Abstract
In order to effectively reduce the impact of Global Navigation Satellite System (GNSS) attacks while providing mobile terminals with credible navigation and positioning results, this paper proposes a credible navigation algorithm for GNSS attack detection using an auxiliary sensor system. Based on a credible Kalman filter and measurement information provided by the auxiliary sensor system on mobile terminals, the proposed algorithm can verify the credibility of the GNSS positioning result and determine whether it has suffered from a GNSS attack using the credible verification window and the credible verification threshold. According to the verification results, the algorithm can adaptively select an updated model for measurement correction and achieve a credible navigation result. The algorithm proposed in this paper has been verified on a self-developed mobile terminal, and the experimental results show that the algorithm can provide credible navigation and positioning services for mobile terminals in the context of GNSS attacks.
1. Introduction
The existing and widely used GNSS can provide all-day global Position, Navigation and Time (PNT) service. However, the GNSS signal is a type of radio signal and is vulnerable to attacks from other radio signals in the same frequency band. As a result, the GNSS signals acquired by mobile terminal often suffer from abnormalities, causing the deviation of filter parameters, which results in an incorrect movement trajectory received by the terminal and makes the navigation and positioning results undependable [1,2,3,4]. For autonomous driving and the Internet of Vehicles, the increase in the level of automation will also increase the chances of successful attacks by hackers, especially on the navigation control module based on the GNSS, which could substantially deteriorate the safety of the vehicle [5,6].
The main methods of GNSS signal attacks include suppressive interference and spoofing interference [7]. Suppressive interference uses high-power signal blocking to prevent the receiver from working normally, but it is relatively easy to be detected. On the other hand, spoofing interference works by transmitting signals that are the same as or similar to the real satellite signals in order to deceive the terminal which rely on navigation information for positioning, and this method is relatively difficult to detect. Therefore, spoofing interference has gradually become a bigger threat to satellite navigation systems. Spoofing interference upon the GNSS is usually conducted in three different forms: the auto-generating type, repeater type and inducing type [8]. Auto-generating spoofing utilizes public navigation signals to generate its own navigation signals autonomously and seize control of the receiver afterwards. This spoofing method is low in cost and simple to be implemented. However, the generated spoofing signal is far from the real signal and is easily detected. The repeater type of spoofing copies the received real signal, adds a delay, and forwards it again as a spoofing signal. This spoofing is mainly used for navigation signals whose interface files are not disclosed. However, in order to seize control, the power of the spoofing signal still needs to be further increased; moreover, this method also requires the interruption of the receiver to make it re-enter the capture state, which can be detected using the power detection method. Inducting spoofing is the only spoofing method that can seize control without changing the tracking state of the receiver. It is concealed and difficult to detect with conventional methods, such as power detection.
In order to improve the credibility of mobile terminal navigation and positioning, different detection technologies are used for different types of GNSS attacks [9,10,11]. Today, the detection technologies for GNSS attacks can be divided into the following categories [12]: signal encryption authentication, signal feature detection and consistency verification with other navigation sensors. The signal encryption authentication technology [13,14,15] is used to encrypt the civil navigation signal or spreading code to deal with spoofing interference. However, for the method to work, it is required to change the signal system, add a reference receiver, and rely on other networks for collaborative detection. Signal feature detection [16,17,18,19,20] detects spoofing based on the amplitude, arrival time and arrival angle during the GNSS receiver’s capture and tracking phase in order to determine the credibility of the GNSS signal. Compared to the previous one, this method does not need to change the signal system, but it requires upgrades to the baseband signal processing algorithm related to the GNSS receiver, or installation of anti-jamming modules, which are very expensive. The consistency verification of the mobile terminal combined with the auxiliary navigation sensors already installed on the mobile terminal can also effectively realize the detection of GNSS jamming and spoofing. Currently, the commonly seen mobile terminals that use GNSS signals, such as automobiles, aircraft, individual soldiers and unmanned terminals, are usually equipped with auxiliary navigation sensors [21] such as inertial measurement units (IMUs), odometers, etc. These auxiliary navigation sensors are non-radio sensors and will not be attacked by GNSS jamming signals or GNSS spoofing signals. These sensors can provide navigation and positioning information with good accuracy in a short time with high update rate. The position coordinates calculated by the auxiliary navigation sensors will be continuous, with no sudden interruption or signal jump.
