sin θ , e j π · 2 · sin θ , , e j π · N e · sin θ ] T ,
where θ is the spatial angle (incident angle) to the broadside of the array. For a two-element array, the steering vector can be proven to have the form:
cos ξ 1 , 2 = cos ξ 2 , 1 = cos 2 π 2 sin θ .
In this case, the steering vector angle ξ 2 , 1 diverges rapidly from the spatial angle θ (array incident angle).
Figure 2 shows the expected behavior for ULAs with different number of elements. As the number of elements increases, the beamforming angle separates quicker with smaller spatial angles. Consequently, with more elements used, increased diversity can be exploited for detection.
ULAs are straightforward to analyze. However, they are not suitable for GNSS applications as these antenna arrays only have beamforming capabilities in a single dimension. GNSS signals can originate from any direction above the horizon; hence, two-dimensional beamforming capabilities are required. Therefore, uniform circular arrays (UCAs) are often used for GNSS receivers [38]. As the beamforming properties of arrays are dependent on the array configuration, the performance of this method will be fundamentally different. Figure 3 shows the expected behavior for a UCA under similar circumstances.
The previous two figures only show the ideal case of one signal being on the broadside of the antenna array and the other signal moving relative to it. ULAs and UCAs have ambiguities: two satellites at different locations can have similar steering vectors. The result is that these signals would seem to be originating from the same direction and would be detected and classified as spoofed signals. In order to reduce the false detection probability due to array ambiguities, the cumulative distribution function (CDF) for all the difference angles are calculated. The CDF is used to summarize the statistics for different array orientations, as the array steering vector is dependent on the array geometry, orientation, and incident angle. Hence, the CDF represents the overage likelihood that the difference value is below a certain value. More details of CDFs and statistical distributions are presented in Section 5.
Figure 4 shows the CDF function of the steering vector angle for a UCA consisting of six elements. The test angles are for a single cross-section consisting of all elevation angles and a single azimuth value. The angles to which the CDF first achieves a value equal to one (i.e., 100% certainty), follows the ideal case as shown in Figure 3. However, it can also be seen that there are many cases where the steering vector angle is spread which may result in poor performance in these cases.
This analysis shows that the separation between the spatial and steering vector angle can be used as a good detector to determine how similar the origins of two signals are. The detector threshold is tuned according to a symbolic steering vector separation angle. This is the steering vector angular threshold ξ Th :
λ Th = cos ξ Th .
This symbolic angle provides an intuitive understanding of how the detector functions, as opposed to merely setting an arbitrary threshold value. The threshold is used to detect each value in the matrix C norm . If the value is lower than the threshold then the null-hypothesis H 0 of no spoofing is accepted. Otherwise, the alternative hypothesis H 1 , where the signals have similar origins and are considered spoofed, is accepted:
C norm ( n , m ) = cos ξ n , m H 0 H 1 λ Th .
A detection matrix D can be generated accordingly:
D ( n , m ) = 1 , if C norm ( n , m ) λ Th 0 , if C norm ( n , m ) > λ Th .
Both normalized the correlation matrix C norm and the detection matrix D are used in the subsequent sections to develop system-level detectors. As such, obtaining these matrices are the first step for the subsequent blind detection methods.

4. System of Detections

In the previous section, single detections between satellite similarities were done. In this section, three strategies to combine the matrix of results to improve spoofing detection are presented. These strategies result in different metrics and features which can later be used for detection or further statistical approaches.

4.1. Fraction of Detections

The first method is to consider the number of detections in the upper triangle of the detection matrix D . The size of the detection matrix D depends on the number of successfully acquired satellites N s . The total number of detection values N in the upper triangle is:
N = N s ( N s 1 ) 2 .
The detector observes the number of detections in this triangle. If at least M detections are made, then the system is selected as being spoofed. If it is assumed that all of the satellites are either completely spoofed or only real signals (i.e., no combined real and spoofed signals), the detection probabilities for the system can be determined to be:
P D ( M ) = m = M N N m P d | S m P d ¯ | S N m ,
where N m is the binomial coefficient, P d | S is the conditional probability that a value is detected d, given that the signals are spoofed S. The inverse is indicated by d ¯ (i.e., it is not detected). Similarly, the probability of a missed detection P M ( M ) , the probability of false alarm P F A ( M ) , and the probability of a correct rejection P R ( M ) can also be determined:
P M ( M ) = m = 0 M 1 N m P d | S m P d ¯ | S N m
P F A ( M ) = m = M N N m P d | S ¯ m P d ¯ | S ¯ N m
P R ( M ) = m = 0 M 1 N m P d | S ¯ m P d ¯ | S ¯ N m
This approach improves overall performance as it uses each combination of the satellites to verify whether the complete constellation is spoofed or not. Thereby, false detections from spatially similar satellites can be efficiently suppressed. Further, by combining all of the detections the overall system improvement allows for increased tuning freedom within individual detection.
One issue of this approach of defining a minimum number of detection, is that the total number of detectors N is inconsistent. The total number of detectors depends on the size of the matrix C norm , which in turn is dependent on the number of satellites that were successfully acquired. To overcome this, a fraction of detections M N is used. This is called an M of N detector [39], but also referred to as binary integration [40,41] or coincidence detection [42,43]. A fraction of detections M N approach makes the system independent on the number of detectors to evaluate, as it is normalized. For example, if at least half of the values should be detected, then the system detector threshold is defined as M N = 1 2 . If too few detections are made then the null-hypothesis H 0 of no spoofing is accepted. Otherwise, the alternative hypothesis H 1 is accepted, where the signals have similar origins and are considered spoofed. This can be formally defined as:
λ frac = M N H 0 H 1 n , m D ( n , m ) N s 2 N ,
where D ( i , j ) is the i-th row and the j-th column of the detection matrix D (described in Section 3), and λ frac is the detector threshold for the fraction of detections metric. It can further be simplified using Equation (23):
λ frac H 0 H 1 n , m D ( n , m ) N s N s ( N s 1 ) .
The fraction of detection is a simple yet effective method of combining multiple detectors.

