Next Article in Journal
Automated Prediction of Crack Propagation Using H2O AutoML
Next Article in Special Issue
Performance Comparison of Relay-Based Covert Communications: DF, CF and AF
Previous Article in Journal
A Comprehensive Eco-Driving Strategy for CAVs with Microscopic Traffic Simulation Testing Evaluation
Previous Article in Special Issue
Disguised Full-Duplex Covert Communications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity

Institute of Electronic Engineering, China Academy of Engineering Physics, Mianyang 621999, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(20), 8418; https://doi.org/10.3390/s23208418
Submission received: 28 August 2023 / Revised: 8 October 2023 / Accepted: 10 October 2023 / Published: 12 October 2023
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)

Abstract

:
Spoofing interference is one of the most emerging threats to the Global Navigation Satellite System (GNSS); therefore, the research on anti-spoofing technology is of great significance to improving the security of GNSS. For single spoofing source interference, all the spoofing signals are broadcast from the same antenna. When the receiver is in motion, the pseudo-range of spoofing signals changes nonlinearly, while the difference between any two pseudo-ranges changes linearly. Authentic signals do not have this characteristic. On this basis, an anti-spoofing method is proposed by jointly monitoring the linearity of the pseudo-range difference (PRD) sequence and pseudo-range sum (PRS) sequence, which transforms the spoofing detection problem into the sequence linearity detection problem. In this paper, the model of PRD and PRS is derived, the hypothesis based on the linearity of PRD sequence and PRS sequence is given, and the detection performance of the method is evaluated. This method uses the sum of squares of errors (SSE) of linear fitting of the PRD sequence and PRS sequence to construct detection statistics, and has low computational complexity. Simulation results show that this method can effectively detect spoofing interference and distinguish spoofing signals from authentic signals.

1. Introduction

Global Navigation Satellite System (GNSS) has the unique technical characteristics of all-weather, all-day, and global coverage and has become the most widely used space-based radio positioning system at present [1,2]. While it is widely used, the security of GNSS has been paid more attention [3]. Due to the inherent vulnerability of GNSS, such as weak signal power, publicly known civil signal structure, slow message update, etc., GNSS is vulnerable to external interference, and its security is seriously threatened [4,5]. In its current form, the main types of GNSS interference include suppression interference and spoofing interference. Suppression interference interferes with the target receiver by transmitting high-power signals, which reduces its positioning performance and even makes it impossible to locate [6]. However, the effect of suppressing interference is dominant. It is easy for the attacked receiver to find out that it has been suppressed and take countermeasures accordingly. The more covert spoofing interference induces the receiver to output wrong positioning results by broadcasting false signals with the same structural characteristics and different parameters as GNSS signals [7]. Compared with suppression interference, spoofing interference does not require high power, and its interference effect is more concealed, so its potential harm is higher [8]. The research on anti-spoofing technology is of great significance to improving the security of GNSS, which has gradually been widely valued by academic circles and has become a new research hotspot [9,10].
According to the number of spoofing sources, spoofing interference can be divided into two modes: single spoofing source interference and multiple spoofing sources interference [11]. Single spoofing source interference means that a spoofing source transmits multiple spoofing signals, which is the most common spoofing interference mode at present. In this way, the spoofing signals can be consistent without knowing the target receiver position [12]. Multiple spoofing sources interference means that each spoofing source produces a spoofing signal, and all the spoofing signals are transmitted to the receiver from different directions. This way is closer to the actual scene. Nevertheless, to make the spoofing signals meet the consistency, the receiver position should be known, and the spoofing sources need to synchronize accurately through the communication link, which requires high implementation cost and technical level. Up to now, the interference mode of multiple spoofing sources cooperative spoofing is still in the theoretical research stage, and there is no public report in the literature.
Because of the complexity of spoofing interference, the principles of anti-spoofing methods are quite different. The anti-spoofing method based on C/N0 monitoring assumes that the C/N0 of spoofing signals exceeds the normal range, but if the spoofing signals are broadcast together with noise, this method will be invalidated [13]. The signal quality monitoring method can detect the traction spoofing interference based on the fact that overlapping correlation peaks in the traction process will lead to distortion of the autocorrelation function but is ineffective when correlation peaks are separated [14]. The receiver autonomous integrity monitoring method detects spoofing interference according to the consistency of authentic signals, but it will fail when spoofing signals tend to be consistent [15].
For single spoofing source interference, an important feature is that all spoofing signals are broadcast from the same antenna. Therefore, the incidence angles of all spoofing signals are the same, while those of authentic signals are different. According to this, methods based on multiple antennas or multiple receivers can effectively detect spoofing interference [16,17,18,19,20,21]. However, these methods not only need to synchronize the observations of all antennas or receivers but also need to add extra hardware, which leads to high complexity and cost. In addition, methods based on mobile receivers are also effective [22,23,24]. All spoofing signals have the same propagation path, while the authentic signals from different satellites have different propagation paths. Therefore, when the receiver moves, some observations of the authentic signals and the spoofing signals will show different changes. Previous studies assumed that the channel gains or carrier Doppler shifts of all the spoofing signals are correlated, so spoofing interference can be detected by monitoring the correlation of channel gains or carrier Doppler shifts between different signals. However, the change in channel gain is related to the distance between the spoofing source and the receiver. The farther the distance, the less obvious the channel gain variation caused by the receiver motion [11]. In addition, the change in carrier Doppler shift is related to the velocity change in the receiver. The smaller the velocity change, the less obvious the carrier Doppler shift variation caused by the receiver motion.
Based on the above considerations, this paper proposes an anti-spoofing method for single spoofing source interference, which jointly monitors the linearity of the pseudo-range difference (PRD) sequence and pseudo-range sum (PRS) sequence. In a short time, the pseudo-range variation caused by the satellite motion is linear. For spoofing signals, although the variations in pseudo-ranges caused by the receiver motion are nonlinear, these variations are the same. Consequently, the pseudo-range of spoofing signals changes nonlinearly, while the difference between any two pseudo-ranges changes linearly. For authentic signals, it does not have this characteristic. Therefore, we can detect spoofing interference by monitoring the linearity of the PRD sequence and PRS sequence and distinguishing between authentic signals and spoofing signals. Compared with the existing research, the proposed method can effectively solve the problem of spoofing detection even when the distance between the spoofing source and the receiver is far away or the velocity of the receiver changes slowly, which shows that the performance of the method is more robust.
Subsequent sections of this paper are arranged as follows. In Section 2, the models of PRD and PRS are derived, and their linear problems are analyzed. In Section 3, hypothesis testing is given, linearity detection statistics are constructed, and false alarm probability and detection probability are analyzed. Section 4 shows the simulation results. Section 5 summarizes the content of this paper.

