Professional Documents
Culture Documents
Rothmaier 2021
Rothmaier 2021
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 1
Abstract—We present a framework for GNSS spoofing detec- The cited work has focused on GNSS spoofing detection
tion combining an arbitrary number of metrics while guaran- through a single metric. [20], [21], [22] go further and combine
teeing a fixed maximum false alert probability. The detection several metrics measuring the shape of the autocorrelation
test assumes a simple form that makes it suitable for real
time applications. We define criteria for metrics to be used function that outperform monitors based on a single SQM
within this framework and demonstrate compatibility with a metric. The Power-Distortion detector presented in [23] and
range of commonly used metrics. We achieve a more than 70% its extension in [24] measure both the distortion of the auto-
reduction in worst-case missed detection probability compared correlation function and the total received power. This neatly
to conventional metric combination techniques. combines two complementary defense strategies. An attack
Index Terms—GNSS, spoofing detection, GLRT. that overpowers the authentic signals will cause a noticeable
increase in the received power. A spoofing attack carefully
I. I NTRODUCTION tuned to excite the victim’s antenna with a power level similar
to the authentic signals on the other hand will noticeably
GNSS is increasingly used as the main source for Position,
distort the peak of the autocorrelation function during signal
Navigation and Time (PNT) in safety of life applications. It
drag-off. The same complementary characteristic is leveraged
is the foundation of services like Performance Based Nav-
in [25] by combining Automatic Gain Control (AGC) and
igation and the aviation community is ”now dependent on
Cross Ambiguity Function monitoring. Similarly complemen-
uninterrupted access to GNSS PNT services” [1]. However, the
tary is a combination of DoA measurements and pseudorange
accuracy, availability and integrity of the service that has made
residuals as presented in [26]. DoA based techniques shine
satellite navigation a trusted cornerstone of PNT is nowadays
when all or a significant amount of the satellites in view are
challenged by increasing levels of interference.
spoofed from a single transmitting antenna. Should only a
Various types of GNSS interference exist, each posing
small subset of satellite signals be spoofed, the combination of
different challenges and threats. A classification specifically
authentic and spoofed pseudoranges received by the receiver
for the aviation sector is given by [2]. This paper focuses on
will start to disagree as soon as the attacker tries to alter the
the detection of intentional interference known as spoofing, a
victim’s position. Once again the attacker is trapped between
targeted attack where a malicious actor takes control of the
two complementary defenses. A more general approach to
victim’s position and/or time solution by broadcasting coun-
combine techniques is followed in [27] through the use of
terfeit GNSS signals. This takeover has been demonstrated,
belief functions. [28] presents the compelling general concept
among others by the authors of [3].
of a PNT trust-inference engine, but a lot of work remains
GNSS spoofing, its detection and mitigation is a field
to be done until its final implementation and it is unclear
of active research. A detailed review of GNSS spoofing or
how similar performance guarantees can be given as with the
common mitigation techniques is not the purpose of this paper,
approach followed in this paper.
and we assume a reader familiar with the topic. Overviews
All presented combinations of techniques known to the au-
of attack modes and common defense strategies are given by
thors are either limited to SQM based techniques, specifically
[4], [5] and [6]. The remainder of this paper will focus on
tailored to their respective metrics or have not been devel-
techniques that can be implemented by the user segment and
oped further than their general conceptual idea. Furthermore,
rely on GNSS signals alone. Specifically, we consider but do
especially in a safety of life application such as an aircraft, a
not limit the application of this work to combinations of Signal
guarantee on the detector’s performance is essential as GNSS
Quality Monitoring (SQM) metrics like the ones presented
is meeting stringent Availability and Continuity requirements
in [7], [8], [9], [10], received power monitoring as in [11],
[29]. Neither of the prior complementary metric combinations
[12], pseudorange residual checks, and signal Direction of
has currently been designed for such a guarantee.
Arrival (DoA) based approaches described in [13], [14], [15],
This paper makes several contributions towards an optimal
[16], [17]. But we exclude encryption-based defenses like the
decision about the presence of an attack based on any number
one presented in [18] and defenses based on drift monitoring
of techniques. We present the Generalized Likelihood Ratio
with the help of inertial sensors such as in [19]. The goal
Test (GLRT) as a general framework for a wide range of
is to support the most educated decision on the presence of
metrics. We formalize algorithms to combine GLRTs with
a spoofing attack by the GNSS receiver itself and without
traceable performance values and demonstrate how to combine
changes to the GNSS signal structure.
several metrics in a single GLRT for increased performance.
Manuscript received We finally present application examples of two common
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 2
metric combinations in a worst-case simulation and using the In a setup of multiple monitors, the false alert budget needs
TEXBAT dataset [30] and make suggestions for future metric to be allocated among the monitors to guarantee the overall
combinations. compliance with the constraint. Thanks to the associativity of
In this paper we focus on the theoretical derivation of the boolean AND and OR operators, a sequence of operations
framework. It is complemented by a conference paper [31] can be broken down into a recursive series of operations with
that entails a measurement model calibration and application two arguments each. The following statements are therefore
examples in an attempt to validate the theoretical derivations. sufficient for combinations of any number of monitors. This
The remaining paper is organized in three main sections and concept is well established in the integrity community as a
a summary and conclusions. Section II considers processing continuity fault tree [36], [37], [38].
separate metrics in individual monitors, a concept known as We work with the definition of the probability of false alert
the continuity fault tree. Section III presents the GLRT applied PF A to be the conditional probability of an alert given nominal
to spoofing detection and how multiple metrics can be joined conditions. We denote nominal conditions from here on as the
in a single test. In section IV we then apply the presented null hypothesis H0 and spoofed conditions as the alternate
concepts to two examples of metric combinations. hypothesis H1 . For two monitors combined through an OR
gate, the PF A is then given by
II. A M ONITOR F RAMEWORK
PF AOR = P (alert1 ∨ alert2 |H0 )
A straight forward way to employ multiple metrics for
spoofing detection is to process each metric separately. In this = P (alert1 |H0 ) + P (alert2 |H0 )
(1)
paper we follow the Neyman-Pearson paradigm, minimizing − P (alert1 |H0 )P (alert2 |H0 )
missed detections while satisfying a constraint on the maxi- ≤ P (alert1 |H0 ) + P (alert2 |H0 )
mum probability of false alerts PF Amax [32]. Each separate
Neyman-Pearson detector is a function that maps evidence, The PF A from multiple monitors connected through OR
measurement model and its PF Amax to the binary decision gates is therefore less than or equal to the sum of individual
about the presence of a spoofing attack. The individual outputs false alert probabilities. If we let individual budgets αm sum
of each separate test are then combined through logical gates up to the total false alert budged PF Amax , the resulting PF A
to determine the overall decision. will be less than or equal to the total budget. Given M
We will now define the framework used for these com- monitors connected through OR gates, the PF A budget of the
binations to preserve the compliance with the constraint on mth monitor can hence be described by
PF A . They will then serve as baseline comparisons in the
examples in section IV. For the sake of simplicity we will PF A,m = αm (2)
limit this paper’s derivations to logical OR and AND gates
between individual monitors, but the presented concepts can such that
M
easily be expanded to other logical gates. OR gates are used
X
αm = PF Amax (3)
to combine complementary metrics in [33], [21], [22], [34] m=1
or to test for multiple hypothesis in parallel as in Receiver
Autonomous Integrity Monitoring (RAIM) [35] and in our The choice of individual αm is up to the designer. The
examples in section IV. AND gates are often used to represent PF Amax budget is shared among the monitors, individual
specific knowledge or assumptions about characteristics of the thresholds have to be set more conservatively than if monitors
attack as in [20] or as we show in section IV-B. were used by themselves.
The underlying assumption in a setup of multiple monitors When analyzing a detector’s performance, we consider the
is that metrics can be considered statistically mutually inde- probability of missing the detection of a specific attack, PM D .
pendent conditioned on either hypothesis. This assumption is We define it as the conditional probability of not raising
not necessarily correct at all times. Under nominal conditions, an alert given a threat model defined by H1 . Under the
unmodeled effects such as multipath or scintillation can for independence assumption, the overall PM D of M monitors
example affect various metrics simultaneously. Independence connected through OR gates is simply equal to the product of
is often assumed as an approximation as the true correlation individual missed detection probabilities.
model is not known [20], [23]. Just like the validity of any M
measurement model, this approximation has to be verified
Y
PM DOR = PM D,m (4)
for specific applications through measurement campaigns. We m=1
give one such example for flight data in [31]. Conditional
independence under spoofed conditions is assumed when For two monitors combined through an AND gate, the PF A
calculating the missed detection probability PM D for specific is given by
attack modes. We employ this assumption in the qualitative PF AAN D = P (alert1 ∧ alert2 |H0 )
analysis in sections III-C and IV-A. We reasonably assume that (5)
= P (alert1 |H0 )P (alert2 |H0 )
the framework presented in this paper as well as the common
techniques summarized in this section are similarly affected by The false alert probability of independent monitors connected
any unmodeled correlation, nevertheless we have to interpret through AND gates is equal to the product of individual false
these results with the appropriate caution. alert probabilities. For M monitors connected through AND
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 3
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 4
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 5
TABLE I
OVERVIEW OF GLRT SCENARIOS The families of Normal and χ2 distributions are closed
Scenario SC CS SS
under addition, the sums are Normal and χ2 distributed.
X
Ω0 , Ω1 µ0 , RN RN , µ 1 µ0 , µ1 2
log Λm |H0 ∼ N (µSS,0 , σSS )
m∈MSS
X
2
(µ0 − µ1 ) Σ−1 T log Λm |H1 ∼ N (µSS,1 , σSS )
log Λ(y) − 12 ||y−µ0 ||2Σ−1 1
2
||y −µ1 ||2Σ−1
1 m∈MSS
y − (µ0 + µ1 ) X (25)
2 −2 log Λm |H0 ∼ χ2kSC
m∈MSC
Received power, X
autocorrelation
Carrier
−2 log Λm |H1 ∼ χ2kSC ,λSC
Detection function m∈MSC
phase single Direction of Arrival
metrics distortion,
difference
pseudorange
residuals The distribution parameters are defined as the sums of the
parameters of the individual distributions defined in Eqs. (18)
and (21).
measurements in a single LRT for improved detection power. X
µSS,0 = µm |H0
The concept can be extended to combine different metrics
m∈MSS
of the same of the three scenarios outlined in section III-A. X
Keeping in mind our discussion in section II, we from now µSS,1 = µm |H1
on assume that measurements from different metrics are sta- m∈MSS
X
tistically mutually independent. 2 2
σSS = σm (26)
We concatenate all measurements in the vector y. Lever- m∈MSS
aging the independence assumption, we can factorize the
X
kSC = km
expression in Equation (10) into a product of likelihood ratios, m∈MSC
one for each metric. Depending on the combined metrics, X
log Λ is simply equal to a sum of terms of the forms in λSC = λm
m∈MSC
Equations (14), (16), and (19). For M metrics we write
M
X We denote the probability density function (pdf) of the
log Λ1:M = log Λm (22) combination under either hypothesis as p (log Λ1:M |Hi ) =
m=1 f1:M (z|Hi ). It is given by
M
! where symbol ∗ denotes the convolutionP product, pSS
X
min P log Λm ≥ γ|H1 and pSC are the respective pdfs of m∈M SS
log Λm and
γ
P
m=1 m∈MSC log Λm .
M
! (23) The distribution f1:M (z|H0 ) determines the detection
X
s.t. P log Λm < γ|H0 ≤ PF Amax threshold as given by (11). Depending on the metrics em-
m=1 ployed, the threshold depends on the number of satellites
in view or even the satellite geometry and therefore varies
The solution to Eq. (23) is straightforward if all used metrics continuously. Solving for the inverse cdf of f1:M (z|H0 ) would
are from the same of the three scenarios described in section require a numerical search for the solution to a double integral.
III-A and summarized in Table I, as the families of Normal This is likely not feasible to be computed with sufficient nu-
and χ2 distributions are closed under addition. merical accuracy in real time by a receiver. We therefore offer
The combination is less trivial if a spatial metric (scenario a solution to the convolution integral. The somewhat lengthy
2 or 3) is combined with a metric from scenario 1. derivation of our solution is given in Appendix A together
1) Scenario 1 and 2: This combination creates a sum of with a more numerically stable variation. The resulting pdf is
terms of the form of Eq. (16) and Eq. (19). As mentioned in
section III-A we leave an analysis of the more exotic case of
1 1 (z − µ)2
scenario 2 to future work. f1:M (z|H0 ) = 2k/4−1 σ k/2−1 √ exp −
2) Scenario 1 and 3: We denote the set of variables of 2π Γ(k/2) 2σ 2
∞
X1 √ l
scenario 1 as MSC and the set of variables in scenario 3 as z−µ
MSS . log Λ1:M is given by (− 2)l + σ Γ(k/4 + l/2)
l! σ
X X l=0
log Λ1:M = log Λm + log Λm (24) (28)
m∈MSS m∈MSC
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 6
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 7
50
where R ∈ RN ×N is the covariance matrix of N azimuthal
3
0
4
1
2.5
2
3.5
0.5
1.5
45 DoA measurements.
40
Multiplying the measurement equations by A takes the sin-
gle difference between measurements, making the hypotheses
35
3 independent of the nuisance parameter antenna heading [43].
2.5
30
1.
2
The decision variable log ΛDoA is distributed according to
1
5
Eq. (21), with µ0 = Aφ, µ1 = 0 and Σ = ARAT .
0
0.5
25
2) Pseudorange residuals: We introduce pseudorange off-
20
1
sets similar to the fault model defined for RAIM. We closely
15
0.5
follow the nomenclature and build upon the work in [48],
10 [35], [49] and [50]. RAIM is well known and documented, but
much less work has been done on spoofing attack models. We
0
5 0
0 therefore offer a detailed derivation of an attack that minimizes
0
0
0
10 20 30 40 50
pseudorange residuals for a given navigation solution bias. We
note that this problem setup and resulting worst case threat
model is analogous to, but different from the considerations
Fig. 2. Contour plot of log PM DOR − log PM Djoint for two simple
vs. composite monitors using a single measurement each as a function of
around RAIM with multiple faults in [50] and [49]. We start
noncentrality parameters λ1 , λ2 . Positive values indicate that the joint GLRT by defining pseudoranges to N satellites based on the linear
is stronger, negative values indicate that individual monitors combined through approximation to the position solution [51]
an OR gate is stronger.
y = Gx + Iss yb + (38)
from a single transmitting antenna and therefore are received
where
from the same direction [14], [15], [16]. But if only a
N
subset of satellites is spoofed, the detection power deteriorates • y ∈ R is the vector of N pseudorange measurements
significantly [42], [26]. Any disagreement between the subset minus the expected pseudorange for the all-in-view con-
of spoofed and the remaining authentic pseudoranges will verged position solution
N ×p
however cause an increase in the resulting residuals. Detection • G∈R is the geometry matrix
through prrs complements DoA based techniques well. • p is the number of states
p
We explore this combination in a comprehensive simulation • x ∈ R is the state vector update
s
study in the next paragraphs. We underline that for this type • yb ∈ R is the vector of s pseudorange biases introduced
of defense, the most dangerous attack can consist of only a by the attacker
N ×s
subset of spoofed satellites and show how the framework of • Iss ∈ R maps these to the N pseudoranges
N
this paper helps to protect against it. • ∈R is the measurement noise
1) DoA measurements: As we outlined in section III, DoA The measurement noise follows a Normal distribution.
measurements can be considered as a simple vs. composite
∼ N 0, W −1
or as a simple vs. simple test. Our goal in this example is to (39)
demonstrate the combination of a simple vs. simple DoA test
with the simple vs. composite test of pseudorange residuals. We assume an unbiased least-squares state estimator [51].
We therefore follow the simple vs. simple DoA formula-
tion and notation from [43], [17]. Any DoA measurements x̂ = Sy (40)
matching the format of the cited literature could be used.
For simplicity, we consider azimuthal DoA measurements as −1 T
obtained e.g. from a Dual Polarization Antenna [43], [47]. S = GT W G G W (41)
The hypothesis are defined by the differences between DoA
measurements Thanks to the unbiased estimator, a mean state bias xb is a
H0 : Ay = Aφ + A linear function of pseudorange biases.
(35)
H1 : Ay = A xb = Sss yb
(42)
with the vector of N azimuthal DoA measurements y, true Sss = SIss
DoAs φ, the banded matrix
The χ2 statistic is given by [49].
1 −1 . . . 0 0
0 1 −1 . . . 0
A= ∈ RN −1×N (36) ||y − Gx̂||2P = −2 log Λprr (43)
...
0 0 . . . 1 −1 with −1 T
and Gaussian measurement noise. P = W − W G GT W G G W (44)
A ∼ N (0, ARAT ) (37)
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 8
100
−2 log Λprr matches the model of the simple vs. composite
decision variable described in Equation (18). The degrees of 80
freedom k and noncentrality parameter λ are given by
60
k =N −p 40
λ= ybT Iss
T
P Iss yb (45) 20
with
T
Wss = Iss W Iss (46) 10 0
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 9
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 10
2
D(τ )2 1 (R[ξ(−τ )] − R[ξ(τ )])
− =− 2
8τ 2 4τ σN 0
2
1 (I[ξ(−τ )] − I[ξ(τ )]) (53)
− 2
2 4τ σN 0
= log ΛD
Equation (53) now represents the sum of two log ΛSC
variables defined in Equation (16). A test on D(τ ) is hence
equivalent to a joint GLRT of Delta metrics applied to the
In-phase and Quadrature components.
Within the framework presented in this paper, the decision
metrics are the Delta metrics on R and I as well as the received
power metric P . We summarize their behavior under H0 in
Eq. (54).
P − P0 |H0 ∼ N (0, σP2 )
2
R[ξ(−τ )] − R[ξ(τ )]|H0 ∼ N (0, 4τ σN 0) (54)
2
I[ξ(−τ )] − I[ξ(τ )]|H0 ∼ N (0, 4τ σN 0)
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 11
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 12
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 13
L’Hopital’s rule finally gets us the result [15] M. L. Psiaki, B. W. O’Hanlon, S. P. Powell, J. A. Bhatti, T. E.
√ Humphreys, and A. Schofield, “GNSS Spoofing Detection using Two-
− 12 Antenna Differential Carrier Phase,” in Proceedings of the 27th Inter-
2 k l
L= |z̃ + σ| lim + ∼0 (72) national Technical Meeting of The Satellite Division of the Institute of
4 l→∞ 4 2 Navigation, 2014, pp. 2776–2800.
[16] D. Borio and C. Gioia, “A sum-of-squares approach to GNSS spoofing
L asymptotically approaches 0, the series is absolutely detection,” IEEE Transactions on Aerospace and Electronic Systems,
convergent. vol. 52, no. 4, pp. 1756–1768, 2016.
[17] F. Rothmaier, Y.-h. Chen, S. Lo, and T. Walter, “GNSS Spoofing
Detection through Spatial Processing,” Accepted for publication in
ACKNOWLEDGMENT NAVIGATION, Journal of the Institute of Navigation, 2021.
[18] L. Scott, “Anti-Spoofing and Authenticated Signal Architectures for
The authors thank the Federal Aviation Administration Civil Navigation Systems,” Proceedings of the 16th International Tech-
(FAA) and the Stanford Center for Position Navigation and nical Meeting of the Satellite Division of The Institute of Navigation
Time (SCPNT) for sponsoring this research. The authors thank (ION GPS/GNSS 2003), 2003.
[19] Ç. Tanıl, S. Khanafseh, M. Joerger, and B. Pervan, “An INS Monitor
Prof. J. David Powell for his invaluable advice and guidance to Detect GNSS Spoofers Capable of Tracking Vehicle Position,” IEEE
during this research. Transactions on Aerospace and Electronic Systems, vol. 54, no. 1, pp.
131–143, 2018.
[20] K. Ali, E. G. Manfredini, and F. Dovis, “Vestigial signal defense through
R EFERENCES signal quality monitoring techniques based on joint use of two metrics,”
in IEEE PLANS, Position Location and Navigation Symposium. IEEE,
[1] RASG-MID, “RASG-MID SAFETY ADVISORY – 14 April 2014, pp. 1240–1247.
2019 GUIDANCE MATERIAL RELATED TO GNSS VUL- [21] A. Pirsiavash, A. Broumandan, and G. Lachapelle, “Two-Dimensional
NERATBILITIES,” ICAO, Tech. Rep. April, 2019. [Online]. Signal Quality Monitoring For Spoofing Detection,” in Navitec 2016.
Available: https://www.icao.int/MID/Documents/2017/RASG-MID6/ Noordwijk, Netherlands: ESA/ESTEC, 2016.
RSA14-GNSSVulnerabilities.pdf
[22] C. Sun, J. W. Cheong, A. G. Dempster, H. Zhao, and W. Feng, “GNSS
[2] I. Fernández-Hernández, T. Walter, K. Alexander, C. Hegarty, M. Appel,
spoofing detection by means of signal quality monitoring (SQM) metric
and M. Meurer, “Increasing International Civil Aviation Resilience :
combinations,” IEEE Access, vol. 6, pp. 66 428–66 441, 2018.
A Proposal for Nomenclature , Categorization and Treatment of New
[23] K. D. Wesson, J. N. Gross, T. E. Humphreys, and B. L. Evans, “GNSS
Interference Threats,” in Proceedings of the 2019 International Technical
Signal Authentication Via Power and Distortion Monitoring,” IEEE
Meeting of The Institute of Navigation, 2018, pp. 1–19.
Transactions on Aerospace and Electronic Systems, vol. 54, no. 2, pp.
[3] T. E. Humphreys, B. M. Ledvina, M. L. Psiaki, B. W. O. Hanlon,
739–754, 2017.
and P. M. Kintner, “Assessing the Spoofing Threat : Development of a
Portable GPS Civilian Spoofer,” in Proceedings of the 21st International [24] J. N. Gross, C. Kilic, and T. E. Humphreys, “Maximum-likelihood
Technical Meeting of the Satellite Division of The Institute of Navigation power-distortion monitoring for GNSS-Signal authentication,” IEEE
(ION GNSS 2008), Savannah, GA, 2009, pp. 2314–2325. Transactions on Aerospace and Electronic Systems, vol. 55, no. 1, pp.
[4] A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle, 469–475, 2019.
“GPS vulnerability to spoofing threats and a review of antispoofing [25] T. Zhang, X. Chen, D. He, and Y. Jin, “Performance Analysis and
techniques,” International Journal of Navigation and Observation, 2012. Tests for GNSS Spoofing Detection Based on the Monitoring of Cross
[5] C. Günther, “A Survey of Spoofing and Counter-Measures,” Navigation, Ambiguity Function and Automatic Gain Control,” in Proceedings of
Journal of the Institute of Navigation, 2014. the 2021 International Technical Meeting of The Institute of Navigation,
[6] M. L. Psiaki and T. E. Humphreys, “GNSS Spoofing and Detection,” 2021, pp. 98 – 110.
Proceedings of the IEEE, vol. 104, no. 6, pp. 1258–1270, 2016. [26] M. C. Esswein and M. L. Psiaki, “GNSS Anti-Spoofing for a Multi-
[7] R. E. Phelts, “Multicorrelator Techniques for Robust Mitigation of Element Antenna Array,” in Proceedings of the 2019 International
Threats To GPS Signal Quality,” Ph.D. dissertation, Stanford University, Technical Meeting of The Institute of Navigation, Miami, Florida, 2019.
2001. [27] H. Tao, H. Li, and M. Lu, “A method of detections’ fusion for GNSS
[8] E. G. Manfredini, F. Dovis, and B. Motella, “Validation of a signal anti-spoofing,” Sensors (Switzerland), vol. 16, no. 12, p. 18, 2016.
quality monitoring technique over a set of spoofed scenarios,” in 2014 [28] A. Molina-Markham and J. J. Rushanan, “Positioning, Navigation, and
7th ESA Workshop on Satellite Navigation Technologies and European Timing Trust Inference Engine,” in Proceedings of the 2020 Interna-
Workshop on GNSS Signals and Signal Processing, NAVITEC 2014 - tional Technical Meeting (ITM) of The Institute of Navigation ION. San
Proceedings. Noordwijk, Netherlands: IEEE, 2015, pp. 1–7. Diego, CA: The Institute of Navigation, 2020, p. 15.
[9] M. Troglia Gamba, M. D. Truong, B. Motella, E. Falletti, and T. H. Ta, [29] C. Hegarty, A. Odeh, K. Shallberg, K. D. Wesson, T. Walter, and
“Hypothesis testing methods to detect spoofing attacks: a test against the K. Alexander, “Spoofing Detection for Airborne GNSS Equipment,” in
TEXBAT datasets,” GPS Solutions, vol. 21, no. 2, pp. 577–589, 2017. Proceedings of the 31st International Technical Meeting of The Satellite
[10] A. Broumandan, R. Siddakatte, and G. Lachapelle, “Feature article: An Division of the Institute of Navigation (ION GNSS+ 2018), Miami,
approach to detect GNSS spoofing,” IEEE Aerospace and Electronic Florida, 2018, pp. 1350–1368.
Systems Magazine, pp. 64–75, 2017. [30] T. Humphreys, J. Bhatti, D. Shepard, and K. Wesson, “The Texas
[11] Dennis M. Akos, “Who’s Afraid of the Spoofer? GPS/GNSS Spoofing spoofing test battery: Toward a standard for evaluating GPS signal
Detection via Automatic Gain Control (AGC),” NAVIGATION, Journal authentication techniques,” in 25th International Technical Meeting of
of the Institute of Navigation, vol. 59, no. 4, pp. 281–290, the Satellite Division of the Institute of Navigation 2012, ION GNSS
2012. [Online]. Available: https://www.ion.org/publications/abstract. 2012, Nashville, TN, 2012, pp. 3569–3583.
cfm?articleID=102583 [31] F. Rothmaier, S. Lo, R. E. Phelts, and T. Walter, “GNSS Spoofing
[12] A. Jafarnia-Jahromi, A. Broumandan, J. Nielsen, and G. Lachapelle, Detection through Metric Combinations: Calibration and Application
“Pre-despreading authenticity verification for GPS L1 C/A signals,” of a General Framework,” in Proceedings of the 34th International
NAVIGATION, Journal of the Institute of Navigation, vol. 61, no. 1, Technical Meeting of the Satellite Division of the Institute of Navigation,
2014. ION GNSS+ 2021, St. Louis, Missouri, 2021.
[13] P. Montgomery, T. E. Humphreys, and B. Ledvina, “Receiver- [32] H. L. Van Trees, Detection, Estimation, and Modulation Theory, Part I.
autonomous spoofing detection: Experimental results of a multi-antenna New York: John Wiley & Sons, Inc., 2001.
receiver defense against a portable civil GPS spoofer,” in Proceedings of [33] A. Jovanovic, C. Botteron, and P. A. Fariné, “Multi-test detection and
the international Technical Meeting of the Institute of Navigation 2009, protection algorithm against spoofing attacks on GNSS receivers,” in
vol. 1, Anaheim, CA, 2009, pp. 124–130. Record - IEEE PLANS, Position Location and Navigation Symposium,
[14] A. Konovaltsev, S. Caizzone, M. Cuntz, and M. Meurer, “Autonomous 2014, pp. 1258–1271.
Spoofing Detection and Mitigation with a Miniaturized Adaptive An- [34] A. M. Khan, N. Iqbal, A. A. Khan, M. F. Khan, and A. Ahmad, “De-
tenna Array,” in Proceedings of the 27th International Technical Meeting tection of Intermediate Spoofing Attack on Global Navigation Satellite
of the Satellite Division of The Institute of Navigation, ION GNSS+ System Receiver through Slope Based Metrics,” Journal of Navigation,
2014. Tampa, Florida: Institute of Navigation, 2014, pp. 2937–2948. pp. 1–17, 2020.
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TAES.2021.3082673, IEEE
Transactions on Aerospace and Electronic Systems
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS 14
[35] J. Blanch, T. Walter, P. Enge, Y. Lee, B. Pervan, M. Rippl, A. Spletter, Fabian Rothmaier is a PhD candidate at the GPS
and V. Kropp, “Baseline advanced RAIM user algorithm and possible Laboratory at Stanford University. He received his
improvements,” IEEE Transactions on Aerospace and Electronic Sys- B. Engr. degree from the University of Applied
tems, vol. 51, no. 1, pp. 713–732, 2014. Sciences Bremen, Germany in 2015 and his M. Sc.
[36] S. Lo, L. Boyce, T. Walter, P. Enge, B. Peterson, B. Wenzel, and degree from Stanford University in 2017.
K. Carroll, “Loran Fault Trees for Required Navigation Performance
0 . 3,” in ION NTM, Anaheim, CA, 2003, pp. 352–361.
[37] J. Fernow and D. O’Laughlin, “Estimating continuity of GNSS,” in
Proceedings of the 17th International Technical Meeting of the Satellite
Division of the Institute of Navigation, ION GNSS 2004, 2004, pp. 2113–
2123.
[38] M. Joerger, Y. Zhai, I. Martini, J. Blanch, and B. Pervan, “ARAIM
continuity and availability assertions, assumptions, and evaluation meth-
ods,” in ION 2020 International Technical Meeting. The Institute of
Navigation, 2020, pp. 404–420.
[39] A. Broumandan, A. Jafarnia-Jahromi, S. Daneshmand, and
G. Lachapelle, “A network-based GNSS structural interference
detection, classification and source localization,” in 28th International
Technical Meeting of the Satellite Division of the Institute of Navigation,
ION GNSS 2015. Tampa, Florida: Institute of Navigation, 2015, pp.
3358–3369. Yu-Hsuan Chen is a research associate at the
[40] D. Borio, “PANOVA tests and their application to GNSS spoofing Stanford GPS Laboratory. He received his Ph.D. in
detection,” IEEE Transactions on Aerospace and Electronic Systems, electrical engineering from National Cheng Kung
vol. 49, no. 1, pp. 381–394, 2013. University, Taiwan.
[41] M. Meurer, A. Konovaltsev, M. Cuntz, and C. Hättich, “Robust joint
multi-Antenna spoofing detection and attitude estimation using Direction
assisted multiple hypothese RAIM,” in Proceedings of the 25th Meeting
of the Satellite Division of the Institute of Navigation (ION GNSS+
2012), no. May 2016, 2012.
[42] F. Rothmaier, Y.-h. Chen, and S. Lo, “Improvements to Steady State
Spoof Detection with Experimental Validation using a Dual Polarization
Antenna,” in Proceedings of the 2019 International Technical Meeting
of The Institute of Navigation ION GNSS+, Miami, Florida, 2019.
[43] F. Rothmaier, “Optimal Sequential Spoof Detection based on Direction
of Arrival Measurements,” in Proceedings of the 2020 International
Technical Meeting of The Institute of Navigation ION GNSS+, St. Louis,
MO, 2020.
[44] A. Das and W. S. Geisler, “A method to integrate and classify normal
distributions,” 2020.
[45] M. J. Kochenderfer and T. A. Wheeler, Algorithms for Optimization,
1st ed. Cambridge, Massachusetts: The MIT Press, 2018. Sherman Lo is a senior research engineer at the
[46] D. Miralles, A. Bornot, P. Rouquette, N. Levigne, D. M. Akos, Y. H. Stanford GPS Laboratory. He received his Ph.D. in
Chen, S. Lo, and T. Walter, “An Assessment of GPS Spoofing Detection Aeronautics and Astronautics from Stanford Uni-
Via Radio Power and Signal Quality Monitoring for Aviation Safety versity in 2002. He has and continues to work on
Operations,” IEEE Intelligent Transportation Systems Magazine, vol. 12, navigation robustness and safety, often supporting
no. 3, pp. 136–146, 2020. the FAA. He has conducted research on Loran,
[47] S. Lo, Y.-H. Chen, F. Rothmaier, G. Zhang, and C. Lee, “Developing a alternative navigation, SBAS, ARAIM, GNSS for
Dual Polarization Antenna ( DPA ) for High Dynamic Applications,” in railways and automobile. He also works on spoof
Proceedings of the International Technical Meeting (ITM) of the Institute and interference mitigation for navigation. He has
of Navigation (ION) 2020, San Diego, CA, 2020. published over 100 research papers and articles.
[48] J. Blanch, T. Walter, and P. Enge, “Theoretical Results on the Optimal
Detection Statistics for Autonomous Integrity Monitoring,” Navigation,
Journal of the Institute of Navigation, vol. 64, no. 1, pp. 123–137, 2017.
[49] M. Joerger, F. C. Chan, and B. Pervan, “Solution separation versus
residual-based RAIM,” Navigation, Journal of the Institute of Naviga-
tion, vol. 61, no. 4, pp. 273–291, 2014.
[50] J. E. Angus, “RAIM with multiple faults,” Navigation, Journal of the
Institute of Navigation, 2006.
[51] P. Misra and P. Enge, Global Positioning System: Signals, Measure-
ments, and Performance; Revised Second Edition, 2nd ed. Lincoln,
Massachusetts: Ganga-Jamuna Press, 2011.
[52] S. Boyd and L. Vandenberghe, Introduction to Applied Linear Algebra. Todd Walter received his Ph.D. in Applied Physics
New York: Cambridge University Press, 2018. from Stanford University in 1993. He is a Research
[53] S. Russell and P. Norvig, Artificial Intelligence A Modern Approach Professor in the Department of Aeronautics and
Third Edition, 3rd ed. Prentice Hall, 2010. Astronautics at Stanford University. His research
[54] T. E. Humphreys, “Detection strategy for cryptographic gnss anti- focuses on implementing high-integrity air naviga-
spoofing,” IEEE Transactions on Aerospace and Electronic Systems, tion systems. He has received the ION Thurlow and
vol. 49, no. 2, pp. 1073–1090, 2013. Kepler awards. He is also a fellow of the ION and
[55] E. G. Manfredini, D. M. Akos, Y.-H. Chen, S. Lo, T. Walter, and P. Enge, has served as its president.
“Effective GPS Spoofing Detection Utilizing Metrics from Commercial
Receivers,” in Proceedings of the 2018 International Technical Meeting
of The Institute of Navigation, 2018, pp. 672–689.
[56] T. J. Bromwich, An Introduction To The Theory of Infinite Series, 1st ed.
London: Macmillan and Co., 1908.
[57] N. De Bruijn, Asymptotic Methods in Analysis. Courier Corporation,
1981.
0018-9251 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: BOURNEMOUTH UNIVERSITY. Downloaded on July 01,2021 at 10:51:00 UTC from IEEE Xplore. Restrictions apply.