4.2. Eigenvalue Based Detection

Eigenvalue methods can be used for detection [44,45]. Eigenvalue decomposition separates a matrix to a set of orthogonal Eigenvectors and Eigenvalues. The magnitude of each Eigenvalue describes the contribution of the associated Eigenvector to the original matrix. The Eigenvalues are the characteristic roots of the system [46], whereby the distribution of the Eigenvalues describes the coherency of the elements of the linear system they represent. It directly links to the rank of the matrix. As such, these can be effectively used to detect the monotonicity of the matrix. Eigenvalue decomposition is described as:
A = Q Λ Q 1 ,
where A is the matrix to be decomposed, Q is a matrix where each column is a unique Eigenvector, and Λ is a diagonal matrix containing the Eigenvalues. For the remainder of the analysis, it is assumed that the Eigenvalues are placed in descending order. The maximum Eigenvalue to the mean of the Eigenvalues is used as a detection method [47]:
λ eig H 0 H 1 λ 1 1 N i λ i = Λ ( 1 , 1 ) 1 N Λ ,
where λ eig is the detection threshold, λ 1 is the largest Eigenvalue, λ i is the i-th Eigenvalue from the matrix, and N is the number of Eigenvalues. If the largest Eigenvalue is similar in size to the mean of the Eigenvalues and consequently below the threshold, the null-hypothesis H 0 of no spoofing is accepted. Otherwise, the alternative hypothesis H 1 is accepted.

4.3. Clustering and Community Based Detection

As spatial spoofing detection evaluates the similarity of the array steering vectors, a simple expansion thereupon is to attempt to cluster the array steering vectors together. This is a measure of how well the satellites can be grouped. The Louvian clustering algorithm is an iterative algorithm that optimizes the modularity of a data set [48,49]. The data set consists of several nodes and edges (links) between these nodes. Highly connected nodes are grouped into communities by this algorithm. This means that correlated nodes would be grouped in communities making this algorithm ideal for identifying “spoofing communities”. This allows the algorithm to identify which subset of satellites are spoofed and which are the real GNSS signals. At the same time, the modularity of the data set is an indication of the connectedness of the nodes. Hence, high modularity indicates that the nodes can be grouped efficiently into communities, whereas low modularity indicates that the data is highly random and not simply grouped into communities. Further, as the nodes are grouped into communities, the possibility to detect multiple spoofing transmitters is also possible (i.e., where a spoofer uses two or more antennas to transmit a subset of the signals). However, this phenomenon requires further investigation and is suggested for future research.
This algorithm requires a matrix A which contains the weight of the edges between each of the nodes. The higher values in this matrix corresponds to stronger links between the nodes. This is represented by the column and row of the matrix. Further, this algorithm requires a vector c which contains a list of the different communities.
Maximizing the modularity of the data set achieves effective clustering. The modularity Q is defined as:
Q = 1 2 m i , j A i j k i k j 2 m δ ( c i , c j ) ,
where m is the total connectedness between all of the nodes:
m = 1 2 i , j A i j ,
and k i is the connectedness of the i-th node to the other nodes and is defined as:
k i = j A i j .
Lastly, δ ( · ) is a modified Dirac function and is defined as:
δ ( c i , c j ) = 1 , if c i = c j 0 , otherwise .
At the start of the clustering process, all of the nodes are placed in separate communities. The initial modularity Q for the system is calculated. Systematically, each node is then moved to different communities. The community which results in the greatest increase of system modularity Q for each node is then selected as the new community for that node. When all of the nodes have been adjusted to the optimal community clustering, a new system is formed by grouping nodes from the same community. Thereby, implicitly reducing the dimensions of the matrix A in each iteration. Thereafter, the process is repeated until no improvement of the modularity Q is achievable. As the algorithm iterates, similar communities are clustered together to form new and larger communities.
To apply the Louvain algorithm to the spoofing values, the normalized correlation matrix C norm or the detection matrix D can be selected as the edge matrix A . Using the normalized correlation matrix C norm will have more dynamics and information about the values; however, it would require more processing. Using detection matrix D will be faster, but as small matrices are used (the Louvain algorithm was developed to address millions of nodes), this improvement in processing requirements is negligibly small. The modularity Q of the system, the number of communities that are formed, and the difference in community sizes within a system, are possible metrics that can be exploited for detector development.
The most promising one seems to be the modularity Q. If the system can be effectively clustered, i.e., all the satellites are closely related and assumed to be spoofed, it would have a low modularity Q. As such the detection problem can be formulated as:
λ mod H 1 H 0 Q ,
where λ mod is the detection threshold for the modularity. If the values are above the threshold, the system cannot be clustered effectively. Hence, the system is diverse and the null-hypothesis H 0 of no spoofing is accepted. Otherwise, the alternative hypothesis H 1 is accepted, where the system is spoofed. Clustering forms an intuitive approach to spatial spoofing detection, hence, it forms part of the new detection metrics proposed by this article.