2. Linearity Analysis

2.1. Pseudo-Range Sequence Linearity Analysis

The pseudo-range measurement value ρ of the authentic signal is as shown in Equation (1):
ρ = r + c ( δ t u δ t s + I + T ) + ε ,
where  r  represents the geometric distance between satellite and receiver;  c  represents the speed of light;  δ t u  and  δ t s  represent receiver clock error and satellite clock error, respectively;  I  is ionospheric delay;  T  is tropospheric delay; and  ε  represents pseudo-range measurement noise, which can be considered as Gaussian white noise.
Define the pseudo-range sequence  ρ i = [ ρ i ( 0 ) , ρ i ( k ) , ρ i ( K 1 ) ] ρ i ( k )  denotes the pseudo-range measurement value of the signal i at the  k -th measurement time. The measurement time interval is  Δ t , and the sequence length is  K . In a short time, the changes in ionospheric delay, tropospheric delay, and satellite clock error are very small and can be ignored. In addition, since the distance between the satellite and receiver is far enough, the position change of the satellite and receiver in a short time is very small relative to the distance between them. Therefore, the unit observation vector  l i  of the satellite at the receiver can be considered constant. Thus,  ρ i ( k )  can be approximately expressed as
ρ i ( k ) Δ r s , i ( k ) l i Δ r u ( k ) l i + c δ t u ( k ) + ε i ( k ) + Cn i .
In Equation (2),  Cn i = ρ i ( 0 ) c δ t u ( 0 ) ε i ( 0 )  is a constant;  Δ r s , i ( k )  and  Δ r u ( k )  represent the position vectors of the satellite and the receiver from time  0  to time  k , respectively.
Δ r s , i ( k ) l i  means the radial projection component of the satellite position change. The radial acceleration of the satellite is less than  2 × 10 5   m / s 3  [11]. The radial acceleration is so small that it has little effect on radial velocity. Therefore, in a short time, it can be considered that the radial velocity is constant, which means that  Δ r s , i ( k ) l i  varies linearly. The receiver is driven by a stable clock, and its clock drift does not change obviously with time [25]. Therefore, the receiver clock difference  δ t u ( k )  can also be considered to vary linearly in a short time. When the receiver velocity is constant,  Δ r u ( k ) l i  changes linearly with time. When its velocity changes,  Δ r u ( k ) l i  changes nonlinearly. According to the above analysis, the elements in  ρ i  are linear when the receiver moves at a uniform velocity, and nonlinear when the receiver moves at a variable velocity.
In case of spoofing signal, under the assumption that the position of the spoofing source is unchanged,  ρ i ( k )  can be approximately expressed as
ρ i ( k ) Δ r s , i ( k ) l i p Δ r u ( k ) l u ( k ) + Δ ρ p , i ( k ) + c δ t u ( k ) + ε i ( k ) + Cn i ,
where  l i p  represents the unit observation vector of the satellite at the spoofing source,  l u ( k )  represents the unit observation vector of the spoofing source at the receiver, and  Δ ρ p , i ( k )  represents the difference between the additional component of the spoofing source at time  k  and time  0 . It should be emphasized that in addition to the assumption that the spoofing source is stationary, we also need to assume that the additional component of the spoofing source to any signal changes linearly, which is the prerequisite for the effectiveness of the proposed method. Thus,  Δ ρ p , i ( k )  can be considered to vary linearly.
Since the distance between the satellite and the spoofing source is far enough,  l i p  can be considered to be constant in a short time, so that  Δ r s , i ( k ) l i p  varies linearly with time. While for  l u ( k ) , due to the distance between the spoofing source and the receiver being relatively close,  l u ( k )  will change continuously with the movement of the receiver. Therefore, whether the receiver is moving at a uniform velocity or not,  Δ r u ( k ) l u ( k )  is nonlinear with time, and then the elements in  ρ i  are nonlinear.