By effectively using the measurement information provided by the auxiliary navigation sensors to check the consistency of the GNSS signal, the mobile terminal is capable of detecting the involving jamming and spoofing attacks. Reference [22] proposed an accelerometer-assisted spoofing detection algorithm, which compares the difference between accelerometer output and the GPS output to detect anomalies caused by spoofing interference. Reference [23] proposed a joint spatial consistency check method that judges whether the positioning solution meets the distance constraint to counter GNSS spoofing attacks according to the known position provided by the GNSS receiver. Reference [24] proposed a method that fuses the GNSS absolute positioning data with the data of the vehicle speed sensor, acceleration sensor, and steering wheel angle sensor so that it can still provide accurate vehicle positioning even when the GNSS signal is interrupted for a short period of time. Reference [25] proposed a method for predicting the position deviation of UAVs under GPS spoofing attacks based on innovative particle filters. The integrated architecture of GPS/Loran-C/INS improves the accuracy of UAV’s true position prediction. These methods mentioned above all use measurement navigation information provided by auxiliary navigation sensors for signal attacking detection without increasing the user’s hardware cost. However, when induced spoofing attacks occur, the calibration feedback information of the Kalman Filter system in these methods will be biased due to GNSS spoofing. Therefore, reference [26] proposed a MEMS-INS/GNSS tightly coupled spoofing identification method based on the estimation of the spoofing contour: it reconstructs and analyzes the spoofing distribution to predict GNSS attacks in the signal domain and effectively identifies and eliminates induced spoofing attacks.
In response to the problems discussed above, the purpose of this article is to design a simple and effective navigation algorithm to detect and mitigate different kinds of GNSS attacks, including GNSS jamming or GNSS spoofing, and then obtain a credible navigation result in the positioning domain. Therefore, a credible navigation algorithm for GNSS attacks detection using an auxiliary sensor system (ACNA) is proposed. By monitoring the measurement information of the GNSS and the auxiliary navigation sensors in the location domain during the credible verification window, the ACNA method analyzes and determines whether the mobile terminal suffers a GNSS attack. According to the verifications, the algorithm can adaptively select an updated model for measurement correction, and output credible navigation results. Finally, through the data sets collected by the self-developed mobile terminal, the analysis and verification of the algorithm performance are verified.
2. Credible Kalman Filter Model
2.1. Filter Model Description
In this paper, GNSS attacks are divided into two categories depending on their impact on the positioning domain: GNSS jump attacks and GNSS slow-change attacks. GNSS jump attacks happen when the GNSS is jammed or spoofed, causing invalid or large deviation in the positioning result. This type of GNSS attack is relatively easy to recognize, including GNSS jamming attacks, GNSS-generated attacks and GNSS repeater attacks. GNSS slow-change attacks happen when the positioning result drifts off slowly after the GNSS spoofing attack. This type of GNSS attack, including induced spoofing attacks, a not easy to identify. If the mobile terminal has suffered from a GNSS jump attack or a GNSS slow-change attack during movement, the new observation data will be abnormal, as mentioned above. With the feedback correction of the Kalman filter, the error will propagate and make the positioning results not credible [25]. This paper proposes a credible navigation algorithm based on an auxiliary sensor system, and a credible Kalman filtering framework (CKF) which includes an optimized Kalman filter framework with the addition of a credible decision-making module with two state-parameter update models (credible update model and auxiliary update model). Through sliding the credible-verification window, GNSS attacks that may occur in mobile terminals are continuously monitored, and the adaptive selection of the state-parameter update model is performed. If there is no attack alarm, the current GNSS signal is determined to be credible, and the credible update module is selected to perform position prediction, and state parameters are updated and corrected. If a GNSS attack warning does occur, it is determined to be untrusted, and the auxiliary update model is selected for position prediction. In the end, the credible navigation and positioning results are produced (see Section 3 in detail).
The credible Kalman filter framework is shown in Figure 1. In theory, the credible Kalman filter model can be applied to any kind of auxiliary sensor system that can provide the navigation position information (the auxiliary sensor system here includes IMUs, odometers, visual odometers, cameras, and other sensors that can provide absolute or relative position information. For example, the auxiliary navigation sensor could be an inertial navigation system (INS), a differential drive encoder (DDE) system or a DDE/INS integrated navigation system). In order to better explain the principle based on the self-developed credible navigation test terminal, this paper selects the DDE/INS-integrated navigation system as an auxiliary sensor system to derive the credible Kalman filter model. If other auxiliary navigation sensors are used instead, the credible Kalman filter model needs to be derived based on the corresponding sensor. The following is a theoretical modeling of the GNSS, DDE/INS auxiliary sensor system and credible Kalman filter.
Figure 1.
Credible Kalman filter model.
2.2. GNSS Module
GNSS receivers generally use the WGS-84 ellipsoidal coordinate system [27] for coordinate representation, while the auxiliary sensor system generally uses the navigation coordinate system. In order to analyze the terminal position, the auxiliary sensor system in the mobile terminal and the GNSS location information must be put together in the same coordinate system. Therefore, it is necessary to transform the latitude, longitude and height information obtained from the GNSS in the geodetic coordinate system to the navigation coordinate system.
Assuming the latitude, longitude and height information of the starting position is , where is the latitude, is the longitude, and is the height. Then, the position of transformed into the WGS-84 coordinate system is . In the navigation coordinate system, the moving position of the mobile terminal in the geodetic coordinate system is , and the position transformed into the navigation coordinate system is . The major axis of the ellipsoid model is , and the oblateness is . Then, the state parameter of the GNSS model in the navigation coordinate system is
2.3. DDE/INS System Module
The auxiliary sensor system needs to independently maintain the output position of the mobile terminal in the navigation coordinate system in order to verify the credibility of the GNSS positioning result. The auxiliary sensor system used in this paper is the DDE/INS auxiliary sensor system. The working principle of the DDE/INS system is shown in Figure 2.
Figure 2.
Working principle of DDE/INS system.
Given the initial position, the DDE/INS system will calculate the position and heading of the mobile terminal through the DDE odometer. Before deriving the DDE/INS system model, we should derive the DDE system module first. The two wheels of the DDE odometer are independently controlled to realize the movement and steering control of the chassis [28]. By collecting the encoded data of the two wheels in a DDE unit time slot , the relative displacement in the navigation coordinate system can be solved as . The moving distance of the left and right wheels in is denoted as . Then, in the navigation coordinate system, the calculation model of is
where is the increment of the left and right wheels in , is the maximum count per rotation of the left or right wheel, is the radius of the wheel, and is the distance between the two wheels. Therefore, the navigation coordinate and yaw angle at time k in the DDE system model is
However, the DDE system model is greatly affected if the road surface is not flat, which causes a large error in the mileage calculation. In order to improve the navigation performance of the auxiliary sensor system and the credibility of the ACNA algorithm, the DDE system model is optimized by tightly coupling the yaw angle and the height calculated by INS, as shown in the following formula:
where , and are the navigation coordinate, the yaw angle and the height at time k in the DDE/INS system.
In the navigation coordinate system, the velocity components of the mobile terminal in the east and north directions at time k is
Therefore, the state parameter of the DDE/INS system model is
2.4. Credible Kalman Filter Model
The state parameter of the CKF filter system based on the DDE/INS system is
where is the navigation coordinate of the mobile terminal, while is the velocity of the mobile terminal. Then, the state update model at time k of the DDE/INS system is
If the GNSS information is determined to be credible, the GNSS state parameter and the DDE/INS state parameters are used as observations of the CKF filter system to generate a credible update model A. In the update process of the CKF filter system, the measurement vector is expressed as
If the GNSS information is determined to be untrusted, the CKF filter system shields the GNSS state parameter , and only uses the DDE/INS state parameters to generate an auxiliary update model V. Then, it enters the CKF filter system update process, in which the measurement vector is expressed as
4. Performance Evaluation
4.1. Experimental Platform and Data Set
In order to test the proposed ACNA algorithm, simulations and evaluations are performed on two data sets collected during the real driving. The experiment is conducted using a self-designed robot system named QJ-Racecar equipped with RTK, GNSS, INS and DDE sensors. Its mechanical structure and sensors are shown in Figure 6. Additionally, the sensor specifications are shown in Table 1 below.
Figure 6.
The mechanical structure and sensors of the QJ-Racecar.
Table 1.
List of sensor simulation parameters.
Two data sets are collected during the test ride. Data set 1 is named , and it shows an outdoor static test of the mobile terminal with a 5 min duration. This data set also provides the initial position of the mobile terminal, as shown in Table 2 below. Data set 2 is named , and it is collected by driving the robot along the sidelines of a 13.4 m long and 6.1 m wide badminton field at an average speed of 0.5 m/s. The trajectories of the two data sets exported by the RTK receiver are shown in Figure 7 and the number of available satellites during driving is shown in Figure 8.
Table 2.
Initial state parameters of the trajectory.
Figure 7.
Trajectories of data set 1 (red line) and data set 2 (yellow line) exported by the RTK receiver.
Figure 8.
Number of available satellites during the real driving.
4.2. Simulation Results
In order to validate the performance of the proposed algorithm ACNA, the GNSS jump or slow-change attacks are simulated on the data set and . The simulation of GNSS jump attacks are applied to to obtain . The simulation of GNSS slow-change attacks are applied to to obtain . Additionally, the simulation of GNSS jump and slow-change attacks are applied to to obtain .
GNSS jump attacks are injected into data set as follows:
where represents the position after GNSS jump attacks are injected, represents the GNSS position, and (random interference is added with an average of 20 m and a variance of 0.1) represents the position disturbance caused by GNSS jump attacks in the location domain. As can be seen from Equation (28), the jump attack injects big errors to GNSS signals.
GNSS slow-change attacks are injected into data set as follows:
where represents the position after GNSS slow-change attacks are injected, and (random interference is superimposed per second with an average of 0.5 m and a variance of 0.05) represents the positional disturbance at time i generated by GNSS slow-change attacks in the location domain. As can be seen from Equation (29), the slow-change attack injects small errors to GNSS signals slowly and continuously during each second.
Under such a condition, slowly injected errors can influence the filter gradually. In GNSS jump attack simulation (data set ), the segment from 150 s to 300 s of the data set is exposed to GNSS jump attacks defined in Equation (28). In GNSS slow-change attack simulation (data set ), the segment from 150 s to 300 s of the data set is exposed to GNSS slow-change attacks defined in Equation (29). Additionally, in the jump and slow-change attack simulation (data set ), the segment from 50 s to 100 s of the data set is exposed to GNSS jump attacks defined in Equation (28) and the segment from 150 s to 200 s of the data set is exposed to GNSS slow-change attacks defined in Equation (29).
4.3. Parameter Analysis
This section analyzes the impact of the jump parameter settings ( and ) and slow-change parameter settings ( and ) on and mentioned in Section 3.1. First, we focus on the impact of jump parameter settings. Data set is selected for analysis in order to shield the influence of slow-change parameter settings on , and . According to Equations (16)–(18), the value range of is set from 1 to 20, and the value range of is set as follows:
The simulation results are shown in Figure 9. It can be seen that when remains unchanged, with the increase in , becomes stable to 1 after its wavelike rising while becomes stable to 0 after its wavelike dropping.
Figure 9.
The influence of jump parameters on accuracy rate, false alarm rate and missing alarm rate.
Then, we set a parameter in order to maximize the accuracy rate of the navigation algorithm, as follows:
At the same time, we set another parameter to minimize the sum of the missing alarm rate and false alarm rate to evaluate the sum of integrity and availability risks, as follows:
The simulation results are shown in Figure 10. The impact of on and is analyzed in Figure 10a. It can be seen that as increases, is stable at 1, while is stable at 0. No matter what the value of is, the value of and remains the same. That is, the value of would become to 1 and would become to 0 as the value of increases no matter what the value of is. The difference is that is different when increases to 1. Therefore, according to Equation (15), the jump parameter is set to 2. Additionally, according to the trend of and when is set to 2, is set to 1.5 m, as shown in Figure 10b. Then, we will have and .
Figure 10.
The impact of jump parameter settings: (a) the impact of jump verification window; (b) the impact of jump verification threshold ().
Next, the effect of the slow-change parameter on and + is analyzed based on the data set . In this experiment, the value range of the slow-change verification window is set to the range 1 to 20, and the value range of is set as follows:
The simulation results are shown in Figure 11 and Figure 12. In Figure 11, it can be seen that when the value of is constant, with the increase in , becomes stable after its wavelike rising and becomes stable after its wavelike falling. According to Figure 12a, the influence of the slow-change verification window on and can be analyzed and reflected. In order to maximize the accuracy rate and minimize , we pick the slow-change parameters as and . Then, we will have , and , as shown in Figure 12b.
Figure 11.
The influence of slow-change parameters on accuracy rate, false alarm rate and missing alarm rate.
Figure 12.
The impact of slow-change parameter settings: (a) the impact of slow-change verification window; (b) the impact of slow-change verification threshold ().
5. Experimental Analysis
In order to verify the performance of the ACNA algorithm, we try to compare it with the traditional extended Kalman filter method (EKF) [30] and the reduced IMU and odometer algorithm (RIO) [24]. The EKF algorithm uses the traditional EKF algorithm to fuse GPS and DDE/INS data with no GNSS verification process; that is, the updated measurement is the direct input of the Kalman filter for state update and position prediction. The RIO algorithm has distance constraints and can detect GNSS jump attacks. In the following passage, we compare the three algorithms using data set , and .
5.1. Results of Data Set
Figure 13 shows the position error of ACNA, EKF and RIO under GNSS jump attacks (data set ). After GNSS attacks in data set , the positioning accuracy of GNSS increases to 13.47 m. Figure 14 shows the corresponding movement trajectories of the three algorithms of ACNA, EKF and RIO under GNSS attacks. Their east, north and relative positioning accuracy (, and ) and maximum error (, and ) are shown in Table 3 below.
Figure 13.
The position error of the three algorithms on data set .
Figure 14.
The trajectories of the three algorithms on data set : (a) EKF; (b) RIO; (c) ACNA.
Table 3.
East, north and relative positioning accuracy and maximum error of the three algorithms on data set .
It can be seen that the EKF algorithm fails to detect GNSS jump attacks and the positioning errors grows gradually as the GNSS attacks occur. The positioning accuracy of the EKF algorithm increases to 13.24 m, with an improvement of 2% compared with the GNSS. Additionally, the RIO algorithm and ACNA algorithm can detect jump attacks in time. The positioning accuracy of the RIO algorithm increases to 1.39 m, with an improvement of 90% compared with the GNSS. Additionally, the positioning accuracy of the ACNA algorithm increases at 1.14 m, with an improvement of 92% compared with the GNSS.
5.2. Results of Data Set
Figure 15 shows the position error of ACNA, EKF and RIO in the east and north directions after GNSS slow-change attacks (data set ). After GNSS attacks on data set , the positioning accuracy of the GNSS increases to 34.27 m. Figure 16 shows the corresponding movement trajectory of the three algorithms under GNSS attacks. Their east, north and relative positioning accuracy (, and ) and maximum error (, and ) are shown in Table 4 below.
Figure 15.
The position error of the three algorithms on data set .
Figure 16.
The trajectories of the three algorithms on data set : (a) EKF; (b) RIO; (c) ACNA.
Table 4.
The east, north and relative positioning accuracy and maximum error of the three algorithms in the data set .
It can be seen from the results that EKF is unable to detect GNSS slow-change attacks and its positioning accuracy increases to 32.76 m, with an improvement of 4% compared with the GNSS. The RIO algorithm detects slow-change attacks after it occurs for 26 s. Therefore, its positioning accuracy increases to 6.77 m, which is improved by 80% compared with GNSS. On the other hand, the ACNA algorithm can detect GNSS slow-change attacks in time and its positioning accuracy is 1.17 m, with an improvement of 97% compared with the GNSS.
5.3. Results of Data Set
Figure 17 shows the position error of ACNA, EKF and RIO after GNSS jump and slow-change attacks (data set ). After GNSS attacks on data set , the positioning accuracy of the GNSS increases to 11.80 m. Figure 18 shows the corresponding movement trajectory of the three algorithms under GNSS attacks. Their east, north and relative positioning accuracy (, and ) and maximum error (, and ) are shown in Table 5 below.
Figure 17.
The position error of the three algorithms on data set .
Figure 18.
The trajectories of the three algorithms on data set : (a) EKF; (b) RIO; (c) ACNA.
Table 5.
The east, north and relative positioning accuracy and maximum error of the three algorithms in the data set .
It can be seen from the results that EKF is unable to detect GNSS jump attacks or slow-change attacks and its positioning accuracy increases to 10.65 m, with an improvement of 10% compared with the GNSS. The RIO algorithm can detect jump attacks but not slow-change attacks in time. Its positioning accuracy is 6.75 m, which is improved by 43% compared with GNSS. On the other hand, the ACNA algorithm can detect both GNSS jump attacks and slow-change attacks in time. Its positioning accuracy is 0.81 m, with an improvement of 93% compared with the GNSS.
In contrast, the navigation performance of positioning accuracy for the ACNA algorithm is better than the other two algorithms, no matter whether GNSS jump attacks occur or GNSS slow-change attacks occur.
5.4. Positioning Accuracy Deterioration Factor
In order to evaluate the credible navigation effectiveness of ACNA, EKF and RIO, we define the positioning accuracy deterioration factor and credibility of the algorithm . Here, represents the ratio of the positioning accuracy calculated by the algorithm before and after GNSS attacks. The larger becomes, the worse the positioning accuracy of the algorithm in terms of resisting the GNSS attacks, and vice versa. The positioning accuracy deterioration factor is
where is the positioning accuracy obtained by the algorithm before the GNSS attacks, and is the positioning accuracy calculated by the algorithm after the GNSS attacks.
The credibility of the algorithm stands for how well each algorithm can help improve on the positioning accuracy deterioration factor . The smaller the , the lower the credibility of the algorithm, and vice versa. The credibility of the algorithm is
where is the GNSS positioning accuracy deterioration factor after GNSS attacks.
Table 6 concludes the , and for the three algorithms on data set before and after GNSS attacks. It can be seen that before any GNSS attack, the three algorithms can achieve a positioning accuracy at decimeter level.
Table 6.
, and for the three algorithms.
However, after GNSS attacks, the positioning accuracy deterioration factor of the GNSS itself reaches 11.80. Consequently, the positioning accuracy deterioration factor of EKF is 10.65, and the credibility of it drops to −0.74%. The positioning accuracy deterioration factor of RIO is 6.75, and the credibility of it is 36.19%. Nevertheless, the positioning accuracy deterioration factor of ACNA is only 0.81 because the ACNA algorithm can effectively make the credibility of the algorithm reach as high as 92.53%. Therefore, ACNA can reduce the positioning accuracy deterioration factor better and improve the credibility of the algorithm better when a GNSS attack occurs.
5.5. Detection Latency
In order to evaluate the detection latency after GNSS attacks of ACNA, EKF and RIO, we define the detection latency . The detection latency represents the time used for the algorithm to detect a GNSS attack. The larger becomes, the worse of the algorithm in terms of detecting the GNSS attacks, and vice versa.
Table 7 concludes the detection latency of ACNA, EKF and RIO after GNSS attacks on data set . It can be seen that the EKF algorithm fails to detect GNSS attacks, and the detection latency is null. The RIO algorithm detects GNSS jump attacks at a latency of 1s and detects GNSS slow-change attacks at a latency of 27 s. Our proposed ACNA detects GNSS jump attacks at a latency of 2 s and detects GNSS slow-change attacks at a latency of 5 s, which is consistent with the parameter analysis for the credible verification window set in Section 4.3. For the detection latency in GNSS jump attacks, our proposed algorithm is one second later than RIO because of the setting of the jump verification window, which is consistent with the analysis to prevent false alarms in Section 3.1. For the detection latency in GNSS slow-change attacks, our proposed algorithm is 22 s before RIO. Therefore, ACNA can reduce the detection latency better when GNSS attacks occur.
Table 7.
Detection latency for the three algorithms.
6. Conclusions
In order to detect GNSS attacks and obtain a credible navigation result for mobile terminals, this paper proposes a credible navigation algorithm for GNSS attack detection using an auxiliary sensor system. The credible navigation algorithm is constructed based on the credible Kalman filter model. By adding a credible decision-making system to the Kalman filter framework and utilizing the complementary characteristics of the GNSS and the auxiliary sensor system, the algorithm overcomes the shortcomings of a single sensor and can detect GNSS attacks. By using a credible verification window to detect different kinds of GNSS attacks, including GNSS jump attacks and GNSS slow-change attacks, our proposed algorithm adaptively chooses an updated model to perform filter measurement correction and position prediction according to the outcome. Finally, the uninterrupted position information of the mobile terminal and the credible navigation result can be obtained.
In addition, two data sets are collected during real driving for simulation and evaluation. Through these data sets, the parameter settings of the proposed algorithm are determined, and the advantage of the proposed algorithm is verified. We show that the proposed algorithm has better positioning accuracy, a lower positioning accuracy deterioration factor, higher navigation credibility and lower detection latency compared with conventional algorithms under GNSS jump attacks or GNSS slow-change attacks.
Author Contributions
Conceptualization, J.S. and H.W.; data curation, X.G.; formal analysis, J.S. and S.L.; investigation, X.G.; methodology, J.S.; project administration, Y.G.; resources, H.W. and Y.G.; software, Y.Z.; supervision, H.W.; validation, J.S., X.G. and S.L.; visualization, Y.L.; writing—original draft, J.S. and S.L.; writing—review and editing, X.G. and H.W. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Informed consent was obtained from all subjects involved in the study.
Data Availability Statement
The data presented in this study are available on request from the corresponding author.
Acknowledgments
This research was carried out in the project: China’s Second-Generation Satellite Navigation System Major Project (Y9E0153M26). Additionally, we wish to thank Hanze Luo for the data transform, and Songfan Hou for advice on experimental design.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Junzhi, L.; Wanqing, L.; Qixiang, F.; Beidianet, L. Research progress of GNSS spoofing and spoofing detection technology. In Proceedings of the 19th International Conference on Communication Technology (ICCT), Xi’an, China, 16–19 October 2019; pp. 1360–1369. [Google Scholar]
- Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned aircraft capture and control via GPS spoofing. J. Field Robot. 2014, 31, 617–636. [Google Scholar] [CrossRef]
- Ruegamer, A.; Kowalewski, D. Jamming and spoofing of GNSS signals—An underestimated risk?! Proc. Wisdom Ages Chall. Mod. World 2015, 3, 17–21. [Google Scholar]
- Jafarnia-Jahromi, A.; Fadaei, N.; Daneshmand, S.; Broumandan, A.; Lachapelle, G. A review of pre-despreading GNSS interference detection techniques. In Proceedings of the 5th International Colloquium on Scientific and Fundamental Aspects of the Galileo Programme, Braunschweig, Germany, 27–29 October 2015; pp. 1–8. [Google Scholar]
- Parkinson, S.; Ward, P.; Wilson, K.; Miller, J. Cyber threats facing autonomous and connected vehicles: Future challenges. IEEE Trans. Intell. Transp. Syst. 2017, 18, 2898–2915. [Google Scholar] [CrossRef]
- Mit, R.; Zangvil, Y.; Katalan, D. Analyzing Tesla’s level 2 autonomous driving system under different GNSS spoofing scenarios and implementing connected services for authentication and reliability of GNSS data. In Proceedings of the 33rd International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2020), Online, 22–25 September 2020; pp. 621–646. [Google Scholar]
- Fabio, D. (Ed.) GNSS Interference Threats and Countermeasures; Artech House: Norwood, MA, USA, 2015. [Google Scholar]
- Zhou, M.; Li, H.; Wang, C.; Ma, T.; Lu, M. Induced spoofing detection of global navigation satellite system. J. Natl. Univ. Def. Technol. 2019, 41, 129–135. [Google Scholar]
- Psiaki, M.L.; Humphreys, T.E. GNSS spoofing and detection. Proc. IEEE 2016, 104, 1258–1270. [Google Scholar] [CrossRef]
- Huang, J.; Presti, L.L.; Motella, B.; Pini, M. GNSS spoofing detection: Theoretical analysis and performance of the Ratio Test metric in open sky. Ict Express 2016, 2, 37–40. [Google Scholar] [CrossRef] [Green Version]
- Yuan, D.; Li, H.; Wang, F. A GNSS acquisition method with the capability of spoofing detection and mitigation. Chin. J. Electron. 2018, 27, 213–222. [Google Scholar] [CrossRef]
- Bian, S.F.; Hu, Y.F.; Ji, B. Research status and prospect of GNSS anti-spoofing technology. Sci. Sin. Inf. 2017, 47, 275–287. (In Chinese) [Google Scholar] [CrossRef]
- Wesson, K.; Rothlisberger, M.; Humphreys, T. Practical cryptographic civil GNSS signal authentication. Navig. J. Inst. Navig. 2012, 59, 177–193. [Google Scholar] [CrossRef]
- Kerns, A.J.; Wesson, K.D.; Humphreys, T.E. A blueprint for civil GNSS navigation message authentication. In Proceedings of the 2014 IEEE/ION Position, Location and Navigation Symposium—PLANS 2014, Monterey, CA, USA, 5–8 May 2014; pp. 262–269. [Google Scholar]
- O’Driscoll, C. What is navigation message authentication? Inside GNSS. 1 January 2018. Available online: https://insidegnss.com/what-is-navigation-message-authentication/ (accessed on 2 June 2021).
- Zhang, X.; Pang, J.; Su, Y.; Ou, G. Spoofing detection technique on antenna array carrier phase double difference. J. Natl. Univ. Def. Technol. 2014, 36, 55–60. [Google Scholar]
- Jafarnia Jahromi, A.; Broumandan, A.; Nielsen, J.; Lachapelle, G. GNSS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements. Int. J. Satell. Commun. Netw. 2012, 30, 181–191. [Google Scholar] [CrossRef]
- Dehghanian, V.; Nielsen, J.; Lachapelle, G. GNSS spoofing detection based on signal power measurements: Statistical analysis. Int. J. Navig. Obs. 2012, 2012, 313527. [Google Scholar] [CrossRef] [Green Version]
- Sharifi-Tehrani, O.; Sabahi, M.F.; Danaee, M.R. Low-complexity framework for GNSS jamming and spoofing detection on moving platforms. IET Radar Sonar Navig. 2020, 14, 2027–2038. [Google Scholar] [CrossRef]
- Li, J.; Li, H.; Lu, M. One-dimensional traversal receiver autonomous integrity monitoring method based on maximum likelihood estimation for GNSS anti-spoofing applications. IET Radar Sonar Navig. 2020, 14, 1888–1896. [Google Scholar] [CrossRef]
- Lai, Q.; Yuan, H.; Wei, D.; Wang, N.; Li, Z.; Ji, X. A Multi-Sensor Tight Fusion Method Designed for Vehicle Navigation. Sensors 2020, 20, 2551. [Google Scholar] [CrossRef] [PubMed]
- Lee, J.H.; Kwon, K.C.; An, D.S.; Shim, D.S. GPS spoofing detection using accelerometers and performance analysis with probability of detection. Int. J. Control. Autom. Syst. 2015, 13, 951–959. [Google Scholar] [CrossRef]
- Broumandan, A.; Lachapelle, G. Spoofing detection using GNSS/INS/odometer coupling for vehicular navigation. Sensors 2018, 18, 1305. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Melendez-Pastor, C.; Ruiz-Gonzalez, R.; Gomez-Gil, J. A data fusion system of GNSS data and on-vehicle sensors data for improving car positioning precision in urban environments. Expert Syst. Appl. 2017, 80, 28–38. [Google Scholar] [CrossRef]
- Majidi, M.; Erfanian, A.; Khaloozadeh, H. Prediction-discrepancy based on innovative particle filter for estimating UAV true position in the presence of the GPS spoofing attacks. IET Radar Sonar Navig. 2020, 14, 887–897. [Google Scholar] [CrossRef]
- Yimin, W.; Hong, L.; Mingquan, L. Spoofing profile estimation based GNSS spoofing identification method for tightly coupled MEMS INS/GNSS integrated navigation system. IET Radar Sonar Navig. 2019, 14, 216–225. [Google Scholar] [CrossRef]
- Nebot, E.; Sukkarieh, S.; Durrant-Whyte, H. Inertial navigation aided with GPS information. In Proceedings of the 4th Annual Conference on Mechatronics and Machine Vision in Practice, Toowoomba, Australia, 22–24 September 1997; pp. 169–174. [Google Scholar]
- Rapoport, L.; Gribkov, M.; Khvalkov, A.; Pesterev, A.; Tkachenko, M. Control of wheeled robots using GNSS and inertial navigation: Control law synthesis and experimental results. Constraints 2006, 10, 2. [Google Scholar]
- Feng, S.; Ochieng, W.Y.; Walsh, D.; Ioannides, R. A measurement domain receiver autonomous integrity monitoring algorithm. GPS Solut. 2006, 10, 85–96. [Google Scholar] [CrossRef]
- Zhao, L.; Ochieng, W.Y.; Quddus, M.A.; Noland, R.B. An extended Kalman filter algorithm for integrating GPS and low-cost dead reckoning system data for vehicle performance and emissions monitoring. J. Navig. 2003, 56, 257–275. [Google Scholar] [CrossRef] [Green Version]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).

