5. Experimental Setup and Methodology

Two experimental setups were used: the first one used a six-element UCA. The array was connected to a six-channel receiver which consisted of two synchronized three-channel Flexiband front-ends [50], synchronized with a 10 MHz clock and triggered simultaneously. These front-ends have a maximum sample-rate of 81 MHz at 8 bit I/Q; however, for this experiment, a common sampling rate of 10.125 MHz was used. One minute of data has been recorded and then evaluated in post-processing. A picture of the system is shown in Figure 5. The recording was made under open-sky conditions with the purpose to determine the probability of false alarm for the developed detectors.
The second setup used a single antenna connected to each channel of the receiver via a splitter. For this recording, all signals will have similar and static array steering vectors. Therefore, this was considered a rudimentary spoofing simulation, without the need for an anechoic chamber or a live setup. With this recording, the probability of detection for the detectors was evaluated.
Only Global Positioning System (GPS) L1 C/A signals were considered in this experiment. A total of 15,000 snapshots were taken and evaluated for each test. Snapshots of length 2, 3, 6 and 10 ms were extracted from the recordings. In the acquisition, coherent integration of 1 ms was selected, and 1, 2, 5 and 10 epochs were added incoherently, respectively. The integration time significantly influenced the performance of acquisition and the accuracy of the estimation for the beamforming steering vector. Acquisition was done on each snapshot, followed by the estimation of the beamforming steering vector for each acquired satellite. Lastly, the normalized correlation matrix C norm was calculated from the array steering vectors (see Section 3).
In the analysis of the data the following detection metrics were evaluated:
  • the steering vector angle between a pair of satellites, i.e., the creation of the detection matrix D (see Section 3),
  • the fraction of detections in the detection matrix D (see Section 4.1),
  • the Eigenvalue maximum-to-mean ratio of the normalized correlation matrix C norm (see Section 4.2),
  • the number of clusters of the Louvain algorithm based on the normalized correlation matrix C norm (see Section 4.3),
  • the community size maximum-to-mean ratio for the Louvain algorithm based on the normalized correlation matrix C norm (see Section 4.3), and
  • the modularity Q from Louvain clustering based on the normalized correlation matrix C norm (see Section 4.3).
For each detection metric, the probability density function (PDF) p ( x ) was calculated from the recorded data and compared. This allowed for the statistics of the metrics to be evaluated. To generate the PDF, a histogram from every detection metric was first calculated. The histogram was then normalized according to the bin-widths to obtain the PDF. Since a histogram is limited by a finite resolution, it is a discontinuous approximation of the true PDF. This is shown by the “step” like function in some of the plots. The histogram bin-sizes were changed depending on the metric used. From the PDF the mean μ and standard deviation σ can also be determined [51]:
μ = E X = x p ( x ) d x ,
σ = E X 2 E X 2 = x 2 p ( x ) d x μ 2 ,
where E · is the expected function for the random variable X. Both the mean μ and standard deviation σ are shown in the figures to allow for comparison of the detectors. This supports the analysis by summarizing the probability densities.
Depending on whether the spoofed data or the real data had higher mean values, the left- or right-CDF was calculated for each metric. The CDFs were generated from the associated PDFs. The left-CDF c l ( x ) is obtained by integrating the PDF p ( x ) from the left:
c l ( x ) = x p ( x ) d x .
On the contrary, the right-CDF c r ( x ) is obtained by integrating PDF p ( x ) from the right:
c r ( x ) = x p ( x ) d x .
Note that the left-CDF is always a monotone increasing function, whereas the right-CDF is always a monotone decreasing function. The left- and right-CDFs were used, as this allowed for a simple comparison of the distributions, and to illustrate how similar or disjointed the distributions were. Further, it allows for the separation between the distributions to be clearly visualized and analyzed. Lastly, a detection threshold was set for each metric to optimize correct detections, under the assumption, that a spoofing attack and no attack are equally likely. Note that this assumption is only valid for the test data and does not represent the likelihood of a spoofing attack in the real world, but is still adequate for research and development purposes. In this case, the optimal threshold λ would be the value by which the left- and right-CDFs for the spoofing and real data distributions are equal:
c l spoof ( λ ) = c r real ( λ ) , or
c l real ( λ ) = c r spoof ( λ ) ,
where ( · ) real denotes the real data distribution and ( · ) spoof the spoofed data distribution. The assignment of the left- and right-CDF depends on the metric used: for some the spoofed distribution is larger than the real-data distribution, for others it is the opposite. This was indicated by the results. For some metrics, the detection values of others were used; hence, the analysis was done sequentially.
To illustrate some observed effects and limitations in the data, results, where only two of the six antenna elements were used for acquisition and beamforming, are also shown. However, this is not the focus of this article and is not provided within the analysis.