2.2. PRD Sequence Linearity Analysis

Defining  Δ ρ i j = [ Δ ρ i j ( 0 ) , Δ ρ i j ( k ) , Δ ρ i j ( K 1 ) ]  is the sequence of measured pseudo-range differences between the signal  i  and the signal  j , where  Δ ρ i j ( k )  can be denoted as
Δ ρ i j ( k ) = ρ i ( k ) ρ j ( k ) .
If the two signals are authentic signals,  Δ ρ i j ( k )  can be derived as
Δ ρ i j ( k ) Δ r s , i ( k ) l i Δ r s , j ( k ) l j Δ r u ( k ) ( l i l j ) + ε i ( k ) ε j ( k ) + Δ Cn i j ,
where  Δ Cn i j = ( ρ i ( 0 ) ε i ( 0 ) ) ( ρ j ( 0 ) ε j ( 0 ) )  is a constant. The pseudo-range variation  c δ t u ( k )  caused by the change in the receiver clock difference is eliminated in the calculation process. In a short time,  Δ r s , i ( k ) l i  and  Δ r s , j ( k ) l j  change linearly, and  l i l j  can be considered unchanged. Therefore, it is not difficult to conclude that the elements in  Δ ρ i j  are linear when the receiver moves at a uniform velocity and nonlinear when the receiver moves at a variable velocity.
If the two signals are spoofing signals,  Δ ρ i j ( k )  can be derived as
Δ ρ i j ( k ) Δ r s , i ( k ) l i p Δ r s , j ( k ) l j p + Δ ρ p , i ( k ) Δ ρ p , j ( k ) + ε i ( k ) ε j ( k ) + Δ Cn i j .
The pseudo-range change  Δ r u ( k ) l u ( k )  caused by the change in receiver position is eliminated in the calculation process. In this case, the elements in  Δ ρ i j  are linear regardless of whether the receiver is moving at a uniform velocity or a variable velocity.
If one of the two signals is an authentic signal and the other is a spoofing signal,  Δ ρ i j ( k )  can be derived as
Δ ρ i j ( k ) Δ r s , i ( k ) l i Δ r s , j ( k ) l j p Δ r u ( k ) ( l i l u ( k ) ) Δ ρ p , j ( k ) + ε i ( k ) ε j ( k ) + Δ Cn i j .
Since  l u ( k )  will change during the motion of the receiver,  Δ r u ( k ) l u ( k )  changes nonlinearly with time regardless of whether the receiver moves at a uniform velocity, which means that the elements in  Δ ρ i j  are nonlinear.

2.3. PRS Sequence Linearity Analysis

Defining  Σ ρ i j = [ Σ ρ i j ( 0 ) , Σ ρ i j ( k ) , Σ ρ i j ( K 1 ) ]  is the sequence of measured pseudo-range sums between the signal  i  and the signal  j , where  Σ ρ i j ( k )  can be denoted as
Σ ρ i j ( k ) = ρ i ( k ) + ρ j ( k ) .
If the two signals are authentic signals,  Σ ρ i j ( k )  can be derived as
Σ ρ i j ( k ) Δ r s , i ( k ) l i + Δ r s , j ( k ) l j Δ r u ( k ) ( l i + l j ) + 2 c δ t u ( k ) + ε i ( k ) + ε j ( k ) + Σ Cn i j ,
where  Σ Cn i j = ( ρ i ( 0 ) c δ t u ( 0 ) ε i ( 0 ) ) + ( ρ j ( 0 ) c δ t u ( 0 ) ε j ( 0 ) )  is a constant. In a short time,  Δ r s , i ( k ) l i  and  Δ r s , j ( k ) l j  change linearly, and  l i + l j  can be considered unchanged. Therefore, it is not difficult to conclude that the elements in  Σ ρ i j  are linear when the receiver moves at a uniform velocity and nonlinear when the receiver moves at a variable velocity.
If the two signals are spoofing signals,  Σ ρ i j ( k )  can be derived as
Σ ρ i j ( k ) Δ r s , i ( k ) l i p + Δ r s , j ( k ) l j p 2 Δ r u ( k ) l u ( k ) + Δ ρ p , i ( k ) + Δ ρ p , j ( k ) + 2 c δ t u ( k ) + ε i ( k ) + ε j ( k ) + Σ Cn i j .
If one of the two signals is an authentic signal and the other is a spoofing signal,  Σ ρ i j ( k )  can be derived as
Σ ρ i j ( k ) Δ r s , i ( k ) l i + Δ r s , j ( k ) l j p Δ r u ( k ) ( l i + l u ( k ) ) + Δ ρ p , j ( k ) + 2 c δ t u ( k ) + ε i ( k ) + ε j ( k ) + Σ Cn i j .
For the two cases, since  l u ( k )  will change during the motion of the receiver,  Δ r u ( k ) l u ( k )  will change with time regardless of whether the receiver moves at a uniform velocity, which means that the elements in  Σ ρ i j  are nonlinear.

2.4. Analysis Summary

Based on all the above analysis, we can draw a conclusion, as shown in Table 1. Case 1 indicates that the two signals are authentic signals. Case 2 indicates that the two signals are spoofing signals. Case 3 indicates that one of the two signals is an authentic signal and the other is a spoofing signal.

3. Anti-Spoofing Method

From the analysis in Section 2, it can be seen that when the two signals are spoofing signals, the PRD sequence  Δ ρ i j  is linear, while the PRS sequence  Σ ρ i j  is nonlinear. In other cases, this characteristic is not satisfied. Accordingly, the detection result  Δ ρ i j  is linear and  Σ ρ i j  is nonlinear, indicating that the signal  i  and the signal  j  are spoofing signals from the same spoofing source. Although no definite conclusion can be obtained from other detection results, all authentic signals and spoofing signals can still be distinguished with traversal detection.
The specific detection process includes the following two steps.
Step 1: Randomly select two signals and use the proposed method to detect whether they are both spoofing signals. If yes, proceed to Step 2. If not, we will reselect two signals for detection until two spoofing signals are selected.
Step 2: For the other signals, except the two spoofing signals, one of them is selected in turn to be jointly detected with any one of the spoofing signals.
For Step 2, on the premise that one signal is a spoofing signal, the proposed method can directly determine whether the other signal is an authentic signal or a spoofing signal. As a result, all authentic signals and spoofing signals can be judged.
The above spoofing detection process is represented with a flowchart, as shown in Figure 1. Next, this section will introduce the detection method of the linearities of PRD sequence  Δ ρ i j  and PRS sequence  Σ ρ i j  involved in the spoofing detection process.

3.1. PRD Sequence Linearity Detection

In the linearity detection of the PRD sequence, two hypotheses for PRD sequence  Δ ρ i j  are as follows:
{ H Δ , 0 : Δ ρ i j   is   nonlinear H Δ , 1 : Δ ρ i j   is   linear .
For  Δ ρ i j , we can calculate its least square linear regression model:
Δ ρ i j ( k ) = a Δ , i j × k + b Δ , i j ,
where  a Δ , i j  and  b Δ , i j  are the estimated model parameters and  Δ ρ i j ( k )  represents the estimated value of  Δ ρ i j ( k )  obtained with a linear model.
Under the  H Δ , 0  hypothesis,  Δ ρ i j ( k )  can be expressed as
Δ ρ i j ( k ) = g Δ , i j ( k ) + w Δ , 0 ( k ) ,
where  g Δ , i j ( k )  represents a nonlinear equation and  w Δ , 0 ( k )  is Gaussian white noise. The variance of  w Δ , 0 ( k )  is  σ i j 2 :
σ i j 2 = σ i 2 + σ j 2 .
σ i 2  and  σ j 2  denote the pseudo-range measurement noise variance of the signal  i  and the signal  j , respectively. In this case, the difference between the actual value and the estimated value  Δ x i j ( k )  can be deduced as follows:
Δ x i j ( k ) = Δ ρ i j ( k ) Δ ρ i j ( k ) = ( g Δ , i j ( k ) + w Δ , 0 ( k ) ) ( a Δ , i j × k + b Δ , i j ) = μ Δ , i j ( k ) + w Δ , 0 ( k ) .
Therefore,  Δ x i j ( k )  obeys the Gaussian distribution with mean value  μ Δ , i j ( k )  and variance  σ i j 2 .
Under the  H Δ , 1  hypothesis,  Δ ρ i j ( k )  can be expressed as
Δ ρ i j ( k ) = a Δ , i j × k + b Δ , i j + w Δ , 1 ( k ) ,
where  a Δ , i j  and  b Δ , i j  are model parameters,  w Δ , 1 ( k )  is Gaussian white noise, and its variance is also  σ i j 2 . Thus, the difference between the actual value and the estimated value  Δ x i j ( k )  can be deduced as follows:
Δ x i j ( k ) = Δ ρ i j ( k ) Δ ρ i j ( k ) = ( a Δ , i j × k + b Δ , i j + w Δ , 1 ( k ) ) ( a Δ , i j × k + b Δ , i j ) = ( a Δ , i j a Δ , i j ) × k + ( b Δ , i j b Δ , i j ) + w Δ , 1 ( k ) w Δ , 1 ( k ) .
Compared with  w Δ , 1 ( k ) a Δ , i j a Δ , i j  and  b Δ , i j b Δ , i j  are very small and can be ignored. Therefore,  Δ x i j ( k )  obeys the Gaussian distribution with zero mean and  σ i j 2  variance.
Δ x i j = [ Δ x i j ( 0 ) , Δ x i j ( k ) , Δ x i j ( K 1 ) ]  is called the fitting error sequence of the PRD sequence. The effect of linear fitting can be evaluated using the sum of squares of errors (SSE) between actual data and estimated data. The smaller the SSE, the better the linear fitting effect. Based on this, we construct the linearity detection statistic  Δ T i j  corresponding to the PRD sequence:
Δ T i j = 1 K k = 0 K 1 Δ x i j ( k ) 2 = k = 0 K 1 ( Δ x i j ( k ) K ) 2 .
It can be proved that under the hypothesis of  H Δ , 0 Δ T i j  obeys the non-central chi-square distribution with the degree of freedom  K  and the non-central parameter  λ Δ , i j . And under the  H Δ , 1  hypothesis,  Δ T i j  obeys the central chi-square distribution with the degree of freedom  K .
{ H Δ , 0 : Δ T i j ~ χ 2 ( K , λ Δ , i j , σ i j 2 K ) H Δ , 1 : Δ T i j ~ χ 2 ( K , 0 , σ i j 2 K ) .
The non-central parameter  λ Δ , i j  is as follows:
λ Δ , i j = k = 0 K 1 ( μ Δ , i j ( k ) K ) 2 = 1 K k = 0 K 1 ( μ Δ , i j ( k ) ) 2 .
When the degree of freedom is large enough, the chi-square distribution can be approximately Gaussian distribution [26]. According to this characteristic of chi-square distribution, the distribution of  Δ T i j  under the  H Δ , 0  hypothesis and the  H Δ , 1  hypothesis can be approximately expressed as
{ H Δ , 0 : Δ T i j ~ N ( σ i j 2 + λ Δ , i j , 2 σ i j 4 K + 4 σ i j 2 K λ Δ , i j ) H Δ , 1 : Δ T i j ~ N ( σ i j 2 , 2 σ i j 4 K ) .
Figure 2 shows the probability density function of the linearity detection statistic  Δ T i j  under different hypotheses, where the solid lines are the theoretical curves calculated according to the Equation (22), and the star points are the statistical results obtained through 10,000 Monte Carlo random experiments. Figure 2a,b correspond to the  H Δ , 0  hypothesis, where their central parameters are  λ Δ , i j = 100  and  λ Δ , i j = 200 , respectively, while Figure 2c corresponds to the  H Δ , 1  hypothesis. It can be found that the simulation results are very close to the theoretical results. Under the  H Δ , 1  hypothesis,  Δ T i j  is closer to zero, and the smaller the noise variance and the longer the sequence length, the more concentrated the distribution of  Δ T i j . Under the  H Δ , 0  hypothesis, the mean and variance of  Δ T i j  increase with the increase in central parameters.

3.2. PRS Sequence Linearity Detection

In the linearity detection of the PRS sequence, two hypotheses for PRS sequence  Σ ρ i j  are as follows:
{ H Σ , 0 : Σ ρ i j   is   linear H Σ , 1 : Σ ρ i j   is   nonlinear .
Similarly, the difference between the actual value and the estimated value obtained with linear fitting  Σ ρ i j  is represented by  Σ x i j ( k ) . Under the  H Σ , 0  hypothesis,  Σ x i j ( k )  obeys the Gaussian distribution with zero mean and  σ i j 2  variance. Under the  H Σ , 1  hypothesis,  Σ x i j ( k )  obeys the Gaussian distribution with mean value  μ Σ , i j ( k )  and variance  σ i j 2 Σ x i j = [ Σ x i j ( 0 ) , Σ x i j ( k ) , Σ x i j ( K 1 ) ]  is called the fitting error sequence of the PRS sequence. Constructing the linearity detection statistic  Σ T i j  corresponding to the PRS sequence:
Σ T i j = 1 K k = 0 K 1 Σ x i j ( k ) 2 = k = 0 K 1 ( Σ x i j ( k ) K ) 2 .
It can be proved that under the hypothesis of  H Σ , 0 Σ T i j  obeys the central chi-square distribution with the degree of freedom  K . And under the  H Δ , 1  hypothesis,  Σ T i j  obeys the non-central chi-square distribution with the degree of freedom  K  and the non-central parameter  λ Σ , i j .
{ H Σ , 0 : Σ T i j ~ χ 2 ( K , 0 , σ i j 2 K ) H Σ , 1 : Σ T i j ~ χ 2 ( K , λ Σ , i j , σ i j 2 K ) .
The non-central parameter  λ Σ , i j  is as follows:
λ Σ , i j = k = 0 K 1 ( μ Σ , i j ( k ) K ) 2 = 1 K k = 0 K 1 ( μ Σ , i j ( k ) ) 2 .
Combined with the previous analysis, when the degree of freedom is large enough, the chi-square distribution can be approximately Gaussian distribution. Therefore, the distribution of  Σ T i j  under different hypotheses can be derived:
{ H Σ , 0 : Σ T i j ~ N ( σ i j 2   , 2 σ i j 4 K ) H Σ , 1 : Σ T i j ~ N ( σ i j 2 + λ Σ , i j   , 2 σ i j 4 K + 4 σ i j 2 K λ Σ , i j ) .
Figure 3 shows the probability density function of the linearity detection statistic  Σ T i j  under different hypotheses, where the solid lines are the theoretical curves calculated according to the Equation (27), and the star points are the statistical results obtained through 10,000 Monte Carlo random experiments. Figure 3a corresponds to the  H Σ , 0  hypothesis, while Figure 3b,c correspond to the  H Σ , 1  hypothesis, where their central parameters are  λ Σ , i j = 100  and  λ Σ , i j = 200 , respectively. It can be found that the simulation results are very close to the theoretical results. Under the  H Σ , 0  hypothesis,  Σ T i j  is closer to zero, and the smaller the noise variance and the longer the sequence length, the more concentrated the distribution of  Σ T i j . Under the  H Σ , 0  hypothesis, the mean and variance of  Σ T i j  increase with the increase in central parameters.

3.3. Detection Performance Analysis

From the analysis in Section 2, it can be seen that the noise contained with the PRD  Δ ρ i j ( k )  is  ε i ( k ) ε j ( k ) , and the noise contained with PRS  Σ ρ i j ( k )  is  ε i ( k ) + ε j ( k ) ε i ( k )  and  ε j ( k )  are not correlated. Therefore, the variance of  ε i ( k ) ε j ( k )  and  ε i ( k ) + ε j ( k )  is  σ i j 2 = σ i 2 + σ j 2 . The correlation coefficient  η i j  between them can be derived as
η i j = cov ( ε i ( k ) ε j ( k ) , ε i ( k ) + ε j ( k ) ) var ( ε i ( k ) ε j ( k ) ) var ( ε i ( k ) + ε j ( k ) ) = σ i 2 σ j 2 σ i 2 + σ j 2 .
When the pseudo-range measurement noise variances  σ i 2  and  σ j 2  are equal, the correlation coefficient is  η i j = 0 , which means that the PRD sequence  Δ ρ i j  is not correlated with the noise contained in the PRS sequence  Σ ρ i j . When  σ i 2 σ j 2 Δ ρ i j  is correlated with the noise contained in  Σ ρ i j , and the greater the difference between the two noise variances, the higher the correlation. Considering that the spoofing signals broadcast by the same spoofing source have similar power, to simplify the problem, it is assumed that the noises contained in  Δ ρ i j  and  Σ ρ i j  are not correlated. That is to say, the detection of PRD sequence linearity is independent of the detection of PRS sequence linearity.
For the PRD sequence and PRS sequence linearity detection, since the noise variance is  σ i j 2  and the detection length is  K , the same detection threshold  γ  can be set. In the linearity detection of the PRD sequence, the  H Δ , 0  hypothesis is considered to be valid when  Δ T i j > γ , and the  H Δ , 1  hypothesis is considered to be valid when  Δ T i j γ . Combined with the Equation (22), the false alarm probability  P Δ , fa  and the detection probability  P Δ , d  can be derived as follows:
{ P Δ , fa = P ( Δ T i j γ | H Δ , 0 ) 1 Q ( γ ( σ i j 2 + λ Δ , i j ) 2 σ i j 4 K + 4 σ i j 2 K λ Δ , i j ) P Δ , d = P ( Δ T i j γ | H Δ , 1 ) 1 Q ( γ σ i j 2 2 σ i j 4 K ) .
where  Q ( )  is the right tail probability function. In the linearity detection of the PRS sequence, the  H Σ , 0  hypothesis is considered to be valid when  Σ T i j γ , and the  H Σ , 1  hypothesis is considered to be valid when  Σ T i j > γ . Combined with the Equation (27), the false alarm probability  P Σ , fa  and the detection probability  P Σ , d  can be derived as follows:
{ P Σ , fa = P ( Σ T i j > γ | H Σ , 0 ) Q ( γ σ i j 2 σ i j 2 2 K ) P Σ , d = P ( Σ T i j > γ | H Σ , 1 ) Q ( γ ( σ i j 2 + λ Σ , i j ) 2 σ i j 4 K + 4 σ i j 2 K λ Σ , i j ) .
For the method proposed in this paper, the false alarm probability  P fa  and detection probability  P d  of joint detection can be expressed as
{ P fa = P ( Δ T i j γ   and   Σ T i j > γ | ( H Δ , 0   or   H Σ , 0 ) ) P d = P ( Δ T i j γ   and   Σ T i j > γ | ( H Δ , 1   and   H Σ , 1 ) ) .
Since it is assumed that the PRD sequence linearity detection is independent of the PRS sequence linearity detection,  P fa  and  P d  can be further derived:
P fa = P ( Δ T i j γ | H Δ , 0 ) P ( Σ T i j > γ | H Σ , 0 ) + P ( Δ T i j γ | H Δ , 1 ) P ( Σ T i j > γ | H Σ , 0 ) + P ( Δ T i j γ | H Δ , 0 ) P ( Σ T i j > γ | H Σ , 1 ) = P Δ , fa P Σ , fa + P Δ , d P Σ , fa + P Δ , fa P Σ , d ,
P d = P ( Δ T i j γ | H Δ , 1 ) P ( Σ T i j > γ | H Σ , 1 ) = P Δ , d P Σ , d .
The false alarm probability  P fa  and detection probability  P d  of joint detection corresponding to the detection threshold  γ  in different scenes are shown in Figure 4. Compared with the Figure 4a,b, the increase in noise variance makes  P fa  higher and  P d  lower. Compared with the Figure 4a,c, the reduction in sequence length makes  P fa  higher and  P d  lower. Compared with the Figure 4a,d, the decrease in non-central parameter  λ Δ , i j  makes  P fa  increase, and  P d  remains unchanged. Compared with the Figure 4a,e, the decrease in non-central parameter  λ Σ , i j  reduces  P fa  and  P d .
The lower the false alarm probability and the higher the detection probability, the better the detection performance. Furthermore, we count the difference  P d P fa  between the detection probability and the false alarm probability corresponding to the detection threshold  γ  in different scenes, as shown in Figure 5. It is not difficult to find from the figure that the smaller the noise variance, the longer the sequence length, and the larger the non-central parameters  λ Δ , i j  and  λ Σ , i j , the better the detection performance.

4. Simulation Results and Analysis

In this section, the feasibility of the method will be verified with simulation tests. Simulation scenes are divided into the uniform motion scene and the circular motion scene, as shown in Figure 6. The authentic signals and spoofing signals in the two scenes are generated with the GNSS signal source simulator, sampled and stored in signal memory, and then processed with the GNSS software receiver.
The number of test signals is 8, in which the PRNs of authentic signals are 2, 11, 14, and 21, and the PRNs of spoofing signals are 5, 10, 16, and 33. The standard deviation of the pseudo-range measurement error of all signals is set to 3 m. This assumption implies that the noise variance of PRD and PRS for any two signals is 18. The receiver tracks the collected signals and obtains the measured pseudo-range sequence with the sequence length  K = 120  and the time interval  Δ t = 0.1   s . The difference between two measurement pseudo-range sequences is selected to form a PRD sequence, and the sum forms a PRS sequence. Each PRD sequence and PRS sequence is linearly fitted to obtain fitting error sequences, and the detection statistics are obtained by statistics. The detection threshold  γ = 30 . For this threshold, the probability that the sequence is linear but the detection result is nonlinear will be less than 0.001%.

4.1. Uniform Motion Scene Test

In the uniform motion scene test, the distance between the spoofing source and the target receiver is 1000 m at 0 time, and the speed of the receiver is 40 m/s. The fitting error sequences  Δ x i j  and  Σ x i j  correspond to the PRD sequence and the PRS sequence, and the linearity detection statistics  Δ T i j  and  Σ T i j  obtained by statistics are shown in Figure 7. In the case of two authentic signals, as shown in Figure 7a, both  Δ T i j  and  Σ T i j  are below the threshold. For the case of one authentic signal and one spoofing signal, as shown in Figure 7c, both  Δ T i j  and  Σ T i j  are above the threshold. For the case of two spoofing signals, as shown in Figure 7b,  Δ T i j γ  and  Σ T i j > γ  are satisfied. The simulation results are consistent with the analysis results, which show that the proposed method can detect spoofing signals in uniform motion scenes.

4.2. Circular Motion Scene Test

In the circular motion scene test, the distance between the spoofing source and the target receiver is 1000 m at 0 time, the speed of the receiver is 40 m/s, and the circumference radius is 300 m. The fitting error sequences  Δ x i j  and  Σ x i j  correspond to the PRD sequence and the PRS sequence, and the linearity detection statistics  Δ T i j  and  Σ T i j  obtained with the test are shown in Figure 8. In the case of two authentic signals, as shown in Figure 8a, both  Δ T i j  and  Σ T i j  are above the threshold. For the case of one authentic signal and one spoofing signal, as shown in Figure 8c, both  Δ T i j  and  Σ T i j  are above the threshold. For the case of two spoofing signals, as shown in Figure 8b,  Δ T i j γ  and  Σ T i j > γ  are satisfied. The simulation results are consistent with the analysis results, which show that the proposed method can detect spoofing signals in variable motion scenes.

5. Conclusions

Aiming at single spoofing interference, this paper proposes an anti-spoofing method based on the joint monitoring of the PRD sequence and the PRS sequence linearity, which changes the spoofing detection problem into the sequence linearity detection problem. The detection statistics are constructed based on the SSE of linear fitting of the PRD sequence and PRS sequence. When the sequence length is large enough, the detection statistics approximately obey the Gaussian distribution. The influence of noise variance, sequence length, and non-central parameters on the detection performance of the method is analyzed. It can be concluded that the smaller the noise variance, the longer the sequence length, and the larger the non-central parameters, the better the detection performance. In addition, the feasibility of the method is verified by simulation tests. Simulation results show that this method can detect spoofing interference and distinguish authentic signals from spoofing signals in both uniform motion scenes and variable motion scenes. This is the premise of improving the security and availability of GNSS in the presence of spoofing interference.
The proposed method is low complexity because it only requires pseudo-range information and does not need to modify the baseband processing of the receiver. Nevertheless, the precondition for the effectiveness of the method is that the spoofing source is stationary, and the additional component of the spoofing source to any signal is linearly varying. In addition, this paper lacks an exploration of the influence of receiver motion on non-central parameters, which makes it impossible to establish a direct relationship between receiver motion and detection performance. Our future work will focus on these two aspects to improve.

Author Contributions

Conceptualization, X.Z. and T.L.; methodology, X.Z.; software, T.L., J.W. and C.W.; validation, X.Z.; formal analysis, X.Z.; investigation, X.Z. and M.C.; resources, J.T.; data curation, X.Z.; writing, X.Z.; visualization, M.C.; supervision, J.T.; project administration, T.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the CAEP Foundation under Grant CX20200010.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 2014, 31, 617–636. [Google Scholar] [CrossRef]
  2. Bhatti, J.; Humphreys, T.E. Hostile control of ships via false GPS signals: Demonstration and detection. Navigation 2017, 64, 51–66. [Google Scholar] [CrossRef]
  3. Han, S.; Chen, L.; Meng, W.; Li, C. Improve the Security of GNSS Receivers Through Spoofing Mitigation. IEEE Access 2017, 5, 21057–21069. [Google Scholar] [CrossRef]
  4. Grant, A.; Williams, P.; Ward, N.; Basker, S. GPS Jamming and the Impact on Maritime Navigation. J. Navig. 2009, 62, 173–187. [Google Scholar] [CrossRef]
  5. Ioannides, T.; Pany, T.; Gibbons, G. Known Vulnerabilities of Global Navigation Satellite Systems, Status, and Potential Mitigation Techniques. Proc. IEEE 2016, 104, 1174–1194. [Google Scholar] [CrossRef]
  6. Chen, F.; Nie, J.; Ni, S.; Li, Z.; Wang, F. Combined algorithm for interference suppression and signal acquisition in GNSS receivers. Electron. Lett. 2017, 53, 274–275. [Google Scholar] [CrossRef]
  7. Warner, J.S.; Johnston, R.G. A Simple Demonstration that the Global Positioning System (GPS) is Vulnerable to Spoofing. J. Secur. Adm. 2002, 25, 19–27. [Google Scholar]
  8. Shepard, D.P.; Humphreys, T.E.; Fansler, A.A. Evaluation of the Vulnerability of Phasor Measurement Units to GPS Spoofing Attacks. Int. J. Crit. Infrastruct. Prot. 2012, 5, 146–153. [Google Scholar] [CrossRef]
  9. Schmidt, D.; Radke, K.; Camtepe, S. A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures. ACM Comput. Surv. 2016, 48, 1–31. [Google Scholar] [CrossRef]
  10. Yang, H.; Jin, R.; Xu, W.; Che, L.; Zhen, W. Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna. Sensors 2023, 23, 1604. [Google Scholar] [CrossRef] [PubMed]
  11. Tu, J.; Zhan, X.; Zhang, X.; Zhang, Z.; Jing, S. Low-complexity GNSS anti-spoofing technique based on Doppler frequency difference monitoring. IET Radar Sonar Navig. 2018, 12, 1058–1065. [Google Scholar] [CrossRef]
  12. Tao, H.; Wu, H.; Li, H.; Lu, M. GNSS Spoofing Detection Based on Consistency Check of Velocities. Chin. J. Electron. 2019, 28, 218–225. [Google Scholar] [CrossRef]
  13. Jafarnia-Jahromi, A.; Broumandan, A.; Nielsen, J. GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 observables. Int. J. Satell. Commun. Netw. 2012, 30, 181–191. [Google Scholar] [CrossRef]
  14. Ali, P.; Ali, B.; Lachapelle, G. Characterization of Signal Quality Monitoring Techniques for Multipath Detection in GNSS Applications. Sensors 2017, 17, 1579. [Google Scholar]
  15. Psiaki, M.L.; Humphreys, T.E. GNSS spoofing and detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
  16. Montgomery, P.Y.; Humphreys, T.E.; Ledvina, B.M. Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. In Proceedings of the International Technical Meeting of The Institute of Navigation, Anaheim, CA, USA, 26–28 January 2009; pp. 124–130. [Google Scholar]
  17. Montgomery, P.Y.; Humphreys, T.E.; Ledvina, B.M. A multi-antenna defense: Receiver autonomous GPS spoofing detection. Inside GNSS 2009, 4, 40–46. [Google Scholar]
  18. Swaszek, P.F.; Hartne, R.J. Spoof detection using multiple COTS receivers in safety critical applications. In Proceedings of the ION GNSS+, Nashville, TN, USA, 16–20 September 2013; pp. 2921–2930. [Google Scholar]
  19. Swaszek, P.F.; Richard, J.H. A multiple COTS receiver GNSS spoof detector-extensions. In Proceedings of the International Technical Meeting of The Institute of Navigation, San Diego, CA, USA, 27–29 January 2014; pp. 316–326. [Google Scholar]
  20. Axell, E.; Larsson, E.G.; Persson, D. GNSS spoofing detection using multiple mobile COTS receivers. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Process (ICASSP), Brisbane, Australia, 19–24 April 2015; pp. 3192–3196. [Google Scholar]
  21. Radin, S.D.; Swaszek, P.F.; Seals, K.C. GNSS spoof detection based on pseudo-ranges from multiple receivers. In Proceedings of the International Technical Meeting of The Institute of Navigation, Dana Point, CA, USA, 26–28 January 2015; pp. 657–671. [Google Scholar]
  22. Nielsen, J.; Broumandan, A.; Lachapelle, G. GNSS spoofing detection for single antenna handheld receivers. Navigation 2011, 58, 335–344. [Google Scholar] [CrossRef]
  23. Broumandan, A.; Jafarnia, A.; Dehghanian, V. GNSS spoofing detection in handheld receivers based on signal spatial correlation. In Proceedings of the IEEE/ION Position Location and Navigation Symposium (PLANS), Myrtle Beach, SC, USA, 24–26 April 2012; pp. 479–487. [Google Scholar]
  24. Broumandan, A.; Jafarnia-Jahromi, A.; Lachapelle, G. Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver. GPS Solut. 2014, 19, 475–487. [Google Scholar] [CrossRef]
  25. Hesselbarth, A.; Wanninger, L. Short-term stability of GNSS satellite clocks and its effects on precise point positioning. In Proceedings of the ION GNSS, Savannah, GA, USA, 16–19 September 2008; pp. 1855–1863. [Google Scholar]
  26. Szilárd, A.; Árpád, B. Properties of the probability density function of the non-central chi-squared distribution. J. Math. Anal. Appl. 2008, 346, 395–402. [Google Scholar]
Figure 1. Flowchart corresponding to spoofing detection process.
Figure 1. Flowchart corresponding to spoofing detection process.
Sensors 23 08418 g001
Figure 2. Probability density function of the linearity detection statistic corresponding to PRD sequence under different hypotheses.
Figure 2. Probability density function of the linearity detection statistic corresponding to PRD sequence under different hypotheses.
Sensors 23 08418 g002
Figure 3. Probability density function of the linearity detection statistic corresponding to PRS sequence under different hypotheses.
Figure 3. Probability density function of the linearity detection statistic corresponding to PRS sequence under different hypotheses.
Sensors 23 08418 g003
Figure 4. False alarm probability and detection probability corresponding to detection threshold.
Figure 4. False alarm probability and detection probability corresponding to detection threshold.
Sensors 23 08418 g004
Figure 5. Difference between detection probability and false alarm probability corresponding to detection threshold.
Figure 5. Difference between detection probability and false alarm probability corresponding to detection threshold.
Sensors 23 08418 g005
Figure 6. Two simulation scenes.
Figure 6. Two simulation scenes.
Sensors 23 08418 g006
Figure 7. Fitting error sequences and detection statistics in the uniform motion scene.
Figure 7. Fitting error sequences and detection statistics in the uniform motion scene.
Sensors 23 08418 g007
Figure 8. Fitting error sequences and detection statistics in the circular motion scene.
Figure 8. Fitting error sequences and detection statistics in the circular motion scene.
Sensors 23 08418 g008aSensors 23 08418 g008b
Table 1. Linearity analysis results of PRD sequence and PRS sequence.
Table 1. Linearity analysis results of PRD sequence and PRS sequence.
Case 1Case 2Case 3
ConstantVariationalConstantVariationalConstantVariational
  Δ ρ i j linearnonlinearlinearlinearnonlinearnonlinear
  Σ ρ i j linearnonlinearnonlinearnonlinearnonlinearnonlinear
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, X.; Liang, T.; Tian, J.; Wu, J.; Wang, C.; Chen, M. Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity. Sensors 2023, 23, 8418. https://doi.org/10.3390/s23208418

AMA Style

Zhang X, Liang T, Tian J, Wu J, Wang C, Chen M. Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity. Sensors. 2023; 23(20):8418. https://doi.org/10.3390/s23208418

Chicago/Turabian Style

Zhang, Xinran, Taotao Liang, Jie Tian, Junwei Wu, Chuan Wang, and Maolin Chen. 2023. "Anti-Spoofing Method for Improving GNSS Security by Jointly Monitoring Pseudo-Range Difference and Pseudo-Range Sum Sequence Linearity" Sensors 23, no. 20: 8418. https://doi.org/10.3390/s23208418

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop