1. Introduction
Today, Jamming and Spoofing events are increasingly prevalent across the globe and can significantly impact the avionics and navigation systems in many ways. This can result in disrupting aircraft operation during all phases of a flight including departure, en-route, approach, and landing. Therefore, it is necessary to raise awareness of these challenges and provide reliable protection to the avionics systems against these threats.
Modern IRS/AHRS output tightly integrated Inertial/GPS hybrid navigation parameters. These highly valuable hybrid parameters may be used by Flight Management Systems on Air Transport and Business Aviation aircraft because they provide better accuracy than pure inertial parameters and better integrity, availability, and continuity than pure GPS [
1,
2]. Specifically, hybrid parameters are protected from GPS satellite faults or GPS multi-path with Horizontal Protection Limits and Vertical Protection Limits. Furthermore, in case of loss of GPS, the Inertial-Aided systems continue to output valid and protected hybrid parameters with excellent accuracy.
In order to further improve the resilience of hybrid parameters to GPS Spoofing, new algorithms for jamming and spoofing protection were developed and implemented as part of the Clean Sky 2 Deck program—the Inertial Spoofing Monitor. The performance of these algorithms was assessed based on their detection, mitigation, and recovery capabilities.
2. The Honeywell AH-2000 Attitude and Heading Reference System (AHRS)
Inertial systems are the heart of any aircraft. They feed almost every flight-critical avionics system, including flight controls, displays, flight management, heads-up displays, and radars.
Honeywell’s AH-2000 is a next-generation, GPS-Aided Micro Electromechanical (MEMS) Attitude and Heading Reference System (AHRS) designed to provide unparalleled accuracy and reliability, as well as having a reduced size and weight compared to similar systems.
The AH-2000 provides inertial reference unit-like performance when GPS signals are available. It provides GPS/INS (Inertial Navigation System) hybridized outputs with integrity monitoring, producing the accuracy and stability needed to support advanced avionics like synthetic vision systems, enhanced/combined vision systems, and heads-up displays. The AH-2000’s performance and high levels of safety assurance are critical to fly-by-wire aircraft and autonomous system operation.
3. Inertial Spoofing Monitor
The GNSS (Global Navigation Satellite System) inertial integration shows great potential in detecting and mitigating the effects of erroneous GNSS data. When the GNSS trajectory diverges from, or is inconsistent with inertial data, the integrated system may detect this erroneous (or alternate–spoofed) GNSS trajectory and may be able to maintain navigational integrity by rejecting this data.
A GNSS-Aided Inertial System-based solution is very useful for the detection of all jamming and spoofing threats (J1–S7, classification according to [
3]) where the GNSS and Inertial Measurement information is inconsistent. It can also provide mitigation by coasting on the inertial position while the GNSS signals are unavailable or declared/suspected to be under threat.
In general, GNSS and INS can be coupled using a variety of integration schemes. These can range from the simple loosely coupled integration to the complex ultra-tightly coupled mode in which the INS directly aids the GNSS tracking loops [
4]. Within the Honeywell’s AH-2000 GNSS-aided AHRS (GPAHRS) algorithm, a nominal tightly coupled integration is implemented. It is considered the most widely used implementation for integrated GNSS-INS systems in aviation. As such, the Inertial Spoofing Monitor described here operates continuously and can be implemented directly on top of any tightly coupled GNSS-INS system. However, the concept introduced here is transferable to other types of integration as well.
If spoofing or jamming can be (reliably) detected, a GNSS-aided inertial system (hybrid) would stop using the GNSS measurements and start coasting, thus providing mitigation. The error bounds (FOM—Figure of Merit, HPL—Horizontal Protection Level, etc. [
5]) would grow at a rate reflecting the inertial sensor performance. If the end of jamming or spoofing is detected the GNSS-aided inertial system would start using the GNSS measurements and recover (if within linear range of the navigation error model). The important advantage is that there is no loss of function (guaranteed continuity in presence of jamming and spoofing).
Mechanization of Spoofing Monitor in GNSS-Aided Inertial System
Erroneous GNSS spoofing signals may be self-consistent, meaning the GNSS receiver-based techniques (such as RAIM or ARAIM—Receiver Autonomous Integrity Monitoring) are not able detect or exclude false GNSS information by themselves [
6,
7]. So, for the purpose of GNSS-inertial integration, it can be assumed that the GNSS data, as received from the GNSS receiver and used by the integration, are flagged as valid and provides a self-consistent set of measurements reflecting a trajectory that deviates from truth (in case of spoofing). This means that methods that exploit the additional observability of inertial integration will need to be relied upon, for example, through pre-residual (innovation) or post-residual screening. The impact of the difference in the dynamics of the true trajectory and the alternate spoofing trajectory will be seen as a transient in the measurement residuals or innovations with a magnitude and a duration that are a function of the inertial sensor stability. The measurements will follow the trajectory change according their individual line of sight paths and this will cause residual to differ in size between the satellites.
Estimation algorithms (Kalman filters) weigh the value of the measurements based on the uncertainty in the nominal measurement error versus the uncertainty in the measurement prediction from the integrated solution. If it is detected that at least one measurement residual is unreasonable for each subset of measurements (wherein each subset excludes one satellite), then we have detected multiple erroneous GNSS measurements and thus can infer that GNSS spoofing may be present. Both pseudorange measurements and carrier-based measurements can be used; the current implementation of the Inertial Monitor considers only the pseudorange measurements.
The sensitivity of the algorithm can be limited by factors such as inertial system accuracies and drift, errors in the lever arms between the inertial system and GNSS antenna, and even airframe bending between the antenna and the inertial system mounting location.
4. Spoofing Threat Definition for GNSS-Inertial-Aided Navigation Systems
Spoofing threat categorization for this paper and performance validation is considered according to the DO-384 MOPS focused on GNSS-Aided Inertial Systems [
8], which identify three alternate (i.e., spoofing) trajectories scenarios from an impact on position perspective, and they are defined as
Position step
Velocity step
Acceleration step
These test scenarios are used to characterize the system’s performance and the validity of the integrity bound under these spoofing conditions.
According to the DO-384 MOPS, the alternate spoofing trajectory impacts pseudoranges and delta ranges and no other receiver output parameters are assumed to be affected, other than any position or velocity solution from the GNSS receiver, which should be consistent with the pseudoranges and delta range data [
9].
Alternate trajectory signals that match and then diverge from the true aircraft position in a coordinated way may also be well coordinated with true GNSS time. So, it can be expected that the time associated with the alternative trajectory will be well matched to the true GNSS time. That is, if an individual aircraft position can be matched by the alternate trajectory, GNSS time (phase of code at the aircraft location) may be matched equally well.
5. Simulation Framework and Setup
FuseNAV is a Honeywell proprietary simulation toolset part of a larger framework that has been created for algorithm development, Monte Carlo simulations, and then transition to prototyping and the target product platform. The FuseNAV simulation toolset is created in MATLAB and Simulink (version R2021b). FuseNAV also consists of strapdown INS based navigation algorithms in the form of the Simulink model where different aiding sources can be enabled/disabled, and sensor models are configurable. It has adjustable rates of individual tasks (IMU data integration, measurement update, etc.)
For Monte Carlo simulations there is a set of functions for scenario definitions (custom trajectories, world locations, dates, times, etc.). It has the ability to perform parallel simulation computations as well as parallel post-processing of the simulation results and automated report generation.
It has the capability to deploy designed algorithms to real-time platforms (National Instruments cRIO, Honeywell AH-2000 and potentially any OS) thanks to C code generation and platform compilation.
5.1. Simulation Setup
The FuseNav simulation framework was updated to be able to host the algorithm of the Inertial Spoofing Monitor and to be able to execute the performance validation simulations according to DO-384 Appendix Q [
7]. As described in Appendix Q, the testing trajectory is required to have some initial procedure (taxi, take-off, turns, …), normal operation segment as a straight and level flight for at least 1 h, then GPS outage for 1–10 s, exposure segment for 5–60 min, GPS outage for 1–10 s, recovery phase up to 60 min, and post-recovery phase. The sequence of all testing trajectory segments is shown in
Figure 1. The prescribed GPS outage period by standard is not considered fully realistic and representative of the currently observed Jamming and Spoofing attacks. During the internal simulation validations, the prolonged outage periods were tested as well to examine the performance of the Inertial Spoofing Monitor. These simulations go beyond the scope defined by MOPS, but it was determined that the Inertial Spoofing Monitor is, in general, capable of detecting spoofing, even after long GPS signal outages with high dependency on inertial sensor models.
Thanks to the updates to the FuseNAV simulation framework and each simulation configuration, the phase 1—Initial phase—can be fully configured in terms of duration, speed, height, turns, etc. Phases 2–7 are strictly straight and level flight according to the definition in DO-384 Appendix Q.
The overall view of the example simulation trajectory is available in
Figure 2.
The height profile of the simulated trajectory is shown in
Figure 3.
The above-described trajectory was simulated in Monte Carlo simulations at 380 locations regularly distributed over the northern hemisphere with randomly selected initial GPS times throughout the day.
5.2. DO-384 Appendix Q Testing
The prescribed performance validation logic according to DO-384 Appendix Q [
7] was used to evaluate each trial to determine if the trial should be used in the detection and mitigation statistics or whether it should be discarded. If the trial is used, it indicates if the trial should be scored as detected, mitigated, and/or recovered.
For prolonged exposure times of alternate trajectories, over time, the coasted solution will no longer be available, but the GNSS-aided AHRS will still be able to provide the GNSS monitoring function for spoofing.
6. Simulation Validations and Results
The summary of results from the Monte Carlo simulation Performance Validation testing of Inertial Spoofing Monitor are presented in following sub-sections.
6.1. Position Step
First, the outcomes for the Position step type of alternate trajectories are provided. It can be considered the easiest spoofing type to detect of the three considered cases defined by DO-384 Appendix Q. Through internal testing, the 0.3 nautical miles position offset was selected as the baseline starting value, which can be reliably detected. In general, the larger the position offset is, the easier it is to positively detect and announce this offset by the detection algorithm. It is worth mentioning that the position step is described in Appendix Q as a continuous position offset from the nominal true trajectory, and so the position offset moves along the track. Multiple scenarios of the length of exposure times were selected for internal performance validation testing. The shortest exposure segment was defined as 5 min; the longest considered exposure segment was 1 h.
For all simulation scenarios presented within this section, a 99% confidence level was considered (according to DO-384). The length of recovery segment was 5 min, and the length of post-recovery segment was 5 min as well. The AH-2000 sensor model was considered, and the detection, mitigation, and recovery are claimed for all positions, velocities, and attitude parameters provided by GNSS-aided AHRS.
During the development and performance validation testing, dozens of MC simulation trials were executed with the randomization of several parameters in order to extensively and robustly test the developed spoofing detection and mitigation algorithm. Only a few simulation results are presented in this paper. The results are provided in the form of a Claims Table, which is defined again in DO-384 Appendix Q. The performance validation Claims Table example, using the Inertial Monitor with the position offset spoofing case, is provided in
Table 1. Notice that, for one testing scenario, one of the simulation trials was excluded from the evaluation. There are defined conditions within Appendix Q regarding which circumstances a simulation trial shall be excluded. It was ensured that the overall number of simulation trials was large enough to accommodate for events caused by the random selection of Worst-Case sensor parameters within the Monte Carlo simulations and sufficiently statistically test the algorithm.
To further illustrate the detection, mitigation, and recovery capabilities of the developed Inertial Spoofing Monitor, the example of the simulated trajectory during the spoofing exposure is provided in
Figure 4.
Figure 4 shows the true trajectory (green line), the trajectory estimated by the GNSS-aided AHRS algorithm (blue line—under non-spoofing conditions; red line—when spoofing detected) and the offset spoofing trajectory, which would be produced by the spoofer (yellow line).
Figure 4 nicely demonstrates that the spoofing offset in position was successfully detected by the algorithm prior to any effect on the estimated position. The algorithm coasted on inertial measurements during the entire spoofing exposure segment (there is a visible small drift in position due to the coasting). At the end of spoofing, the algorithm was able to determine the end of spoofing and start using the GPS measurements within the positioning algorithm quickly and independently. The position estimate then quickly recovered very close to the true track.
6.2. Velocity Step
The velocity step is considered more challenging than the position step type of alternate trajectories. The same approach of performance validation was used as described above with position offset scenarios. During development, multiple scenarios with different exposure times were simulated.
A sensitivity analysis of the detection, mitigation, and recovery performance was performed for the 5 min exposure time. Based on the results, it was observed that at around 50 m/s of induced velocity step, the Inertial Spoofing Monitor provides sufficient detection and mitigation performance to claim 99% confidence level. The 50 m/s offset of velocity was therefore considered for other simulation scenarios with longer exposure times.
The performance validation Claims Table using the Inertial Monitor with the Velocity offset spoofing case is provided in
Table 2. It must be noted that, for all simulation scenarios for velocity step evaluation, a 99% confidence level (according to DO-384) was used. The length of recovery segment was 5 min, and the length of post-recovery segment was 5 min as well. The AH-2000 sensor error model was assumed, and the detection, mitigation, and recovery are claimed for all positions, velocities, and attitude parameters provided by GNSS-aided AHRS.
For a velocity offset, the total size of position offset reached at the end of the exposure segment is shown (in parentheses) in order to indicate the magnitude of the offset.
6.3. Acceleration Step
The acceleration step is considered to be the most challenging case of the three spoofing offsets defined by DO-384 Appendix Q for alternate spoofing trajectories. As tested internally, the high success rates of spoofing detection, mitigation, and recovery can be achieved for large acceleration offsets thanks to the inertial sensor performance (AH-2000 sensor error model assumed), which might not fully represent the real-world spoofing scenario as the acceleration step is considered, the most sophisticated spoofing attack, and the technical difficulty for the attacker will be extremely high.
Moreover, there are additional improvements and enhancements of the Inertial Spoofing Monitor to consider (for example, by the introduction of additional monitoring) to increase the overall robustness and detection performance to the spoofing attacks. Therefore, the simulations for the acceleration step were considered only for testing the capability and limitations of the implemented Inertial Spoofing Monitor rather than the complete performance validation testing.
The simulation parameters considered for this acceleration spoofing example case are shown in
Table 3.
It is important that any claimed detection, mitigation, and recovery probability for the acceleration step is representative of the performance for the worst case α value. α is the fraction of the exposure time during which the acceleration is offset from the truth. For very small α, we have large accelerations, approximating a velocity step. But the velocity step test was already covered by the velocity step testing.
The worst case α parameter was determined as a first step because the claimed detection, mitigation, or recovery for an acceleration step is representative of the performance for the worst case α value.
Required acceleration times: α = 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0 of the exposure time. This worst-case parameter screening would require a high number of trial tests on each α, but according to the standard, it is acceptable to perform a lower number of screening tests on each of the α values and then run the full test on the worst cases of these α values.
For further our understanding,
Table 4 presents the values for acceleration step variants for each α, together with the position and velocity offset computed.
To perform the worst-case parameter α screening, one full (3800 number of trials) simulation scenario was run with a randomly drawn value of α parameter for each trial. Each simulation trial was classified per α parameter value and, for each value, there was a computed number of unsuccessful simulation trials. Based on this classification, the scenario with the worst-case parameter α value was determined (with the highest number of unsuccessful trials).
Based on the full-set simulation trial, it was found that the number of undetected and unmitigated trials does not pass the validation criteria for 99% success rate since the achieved success rate is 93%, but it can be considered a good starting point for further improvements to the Inertial Spoofing Monitor. To illustrate the achievable performance, the simulation for the best-case α was executed as well with a 99.6% success rate. The results show that the number of unsuccessful cases is significantly lower here. So, this case would pass the validation criteria.
7. Summary
The performance validation simulations were performed in order to evaluate and demonstrate the detection, mitigation, and recovery capability of the developed and implemented Inertial Spoofing Monitor. The performance validation followed the process described by the MOPS DO-384 in Appendix Q [
8]. The FuseNav simulation framework was updated accordingly to be able to evaluate all the requested parameters. All three versions of spoofing offsets (alternate trajectory) were tested with multiple different variations in the offset magnitudes and exposure time durations. The sensor model used for simulations corresponded to the Honeywell AH-2000 platform. The procedure of validation was selected to follow the process described in the MOPS to obtain representative, reliable, and comparable results.
Based on the current Performance Validation simulations provided in previous section, it can be stated that
Position offset outcomes:
- ○
Easiest and the most probable spoofing threat.
- ○
High detection, mitigation, and recovery performance validated for position offset magnitudes larger than 0.3 nm.
- ○
Limited mitigation observed for longer spoofing exposure time (considering AH-2000 platform).
Velocity offset outcomes:
- ○
More complex spoofing threat. Detection, mitigation, and recovery performance validated for velocity offsets—high success rate can be claimed for larger velocity offsets.
- ○
Smaller velocity offsets are detectable depending on an offset magnitude, spoofing direction, and timing.
- ○
Performance improvement is possible by Inertial Monitor updates.
Acceleration offset outcomes:
- ○
The most complex and the most challenging spoofing threat for inertial-based methods.
- ○
High success rate can be achieved for very large acceleration offsets (probably not fully representative of real spoofing events).
- ○
Improvements of Inertial Monitor or additional supplementary monitor is needed for better detection and mitigation performance.
Based on the tests, it was observed that the Inertial Spoofing Monitor is capable of successfully detecting, mitigating, and recovering function under all simulated spoofing cases (Position, Velocity, and Acceleration steps). The required performance detection, mitigation, and recovery levels for the selected 99% confidence level were achieved and can be claimed for position and velocity offsets. For the most difficult acceleration step, the claims cannot be made based on the assumed sensor error model performance. Further improvements to the design of the Inertial Monitor are planned in the future in order to achieve better performance for the most demanding spoofing cases.
Honeywell’s inertial systems are trusted by millions of aircraft operators and passengers every day. Honeywell is at the forefront of anti-jamming and anti-spoofing capabilities in the industry. New patented technology is being added to Honeywell inertial products for certification in the coming years that will dramatically improve aircraft resilience to GPS spoofing and reinforce the value of Honeywell’s IRS and AHRS as the trusted source of navigation. Honeywell is collaborating with aircraft manufacturers to make this technology available to all commercial platforms and continues to develop additional technology to stay ahead of GPS threats as they evolve.
Author Contributions
Conceptualization, K.K. and D.B.; methodology, M.K.; software, R.R.; validation, M.K. and R.R.; formal analysis, R.R.; investigation, R.B.; resources, P.P.; data curation, R.B.; writing—original draft preparation, M.K.; writing—review and editing, K.K.; visualization, R.R.; supervision, D.B.; project administration, P.P.; funding acquisition, P.P. All authors have read and agreed to the published version of the manuscript.
Funding
This project has received funding from the Clean Sky 2 Joint Undertaking (JU) under grant agreement No 945583. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and the Clean Sky 2 JU members other than the Union.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
The data presented in this study are available upon request from the corresponding author.
Conflicts of Interest
Honeywell International has no commercial conflict of interest. The authors declare that this study received funding from the Clean Sky 2 Joint Undertaking (JU) under grant agreement No 945583. The results, opinions, conclusions, etc. presented in this work are those of the author(s) only and do not necessarily represent the position of the JU; the JU is not responsible for any use made of the information contained herein.
References
- Ward, P.W.; Betz, J.W.; Hegarty, C. GNSS Disruptions. In Understanding GPS/GNSS Principles and Application, 3rd ed.; Hegarty, K., Ed.; Artech House: Norwood, MA, USA, 2017; pp. 549–617. [Google Scholar]
- Humphreys, T. Interference. In Handbook of Global Navigation Satellite Systems; Teunissen, P., Montenbruck, O., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; pp. 469–504. [Google Scholar]
- Fernández-Hernández, I.; Walter, T.; Alexander, K.; Clark, B.; Châtre, E.; Hegarty, C.; Appel, M.; Meurer, M. Increasing International Civil Aviation Resilience: A Proposal for Nomenclature, Categorization and Treatment of New Interference Threats. In Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, Reston, VA, USA, 28–31 January 2019; pp. 389–407. [Google Scholar]
- Wu, Z.; Zhang, Y.; Yang, Y.; Liang, C.; Liu, V. Spoofing and Anti-Spoofing Technologies of Global Navigation Satellite System: A Survey. IEEE Access 2020, 8, 165444–165496. [Google Scholar] [CrossRef]
- International Civil Aviation Organization. International Standards and Recommended Practices—Annex 10—Aeronautical Telecommunications—Vol 1—Radio Navigation Aids, 6th ed.; No. 91; ICAO Publications: Montreal, QC, Canada, 2018. [Google Scholar]
- RTCA SC-159; Minimum Operational Performance Standards for Global Positioning System—Wide Area augmentation System Airborne Equipment—DO229E. RTCA, Inc.: Washington, DC, USA, 2016.
- EUROCAE. Minimum Operational Performance Standards for Dual-Frequency Multi-Constellation Satellite-Based Augmentation System Airborne Equipment, ED-259A Draft; EUROCAE Working Group 62 “Galileo”; EUROCA: Saint-Denis, France, 2023. [Google Scholar]
- RTCA DO-384; Minimum Operational Performance Standard (MOPS) for GNSS Aided Inertial System. RTCA, Inc.: Washington, DC, USA, 2020.
- ARINC 743A-5; GNSS Sensor ARINC Characteristic 743A-5. SAE ITC: Warrendale, PA, USA, 2009.
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).