6. Results and Analysis

First, the recordings were analyzed with a standard GNSS software-defined radio (SDR) to estimate the power level of the recorded signals. In this analysis, each antenna channel was analyzed separately (i.e., no beamforming is applied). The roof recording received the signals between 39 and 45 dBHz, and the laboratory spoofing setup received the signals between 46 and 48 dBHz. This shows that the spoofing scenario has 3 to 7 dB signal power, which is representative of many spoofing attacks; however, this also directly impacts the detection capability of any method. Secondly, the number of acquired satellites by the snapshot receiver was also analyzed. For the roof recording, 5 to 8 satellites were acquired, whereas 10 to 12 were acquired by the spoofing scenario. This also proved to have an effect on the performance of the detectors.
The sky-plot with visible GPS satellites is shown in Figure 6.
The detectors were evaluated at different values for the steering vector angular threshold ξ Th . This allowed for the performance of the detector to be determined at different thresholds. Open-sky real-world recordings using the array were used.

6.1. Single Value Comparisons

The PDF of the values in the upper right triangle of the correlation matrix C norm was calculated to determine the difference between the real and spoofed measurements. The left CDF is calculated for the real data (denoted by “R” in the legend) and the right CDF is calculated for the spoofed data (denoted by “S”). The CDFs with the mean μ and the standard deviation σ for each distribution, as well as an optimal threshold λ with error probabilities are shown in Figure 7. For a full analysis of this detector method, refer to [22].
As a comparison, the same data for a two-element array (i.e., only using two-elements from the six-element array.) is shown in Figure 8.
The spoofed signals have lower mean μ and standard deviation σ values in both cases. This is expected as the steering vectors for these signals are similar. In both cases, low error probabilities were achieved. Often, no errors were observed at all.
The fraction of detections based upon the decision threshold of Figure 7 is shown in Figure 9. As there are few to no errors in Figure 7, these results are consequently sparse. However, when the error probabilities are higher, then a spread of data can be observed, as shown in Figure 10.
In this simple case of comparing the fraction of detections, a system of detectors has shown benefits to improve overall performance. However, the performance of the fraction of detections is dependent on the detection performance of the previous stage. Further, such an approach requires the setup of two detector thresholds; hence, increasing the complexity of tuning and calibration for such an approach.

6.2. Eigenvalue Comparisons

In this section, the Eigenvalues of the correlation matrix C norm were evaluated. As the number of steering vectors is dependent on the number of acquired satellites, the number of Eigenvalues and vectors are inconsistent. As such, the ratio of the maximum-to-mean Eigenvalues was evaluated. The CDFs for the maximum-to-mean Eigenvalues are shown in Figure 11.
From the Eigenvalue results, it can be shown that a good separation between the real and spoofed data is achieved. The maximum-to-mean ratio exploits the fact that the signal subspace of the Eigenvectors is small for a spoofing scenario, as all of the array steering vectors are similar. This detector also achieves perfect detections, like what was observed by the fraction of detections approach. However, this method only requires a single threshold to be set, making it simpler to tune and to optimize. The disadvantage of the Eigenvalue approach is that it requires more processing than the fraction of detections approach.

6.3. Modularity Comparisons

In this section, the metrics that are based upon the Louvain algorithm applied to the normalized correlation matrix C norm are presented. First, the number of clusters is evaluated. The CDFs of the number of clusters after clustering is shown in Figure 12. In a spoofed case it is assumed that fewer clusters would be generated, as is seen in the figure; however, the difference is insufficient to produce adequate detection results.
The next approach is to investigate the difference in community sizes. The CDFs for the community are shown in Figure 13. In a spoofed scenario, it is assumed that fewer, larger communities would exist. This was observed in the data, but as with the previous case, insufficient isolation between the real and spoofed data was obtained.
Lastly, the modularity of the clustering was observed. The CDFs for the modularity are shown in Figure 14. In a spoofed case, the communities would be clustered more densely, resulting in lower modularity. This is consistent with the results.
The results of using modularity also achieved perfect detection, similar to what was observed with the fraction of detections and the Eigenvalue maximum-to-mean ratio approaches. This approach is an iterative method; hence, it potentially requires more processing than Eigenvalue methods. However, the Louvain algorithm is optimized for efficient processing [48] on large data sets. Therefore, this would not present an issue.

7. Discussion of Results

As the integration time used for acquisition increases, the estimation of the array steering vector improves. The variance of the array steering vectors is consequently reduced, resulting in an improved representation of the normalized correlation matrix C norm . In the spoofed case, the correlation matrix tends to be a unit matrix I . Therefore, it is expected and observed in all results, that superior performance is achieved with longer integration times.
Using a detector to estimate the spoofing of a pair of satellites resulted in sufficient spoofing detection. However, it only considers two satellites at a time and is sensitive to the spatial relationship between the two satellites. When a system of satellites is observed, better results can be obtained, as what is shown in the system of detectors.
Three metrics have shown to be useful for detecting a spoofed scenario as all three of these have demonstrated perfect detection capabilities for the given scenario. Firstly, the fraction of detections is built upon the detection of a single pair of satellites. This method combines all detections, hence, it is robust against a single false detection through increased redundancy. This method is straightforward to implement but requires the design of two detectors. Secondly, an Eigenvalue decomposition-based detector was evaluated. This metric exploits the fact that similar satellites would result in a sparse signal sub-space of the Eigenvectors. A maximum-to-mean Eigenvalue ratio was used. This method is more computationally expensive than the fraction of detections but requires fewer calibration and detectors to be developed. Thirdly, a clustering approach based upon the Louvain algorithm was presented. This metric observes the similarity of the array steering vectors as edges between communities. This method has similar advantages and disadvantages to the Eigenvalue based metric. All other metrics presented have been found to have inadequate performance but are nonetheless interesting from a research point of view and for evaluation purposes.
The results are compiled from a high number of observations including the use of different integration lengths. Therefore, a high degree of accuracy and confidence in the methods were achieved. However, only a single spoofed and a single real scenario has been evaluated. This is a significant limitation to the presented results, as the authors believe that the number of acquired satellites, the distribution of the satellites within the sky (i.e., are the satellites close to each other), the recording scenario including degradation effects (e.g., multi-path, shadowing, array coupling effects etc.), the received signal strength of the satellites (i.e., the carrier-to-noise density ratio (C/N0)), the antennas used, and the array geometry will have an impact on the results. As such, further studies including additional observations are required to improve the validity of the results.
In the presented results, the complete constellation is either real or spoofed. However, in many spoofing attacks, a mixed constellation of real and spoofed signals is observed. This is not accounted for in the results but it is believed that Eigenvalue and clustering techniques could benefit in a mixed spoofing attack. For future research, it is proposed that mixed attacks are considered such that the spoofing detection metrics could be improved. Lastly, in a mixed spoofing scenario, a secondary goal could be to identify spoofed satellites and to remove these from the PVT solution. Such spoofing mitigation methods are theoretically possible using the metrics presented in this paper; however, the feasibility thereof still needs to be further investigated.

8. Conclusions

In this article, blind detection methods for spoofing signals that exploit the spatial diversity of an antenna array were presented. The detection method was implemented in a snapshot receiver and evaluated using open-sky data, recorded with a six-element array. Additionally, a spoofing attack emulation using a splitter instead of an array was used. First, only a pair-wise spoofing detector was presented. Next, several metrics were developed, implemented, and analyzed which consider the entire system of received satellites. These metrics include multiple detectors, Eigenvalue based methods, and clustering methods.
The results have shown that observing a system-level based detector could have significant benefits to spoofing detectors. Three detection metrics resulted in perfect detection capabilities; however, some concerns to why this is not necessarily achievable for all scenarios and experimental setups are highlighted and discussed. This indicates the need for further research in this area. Nevertheless, it is shown in this article that blind spoofing detection methods could yield adequate spoofing detection capabilities and initial results are promising.
For future research, it is suggested to repeat the tests with different satellite constellations to isolate and quantify some effects and variables which can degrade the system. Further, it would be beneficial to validate the performance inside an anechoic chamber or real live tests, as this would improve the legitimacy of a spoofing attack and also allow a mixed spoofing-real satellite set to be recorded. This would also further challenge the existing detection algorithms. Lastly, the identification of the current metrics paths the way for future statistical methods, such as machine learning.

Author Contributions

Conceptualization, J.R.v.d.M. and A.R.; methodology, J.R.v.d.M.; software, J.R.v.d.M.; validation, J.R.v.d.M. and A.R.; formal analysis, J.R.v.d.M.; investigation, J.R.v.d.M.; resources, J.R.v.d.M. and A.R.; data curation, J.R.v.d.M.; writing—original draft preparation, J.R.v.d.M.; writing—review and editing, J.R.v.d.M. and A.R.; visualization, J.R.v.d.M.; supervision, A.R.; project administration, A.R. and W.F.; funding acquisition, W.F.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Volpe, J.A. Vulnerability Assessment of the Transport Infrastructure Relying on the Global Positioning System; U.S. DoT: Washington, DC, USA, 2001.
  2. Jafarnia-Jahromi, A.; Broumandan, A.; Nielsen, J.; Lachapelle, G. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques. Int. J. Navig. Obs. 2012, 2012, 1–16. [Google Scholar] [CrossRef]
  3. Marcus, M.J. Harmful Interference and Its Role in Spectrum Policy. Proc. IEEE 2014, 102, 265–269. [Google Scholar] [CrossRef]
  4. Mazar (Madjar), H. International RF Spectrum Management and Standardization. In Radio Spectrum Management: Policies, Regulations and Techniques; Wiley: New York, NY, USA, 2016. [Google Scholar]
  5. C4ADS. Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria; C4ADS: Washington, DC, USA, 2019. [Google Scholar]
  6. Psiaki, M.L.; Humphreys, T.E. GNSS Spoofing and Detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
  7. Günther, C. A Survey of Spoofing and Counter-Measures. Navig. J. Inst. Navig. 2014, 61, 159–177. [Google Scholar] [CrossRef]
  8. Rügamer, A.; Kowalewski, D. Jamming and Spoofing of GNSS Signals-An Underestimated Risk?! In Proceedings of the FIG Working Week 2015, Sofia, Bulgaria, 17–21 May 2015. [Google Scholar]
  9. Van der Merwe, J.R.; Rügamer, A.; Popugaev, A.; Zubizarreta, X.; Felber, W. Cooperative spoofing attack detection using multiple antennas and a snapshot receiver. In Proceedings of the 32nd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2019), Miami, FL, USA, 16–20 September 2019. [Google Scholar]
  10. Montgomery, P.Y.; Humphreys, T.E.; Ledvina, B.M. Receiver-Autonomous Spoofing Detection: Experimental Results of a Multi-Antenna Receiver Defense Against a Portable Civil GPS Spoofer. Radionavigation 2009, 1, 124–130. [Google Scholar]
  11. Konovaltsev, A.; Cuntz, M.; Haettich, C.; Meurer, M. Autonomous Spoofing Detection and Mitigation in a GNSS Receiver with an Adaptive Antenna Array. In Proceedings of the 26th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2013), Nashville, TN, USA, 16–20 September 2013; pp. 2937–2948. [Google Scholar]
  12. Tuncer, E.; Friedlander, B. Classical and Modern Direction-of-Arrival Estimation; Elsevier: Burlington, NJ, USA, 2009. [Google Scholar]
  13. Rügamer, A.; Rubino, D.; Zubizarreta, X.; Felber, W.; Wendel, J.; Pfaffelhuber, D. Spoofing Resistant UAVs. In Proceedings of the International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2018), Miami, FL, USA, 24–28 September 2018. [Google Scholar]
  14. Lucas-Sabola, V.; Seco-Granados, G.; López-Salcedo, J.A.; Garcia-Molina, J.A.; Crisci, M. Cloud GNSS receivers: New advanced applications made possible. In Proceedings of the International Conference on Localization and GNSS (ICL-GNSS), Barcelona, Spain, 28–30 June 2016; pp. 1–6. [Google Scholar]
  15. Fernández-Hernández, I.; Borre, K. Snapshot positioning without initial information. GPS Solut. 2016, 20, 605–616. [Google Scholar] [CrossRef]
  16. Shafran, S.V.; Gizatulova, E.A.; Kudryavtsev, I.A. Snapshot technology in GNSS receivers. In Proceedings of the 25th Saint Petersburg International Conference on Integrated Navigation Systems (ICINS), St. Petersburg, Russia, 28–30 May 2018; pp. 1–3. [Google Scholar]
  17. Dinh, T.N.; La The, V. A novel design of low power consumption GPS positioning solution based on snapshot technique. In Proceedings of the International Conference on Advanced Technologies for Communications (ATC), Quy Nhon, Vietnam, 18–20 October 2017; pp. 285–290. [Google Scholar]
  18. Wales, B.; Tarazona, L.; Bavaro, M. Snapshot positioning for low-power miniaturised spaceborne GNSS receivers. In Proceedings of the 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), Noordwijk, The Netherlands, 8–10 December 2010; pp. 1–6. [Google Scholar]
  19. Rosenfeld, D.; Duchovny, E. Off-Board Positioning using an Efficient GNSS SNAP Processing Algorithm. In Proceedings of the 23rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2010), Portland, OR, USA, 21–24 September 2010; pp. 1088–1093. [Google Scholar]
  20. Rubino, D.; Rügamer, A.; Lukčin, I.; Taschke, S.; Stahl, M.; Felber, W. Galileo PRS Snapshot Receiver with Serverside Positioning and Time Verification. In Proceedings of the DGON POSNAV 2016, Berlin, Germany, 17–18 November 2016. [Google Scholar]
  21. Rügamer, A.; Rubino, D.; Lukčin, I.; Taschke, S.; Stahl, M.; Felber, W. Secure Position and Time Information by Server Side PRS Snapshot Processing. In Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016; pp. 3002–3017. [Google Scholar]
  22. Van der Merwe, J.R.; Rügamer, A.; Fernández-Dans Goicoechea, A.; Felber, W. Blind spoofing detection using a multi-antenna snapshot receiver. In Proceedings of the International Conference on Localization and GNSS (ICL-GNSS), Nuremberg, Germany, 4–6 June 2019. [Google Scholar]
  23. Van Diggelen, F. A-GPS: Assisted GPS, GNSS, and SBAS; Artech House: Norwood, MA, USA, 2009. [Google Scholar]
  24. Borio, D.; Camoriano, L.; Presti, L.L. Impact of GPS acquisition strategy on decision probabilities. IEEE Trans. Aerosp. Electron. Syst. 2008, 44, 996–1011. [Google Scholar] [CrossRef]
  25. Van der Merwe, J.R.; Fernández-Dans Goicoechea, A.; Rügamer, A.; Zubizarreta, X.; Rubino, D.; Felber, W. Multi-antenna snapshot receiver. In Proceedings of the European Navigation Conference (ENC), Warsaw, Poland, 9–12 April 2019. [Google Scholar]
  26. Kaplan, S. Compression standards and alternative methods for video telecom. IEEE Aerosp. Electron. Syst. Mag. 1992, 7, 27–30. [Google Scholar] [CrossRef]
  27. Lathi, B.P.; Ding, Z. Modern Digital and Analog Communication Systems; Oxford series in electrical and computer engineering; Oxford University Press: Oxford, UK, 2010. [Google Scholar]
  28. Seco-Granados, G.; Fernandez-Rubio, J.A.; Fernandez-Prades, C. ML estimator and hybrid beamformer for multipath and interference mitigation in GNSS receivers. IEEE Trans. Signal Process. 2005, 53, 1194–1208. [Google Scholar] [CrossRef]
  29. Daneshmand, S.; Saeed, A.; Lachapelle, G. GNSS interference and multipath suppression using array antenna. In Proceedings of the 24th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2011), Portland, OR, USA, 20–23 September 2011; pp. 1183–1192. [Google Scholar]
  30. Broumandan, A.; Jafarnia-Jahromi, A.; Daneshmand, S.; Lachapelle, G. Overview of Spatial Processing Approaches for GNSS Structural Interference Detection and Mitigation. Proc. IEEE 2016, 104, 1246–1257. [Google Scholar] [CrossRef]
  31. Harmanci, K.; Tabrikian, J.; Krolik, J.L. Relationships between adaptive minimum variance beamforming and optimal source localization. IEEE Trans. Signal Process. 2000, 48, 1–12. [Google Scholar] [CrossRef]
  32. Pulsone, N.B.; Rader, C.M. Adaptive beamformer orthogonal rejection test. IEEE Trans. Signal Process. 2001, 49, 521–529. [Google Scholar] [CrossRef]
  33. Gu, Y.; Leshem, A. Robust adaptive beamforming based on interference covariance matrix reconstruction and steering vector estimation. IEEE Trans. Signal Process. 2012, 60, 3881–3885. [Google Scholar]
  34. Fernandez-Prades, C.; Arribas, J.; Closas, P. Robust GNSS receivers by array signal processing: Theory and implementation. Proc. IEEE 2016, 104, 1207–1220. [Google Scholar] [CrossRef]
  35. Appel, M.; Konovaltsev, A.; Meurer, M. Joint Antenna Array Attitude Tracking and Spoofing Detection Based on Phase Difference Measurements. In Proceedings of the 29th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2016), Portland, OR, USA, 12–16 September 2016; pp. 3018–3026. [Google Scholar]
  36. Pérez Marcos, E.; Konovaltsev, A.; Caizzone, S.; Cuntz, M.; Yinusa, K.; Elmarissi, W.; Meurer, M. Interference and Spoofing Detection for GNSS Maritime Applications using Direction of Arrival and Conformal Antenna Array. In Proceedings of the 31st International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2018), Miami, FL, USA, 24–28 September 2018; pp. 2907–2922. [Google Scholar]
  37. Van der Merwe, J.R.; Zubizarreta, X.; Lukčin, I.; Rügamer, A.; Felber, W. Classification of Spoofing Attack Types. In Proceedings of the European Navigation Conference (ENC), Gothenburg, Sweden, 14–17 May 2018; pp. 91–99. [Google Scholar]
  38. GPS World. 2018 GNSS Antenna Survey; North Coast Media: Cleveland, OH, USA, 2018. [Google Scholar]
  39. Abraham, D.A. Optimization of M-of-N detectors in heavy-tailed noise. In Proceedings of the Oceans 2018 MTS/IEEE Charleston, Charleston, SC, USA, 22–25 October 2018; pp. 1–10. [Google Scholar]
  40. Harrington, J.V. An analysis of the detection of repeated signals in noise by binary integration. IRE Trans. Inf. Theory 1955, 1, 1–9. [Google Scholar] [CrossRef]
  41. Shnidman, D.A. Binary integration for Swerling target fluctuations. IEEE Trans. Aerosp. Electron. Syst. 1998, 34, 1043–1053. [Google Scholar] [CrossRef]
  42. Schwartz, M. A coincidence procedure for signal detection. IRE Trans. Inf. Theory 1956, 2, 135–139. [Google Scholar] [CrossRef]
  43. Gao, D.; Han, S.; Vasconcelos, N. Discriminant saliency, the detection of suspicious coincidences, and applications to visual recognition. IEEE Trans. Pattern Anal. Mach. Intell. 2009, 31, 989–1005. [Google Scholar]
  44. Castella, F.R. Optimisation of a generalised square-law detector. IEE Proc. F Commun. Radar Signal Process. 1983, 130, 405–408. [Google Scholar] [CrossRef]
  45. Hamid, M.; Björsell, N.; Slimane, S.B. Signal bandwidth impact on maximum-minimum Eigenvalue detection. IEEE Commun. Lett. 2015, 19, 395–398. [Google Scholar] [CrossRef]
  46. Hoffman, K.; Kunze, R. Linear Algebra, 2nd ed.; Prentice-Hall: Upper Saddle River, NJ, USA, 1971. [Google Scholar]
  47. Kortun, A.; Sellathurai, M.; Ratnarajah, T.; Zhong, C. Distribution of the ratio of the largest Eigenvalue to the trace of complex Wishart matrices. IEEE Trans. Signal Process. 2012, 60, 5527–5532. [Google Scholar] [CrossRef]
  48. Blondel, V.D.; Guillaume, J.L.; Lambiotte, R.; Lefebvre, E. Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008, 2008, P10008. [Google Scholar] [CrossRef] [Green Version]
  49. Pujol, J.M.; Erramilli, V.; Rodriguez, P. Divide and conquer: Partitioning online social networks. CoRR 2009, arXiv:0905.4918. [Google Scholar]
  50. Rügamer, A.; Förster, F.; Stahl, M.; Rohmer, G. A flexible and portable multiband GNSS front-end system. In Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS 2012, Nashville, TN, USA, 17–21 September 2012. [Google Scholar]
  51. Kay, S.M. Fundamentals of Statistical Signal Processing: Estimation Theory; Prentice-Hall Signal Processing Series; Prentice Hall: Upper Saddle River, NJ, USA, 1993; Volume 1. [Google Scholar]
Figure 1. Block diagram for a blind beamforming acquisition method. ©IEEE. Reprinted, with permission, from [22].
Figure 1. Block diagram for a blind beamforming acquisition method. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g001
Figure 2. Spatial angle θ vs. steering vector angle ξ m , n for a ULA. ©IEEE. Reprinted, with permission, from [22].
Figure 2. Spatial angle θ vs. steering vector angle ξ m , n for a ULA. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g002
Figure 3. Spatial angle θ vs. steering vector angle ξ m , n for a UCA. ©IEEE. Reprinted, with permission, from [22].
Figure 3. Spatial angle θ vs. steering vector angle ξ m , n for a UCA. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g003
Figure 4. CDF of spatial angle θ vs. the steering vector angle ξ m , n for a UCA. ©IEEE. Reprinted, with permission, from [22].
Figure 4. CDF of spatial angle θ vs. the steering vector angle ξ m , n for a UCA. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g004
Figure 5. Photo of the measurement system. ©IEEE. Reprinted, with permission, from [22].
Figure 5. Photo of the measurement system. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g005
Figure 6. Sky-plot of the open-sky recording. ©IEEE. Reprinted, with permission, from [22].
Figure 6. Sky-plot of the open-sky recording. ©IEEE. Reprinted, with permission, from [22].
Sensors 19 05439 g006
Figure 7. CDF comparison for the steering vector angles between satellites for a six-element array.
Figure 7. CDF comparison for the steering vector angles between satellites for a six-element array.
Sensors 19 05439 g007
Figure 8. CDF comparison for the steering vector angles between satellites for a two-element array.
Figure 8. CDF comparison for the steering vector angles between satellites for a two-element array.
Sensors 19 05439 g008
Figure 9. CDF comparison for the percentage of detections for a six-element array.
Figure 9. CDF comparison for the percentage of detections for a six-element array.
Sensors 19 05439 g009
Figure 10. CDF comparison for the percentage of detections for a two-element array.
Figure 10. CDF comparison for the percentage of detections for a two-element array.
Sensors 19 05439 g010
Figure 11. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Figure 11. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Sensors 19 05439 g011
Figure 12. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Figure 12. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Sensors 19 05439 g012
Figure 13. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Figure 13. CDF comparison for the maximum-to-mean of the Eigenvalues for a six-element array.
Sensors 19 05439 g013
Figure 14. CDF comparison of the modularity after clustering for a six-element array.
Figure 14. CDF comparison of the modularity after clustering for a six-element array.
Sensors 19 05439 g014

Share and Cite

MDPI and ACS Style

van der Merwe, J.R.; Rügamer, A.; Felber, W. Blind Spoofing GNSS Constellation Detection Using a Multi-Antenna Snapshot Receiver. Sensors 2019, 19, 5439. https://doi.org/10.3390/s19245439

AMA Style

van der Merwe JR, Rügamer A, Felber W. Blind Spoofing GNSS Constellation Detection Using a Multi-Antenna Snapshot Receiver. Sensors. 2019; 19(24):5439. https://doi.org/10.3390/s19245439

Chicago/Turabian Style

van der Merwe, Johannes Rossouw, Alexander Rügamer, and Wolfgang Felber. 2019. "Blind Spoofing GNSS Constellation Detection Using a Multi-Antenna Snapshot Receiver" Sensors 19, no. 24: 5439. https://doi.org/10.3390/s19245439

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop