A Network-Based GNSS Structural Interference Detection, Classification and Source Localization
A Network-Based GNSS Structural Interference Detection, Classification and Source Localization
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 1/12
technique to the case of two closely spaced antenna one or several base stations. The essence of this method is
elements in Psiaki et al (2014). Spatial null-steering using that CAV receives simultaneous measurements from
antenna arrays is another countermeasure method against nearby receivers and detects a spoofing attack, classifies
spoofing signals and it can effectively discard spoofing authentic and spoofing signals and localizes the spoofer
and other types of interference (Daneshmand et al 2011, source. After spoofing detection, the proposed anti-
2012). spoofing architecture commences to classify the spoofing
and authentic signals. It should be noted that in contrary
Although the aforementioned methods can effectively
to the jammer case, the spoofing signal power is more or
counter specific spoofing scenarios, limited work has
less in the same range as that of the authentic signals. This
been reported toward proposing an anti-spoofing receiver
is justified as the spoofer can be easily recognized if the
structure that detects spoofing attacks, neutralizes them
spoofing signal power exceeds a certain threshold.
and provides a reliable position and navigation solution.
Therefore, in many cases, spoofing and authentic signals
Broumandan et al (2014) have proposed a robust anti-
should be detectable by a target receiver. However, in the
spoofing receiver architecture for moving GNSS
case of high power spoofing signals where the spoofing
receivers. The proposed architecture enables a stand-alone
signals mask the authentic ones, if a target receiver is
receiver to detect a spoofing attack, discriminate and
equipped with enough digital-to-analog bit resolution, the
classify the spoofing PRNs from the authentic ones and
proposed method of Broumandan et al (2014) can be used
eventually remove the spoofing signals from the digitized
to mitigate the high-power spoofing signals and retrieve
samples. Jafarnia et al (2015) has proposed a method
the authentic PRNs. Almost all of the proposed
using two spatially separated commercial receivers to
spoofing/authentic signal classification methods rely on
classify the spoofing and authentic signals. It has been
the single-source spoofing assumption. This means that
shown that spoofing/authentic signal classification is a
all of the spoofing PRNs are transmitted from a single
function of the antenna separation (baseline) length and
direction. Thus the spoofing signals are highly correlated
ordination.
in the spatial domain whereas authentic signals arrive
Work on spoofing detection and mitigation methods is from different angles. Montgomery et al (2009),
mainly designed to cancel out a spoofing attack based on McDowell (2007), Broumandan et al (2012) and Jafarnia
a stand-alone GNSS receiver. However, in many et al (2014) have proposed different methods relying on
applications there may be a communication link between spatial processing to discriminate authentic and spoofing
different receivers operating in the vicinity of each other, signals. Herein, an approach based on the carrier phase
or a GNSS receiver may communicate with one or several variation proposed by Jafarnia et al (2014) is used to
receiver base stations. This is similar to the network RTK classify the signals. It can be shown that the double
system architecture or Internet of things concept. The idea difference carrier phase observations in the spoofing case
of alleviation of spoofing attacks based on processing for a short baseline (about a km) are time-invariant,
several GNSS receiver observations has discussed in whereas in the case of authentic signals due to satellites
some recent research work; Swaszek and Hartnett (2014) motion the relative phase difference between antennas
have proposed a spoofing detection method utilizing varies with time. This is regardless of user or spoofer
commercial off the shelf GNSS receivers, by comparing motion. Hence, double difference carrier phase
the position solutions from multiple receivers located on observations over time is a mean to discriminate between
the same platform. The spoofing detection metric works spoofing and authentic signals. Thus, the CAV unit
based on the fact that the existence of a spoofer would monitors the phase difference among different receivers
make the statistical relationship of the observed positions for different PRNs to detect and classify the
different than it is during normal, non-spoofed operation. spoofing/authentic signals.
Heng et al (2014) introduces a signal authentication
After authentic/spoofing signal classification, CAV
architecture based on a network of cooperative GNSS
places the measurements in two groups, namely authentic
receivers. A receiver in the network correlates its received
and spoofing. The genuine location and time of each
military code with those received by other receivers so as
receiver can be determined using the measurements in the
to detect spoofing attacks. Scott (2010) has proposed a
authentic group. Hence, the receivers position, time as
jammer source localization based on crowdsourcing
well as the receiver clock biases can be extracted. The
approaches using a multitude of opportunistic cell phone
position solution of the spoofing signals provides fake
based Automatic Gain Control (AGC) gain observations.
position results that are almost the same for all receivers
This paper proposes a network-based anti-spoofing affected by the spoofing propagation. This is due to the
receiver architecture that uses spatially distributed fact that all PRNs received by a receiver are sharing the
receivers connected to a Central Authenticity Verification same propagation channel, hence the distance of a
(CAV) unit. This might be the case of driverless car receiver from the spoofer source does not change the
navigation systems where each car transmits navigation spoofing position solution. However, the clock bias
measurements to the CAV unit; or a network of estimate extracted from the spoofing signals is a function
distributed high precision receivers communicating with of the receiver-spoofer Euclidean distance and is used to
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 2/12
localize the spoofer source. In the following, different a spoofing attack in which case the spoofing detection
components of the proposed authenticity verification and method sets a spoofing flag. In the proposed architecture
spoofer localization unit is provided. after detecting a spoofing attack the receiver reports it to
the CAV unit. It is also possible that CAV detects a
spoofing attack based on analyzing the received
SPOOFING DETECTION
measurements from different receivers. In the case of a
The spoofing detection procedure can be performed at
spoofing attack, the CAV unit notifies other receivers
the receiver level where a stand-alone receiver detects a
operating in the affected area. Spoofing detection
spoofing attack, or in the network level where a CAV unit
reliability can be increased by incorporating several
detects the spoofing occurrence based on observations
reports from different receivers. After detecting all visible
from different receivers. Among different receiver-based
signals (both spoofing and authentic) which are above the
spoofing detection techniques, Automatic Gain Control
acquisition threshold, all the detected authentic and
(AGC) gain level or Analog-to-Digital Converter (ADC)
spoofing signals are tracked and the measurements are
samples variance monitoring (Akos 2012), and
sent to the CAV unit.
acquisition level spoofing detection can be named.
Jafarnia et al (2014) introduced a low complexity and
efficient spoofing detection technique based on a SPOOFING/AUTHENTIC CLASSIFICATION
structural power analysis of digitized samples. This After spoofing detection and reception of all
method monitors the total structural signal power content measurements (including the authentic and spoofing
of the received signals and detects the spoofing attack if signals) from spatially distributed receivers, the CAV unit
the total signal content exceeds a pre-defined threshold. In classifies authentic and spoofing PRNs. This part of the
the single-antenna spoofing attack, since the propagation research focuses on measurement classification for
distances from a spoofer to target receivers are common multiple carrier phase GNSS receivers operating in a
among all the PRNs, different spoofed receivers placed at limited region. Here it is assumed that the spoofer
different locations provide almost the same position and transmits all the PRNs from a single source. Hence, all of
velocity solutions. This can be a mean to detect a the transmitted signals have the same spatial signature.
spoofing attack at the network level. A network-based The carrier phase observation at the ith antenna for the lth
spoofing detection method may be implemented based on PRN signal can be written as (Misra & Enge 2006)
monitoring the position and velocity solutions of several
receivers and detect a spoofing attack based on the
correlation among the position and velocity solutions of
il k li k c tl k T i k
(1)
Nli I li k Trli k wi k
different receivers. l
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 3/12
mi , j t d aTi , j c m t linear model where Bm,l is considered as a nuisance
cos m t sin m t
parameter. A Generalized Likelihood Ratio Test (GLRT)
(3) detector selects H1 if (Kay 1998)
c m cos m t cos m t . T x m,l
sin m t
A A
1
A HT H 1 AT
T
b b (7)
ai,j represents the pointing vector from the i to the j th th
m ,l
m ,l
receiver in the ENU coordinate system, and cm is the 2
pointing vector towards the source of the mth PRN signal.
where m,l HT H HT xm,l is the maximum likelihood
1
m(t) and m(t) refer to the elevation and azimuth angles
of the mth PRN source. d is the spacing between these two estimate (MLE) of m ,l under H1 and is the detection
receivers. The double difference of the carrier phase
threshold. 2 is the variance of the noise process vector
measurements can be written as
which is assumed to be constant during the observation
im, ,jl im, j li , j mi , ,jl Nmi , ,jl wi , j interval. The asymptotic detection performance of this
m ,l (4) detector can be written as
Therefore, Equation 4 in the spoofing scenarios becomes squared distribution with non-centrality parameter of
and q degrees of freedom. Q21 represents the inverse
time invariant and this does not depend on the receiver
dynamics or relative clock drifts of receivers. However, q
for the case of authentic signals, Equation 5 does not hold of the tail probability of a central chi-squared distribution
since these signals are transmitted from different angles with q degrees of freedom. Herein, q=1 which is equal to
and their angles of arrival vary independently from each the number of rows in the matrix A. In this process, in
other. Therefore, spoofed PRNs can be distinguished from case that T xm,l exceeds the detection threshold at least
authentic ones based on the double difference of the
carrier phase measurements of two or more spatially one of the mth or lth PRN signals can be considered as
separated antennas. The carrier phase double differences authentic. If the test statistic does not exceed the detection
of spoofed PRNs have a zero-slope temporal variation threshold within the observation interval, both PRNs
whereas for the case of authentic signals a non-zero slope could be considered as potential spoofing signals.
is visible in the carrier phase double differences. This fact Considering observations of several receivers are
is the basis for authentic and spoofing PRN classification. available, the spoofing and authentic classification
The proposed classification method is an extension of that procedure can be modified to enhance the detection
proposed by Jafarnia et al (2015). Considering carrier procedure. Considering M carrier phase measurements
phase observations of two receivers, the authenticity from M spatially separated receivers, there will be
verification problem can be written as the following K M ! (M 2)!2! double difference observations and
hypotheses: test statistics to perform classification. This K
observations can be combined in different ways to make
H0 : xm,l n im, ,jl nTs Bm,l wm,l n the final decision. For instance one can weigh the
(6) individual double difference measurements based on the
H1 : xm,l n im, ,jl nTs Am,l n Bm,l wm,l n length of the baseline between the two antennas.
Considering a weighting vector W [w1 , w2 ,..., wK ] , the
where H 0 and H1 correspond to the absence and final test statistics to be compared with a defined
presence of authentic signals respectively. Ts is threshold can be shown as
observation interval and n represents the sample index.
Am,l and Bm,l represent the slope and bias of 1 K
im, ,jl nTs . w n is the discrete noise component.
T xm,l wk Tk xm,l (9)
K k 1
Herein, Am,l and Bm,l are the unknown parameters of the
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 4/12
Authentic
SV.3
Authentic
SV.2 Authentic
SV.4
Authentic
SV.1
Central
Authenticity
Verification RX5
RX4
su5
Communication
P5
Link P4 su4
Ps
su3 Spoofer
su2 su1
RX3
P3
P2 RX2
P1 RX1
In this paper, an equal gain combiner with W [1,1,...,1] ith receiver, a simplified model can be written as (Jafarnia
is used to provide a final decision. et al 2013)
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 5/12
the clock bias of the ith receiver and it can be observed If the attack is detected, the receiver halts normal
from the authentic position solution corresponding to this operation and then synchronizes measurements with a
receiver. Therefore, having access to the clock bias trusted time such as a network time and transmits all the
measurements from the spoofing group provides the measurements to the CAV unit.
possibility to observe the geometric range between the Synchronization with a trusted time source is required
spoofing source and the ith receiver with an uncertainty since the spoofing attack may manipulate the receiver
term ( dTs ) which is common for all the receivers in the timing and disrupt the classification procedure. Herein, it
network. In other words, the difference between clock is assumed that the network time is accurate within a few
bias terms for authentic and spoofed PRNs can provide a microseconds, otherwise dTs which can be generally a
user-spoofer pseudorange measurement. Having this time varying term, might not be the same for all receivers
information along with a good geometry of different in the network. Upon reception of different measurements
receivers in the network, the position of the spoofing from affected receivers, CAV classifies spoofing and
source can be determined. Figure 2 shows the flow authentic signals based on several carrier phase
diagram of the proposed spoofing detection, classification observations. After successful authentication process, the
and source localization. Initially GNSS receivers (Rxn CAV unit sends the authentic and spoofing classification
shown in Figure 2) start operating in the normal mode results to each receiver. In this case each affected receiver
which means providing PVT solutions for a specific can detect the spoofing PRNs, mitigate them and start
application. The receiver-based spoofing detection unit in normal operation. Then, as discussed before, the CAV
a pre-defined interval checks for a spoofing attack. unit estimates the location of the spoofer based on the
authentic and spoofing PVT solutions.
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 6/12
solutions. Multipath propagation affects the proposed EXPERIMENTAL RESULTS
spoofing localization method in two ways. First, it Testing an anti-spoofing algorithm in a real case is
degrades the authentic position solution of each receiver. challenging since outdoor radio transmission in the GNSS
This issue has been extensively discussed and frequency bands is not allowed. Therefore, considerations
characterized in the literature (e.g. Irsigler & Eissfeller to avoid this limitation have to be taken into account. The
2003, Townsend et al 1995). Secondly, multipath experimental measurements are based on the reception of
propagation affects the spoofing source localization GPS L1 C/A signals. This section provides experimental
problem through distorting the pseudorange results of spoofing detection, authentic/spoofing
measurements from the spoofer source to individual classification and spoofing source localization.
receivers. The multipath error in the first part is a function
of the wireless channel between the authentic satellites Data collection setup
and individual receivers. However, the multipath error in This section describes the test method used to evaluate the
the second part is a function of the spoofer and each performance of the proposed method. Real data was
receiver propagation environment and it is independent of collected in the presence of authentic and spoofing
the first part. It should be noted that the position and signals. To this end a three channel front-end was used to
velocity solutions of the spoofed measurements are not capture IF samples with a 10 MHz sampling rate. Three
severely affected by multipath propagation. This is due to NovAtel 702 GG antennas were used to collect authentic
the fact that multipath affects all the PRNs almost the GPS signals. Figure 3 shows the data collection scenario
same way and hence the multipath error will be observed and the environment where three spatially separated
in the spoofed clock bias. Therefore, the multipath rooftop antennas were used to collect the authentic signals
propagation only affects the clock bias estimate, which is which were then combined with spoofing signals. The
a function of the spoofer to each receiver distance and is accurate locations of the antennas were known. Rodhe &
the desired measurement to localize the spoofer source. Schwarz SMBV100A hardware simulator signals were
Utilizing different multipath reduction techniques such as used as a spoofing source. The signals were fed to a
Sokhandan et als (2015) can help to reduce the multipath splitter with different cables (L1, L2 and L3 shown in
effect as well. It is important to note that for a terrestrial Figure 3) connected to the antennas and then combined
spoofing source the wireless channel will follow the with the authentic signals. The main difference between
terrestrial channel model which is prone to be more this collection setup and an actual spoofing attack is that
affected by multipath and fading as compared to the in the latter case, the signals propagated from the spoofer
satellite-receiver propagation channel (Parsons 2000). to each antenna would be subject to wireless channel
distortions such as multipath, blockage and refraction.
Hence, the channel model in the present case can be
Receivers time synchronization considered as an additive white Gaussian noise (AWGN).
Herein, the distance (range) from the spoofer to each
Another important factor affecting the performance of the antenna is equivalent to the cable lengths. Hence, the
spoofer source localization is the synchronization pseudorange estimation problem in this case reduces to
accuracy among different receivers. Here, it is assumed cable length estimation.
that each receiver after the PVT solution is synchronized The combined spoofing and authentic signals after down-
with GPS time. The synchronization accuracy is a conversion from the L1 centre frequency to an
function of the receiver hardware and software intermediate frequency were sampled by the front-end.
components such as oscillator, tracking and navigation The digitized samples were then passed to a software
architecture. The timing accuracy of a GNSS receiver receiver to provide measurements and PVT solutions. In
performing clock steering can be as good as 20 ns all tests the hardware simulator generated 8 PRNs. A non-
assuming continuous tracking (e.g. NovAtel 2015). aligned spoofing scenario was considered in these tests
where the correlation peaks of the spoofing and authentic
signals do not overlap. This assumption is justified since
Geometry of the receivers if a spoofing source causes an aligned spoofing attack for
one receiver, its signals will be non-aligned for other
Another important factor affecting the spoofing source receivers (this depends on the distance among receivers
localization is the geometry of the receivers with respect and on the GNSS signal structure). Figure 4 shows the sky
to the spoofer source. This indeed depends on the plot of available GPS signals during the test. In the
application. The effect of geometry on the accuracy of the dataset, PRNs 4, 7, 11, 13, 17, 19, 28, and 30 correspond
navigation solution is discussed broadly in the literature to the authentic signals and PRNs 1, 12, 16, 23, 25, 29,
(e.g. Kaplan 2006) and hence will not be considered here. 31, 32 correspond to the spoofing signals.
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 7/12
The lengths of the cables (L1, L2 and L3 in Figure 2) are
designed such that the estimated ranges between the
spoofer and receivers converge to a valid virtual position
solution. As discussed before, it is important for an
effective spoofer to slightly overpower the authentic
L3 Combiner Ch3 signals power level and at the same time not to
significantly affect the input AGC gain of the target
receiver. To this end, two data sets were collected. The
L2 Combiner Ch2 Frontend first data set was intended to adjust the spoofing and
authentic signals power levels to provide a realistic
spoofing scenario and to evaluate the performance of
Combiner Ch1 different spoofing detection metrics. In this data set the
power of the simulator was changed to find the proper
power level for spoofing transmission. In the second data
Hardware L1 set, the performance of the spoofing/authentic
Simulator classification and spoofing source localization was
evaluated. In all the test scenarios the receiver tracked all
the authentic and spoofing signals in PLL assisted DLL
Authentic signals mode where the DLL bandwidth was reduced to 0.1 Hz.
10
Noise Floor [dB]
0
-20 -15 -10 -5 0 5 10
15
SPA Metric
10
5
-20 -15 -10 -5 0 5 10
# of Detected PRNs
20
18
16
14
12
10
-20 -15 -10 -5 0 5 10
Spoofing to Authentic Average Power Ratio [dB]
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 8/12
This is due to the fact that the power of the received
spoofing signal is less than that of the authentic ones. 55
PN4
When the spoofing power becomes comparable with that 50 PN5
CN (dB-Hz)
of the authentic signal the noise floor increases rapidly. PN11
The middle plot in Figure 5 is the SPA metric as a 45 PN13
PN17
0
function of the SAR. It is observed that the SPA metric 40 PN19
gradually increases after about 100 s (20 dB gain in SAR) PN28
from the start of the data set. This metric exceeds the 35 PN30
0 50 100 150 200 250 300 350
detection threshold after the SPA exceeds 3 dB, which Time (s)
shows the excessive amount of structural signal power in 55
the received data set. The SPA metric does not use any PN1
knowledge of the AGC gain, therefore this metric is 50 PN12
CN (dB-Hz)
PN16
useful in cases when only digital samples are available. PN23
45
As described before, one can detect a spoofing attack by PN25
0
monitoring the total number of detectable signals and set a 40 PN29
PN31
spoofing flag. The bottom plot of Figure 5 is the total PN32
35
number of acquired signals as a function of the spoofing 0 50 100 150 200 250 300
to authentic signal power. In this experiment the Time (s)
acquisition sensitivity was 38 dB-Hz for a 5 ms coherent Figure 6: C/N0 values of the authentic and spoofing
integration time. Here the spoofing detection threshold is signals
14 detectable peaks, which means that if there are more
than 14 detectable signals the spoofing flag will be set.
This method can detect the spoofing attack much faster As mentioned before the carrier phase double difference
than the earlier methods and when the SAR value exceeds observations over a time period has a slope for authentic
-8 dB spoofing flag is set. As shown in the lower plot, by PRNs whereas this observations has a zero slope for the
increasing the spoofing power, the total number of spoofing signals. The test statistics for spoofing
detectable signals is reduced. This is due to the fact that as classification was given in Equation 7. In the case of more
the spoofing propagation power increases, it jams the than two receivers providing these observations the
authentic signals and affects their detectability. As shown proposed method of Jafarnia et al (2014) has been
in Figure 5 up and middle plots, spoofing detection modified to accommodate all the observations as shown
methods detect a spoofing event when the spoofer power in Equation 9. Figure 7 and Figure 8 show the carrier
is a bit higher than that of the authentic signals. The noise phase single and double differences for different authentic
floor monitoring method requires a calibration data (clean signals over 150 seconds of observation. Figure 8 also
data) to set the threshold value. On the contrary, the SPA shows the spoofing signals double difference plots. In
and the acquisition based spoofing detection methods do these figures the mean value of single and double
not need any calibration data and can detect both low difference measurements are removed in order to provide
power and high power spoofing scenarios. Thus, an easier comparison. Since both spoofer and authentic
incorporating several spoofing detection techniques in the signals were stationary during the observation intervals, a
spoofing detection block, the spoofing detection reliability single difference test can be used to classify spoofing and
will be increased and a wide range of spoofing signals authentic signals utilizing a single clock source. As shown
power levels can be detected. in Figure 7 the single difference magnitude is higher for
single differences between Ant 1 and Ant 3 ( 1,3 ) as
Authentic/Spoofing classification compared to 1,2 and 2,3 cases. This is due to the
This part describes the practical results of fact that the baseline between Ant1 and Ant3 is longer
authentic/spoofing classification based on carrier phase than the other cases. As discussed before and shown in
observations In the second data set, the power level of Equation 3, a longer baseline facilitates and enhances the
spoofing signals is adjusted such that both the authentic classification performance. Another important observation
and spoofing signals are detectable after combining. from Figure 7 is that the single difference observations for
Hence, the software receiver could track both the different pairs, namely Ant1-Ant2, Ant1-Ant3 and Ant2-
authentic and spoofing signals. Figure 6 shows the C/N0 Ant3 do not follow the same pattern. For instance, the
variations of the authentic and spoofing signals over time single difference of PRNs 7, 13, 30 in the 1,2 case
for the first antenna. (shown in Figure 7a) are almost overlaid and have the
same variation during the observation interval. This
makes the double difference test statistics between these
PRNs almost zero mean, which results in false
classification. However, considering the single difference
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 9/12
curves of PRNs 7, 13, 30 for the 1,3 ,
2,3 configurations shown in Figure 7b and Figure 7c, a) Single Difference An1-Ant 2
0.5
one can observe that the plots corresponding to these
1,2 (cycles)
PRNs are not overlaid and thus their carrier phase double
differences are not zero mean. Hence, incorporating
0
various double difference pairs will significantly reduce
the time and enhance the performance of the
spoofing/authentic classification. Figure 8 shows double -0.5
difference plots for the authentic and spoofing cases. 0 50 100 150
b) Single Difference An1-Ant 3
Curves in green correspond to the authentic signals while 0.5
spoofing double difference observations are shown in PRN-07
1,3 (cycles)
black. The green curves demonstrate a linear temporal PRN-11
variation while the black curves are constant as a function PRN-13
0
of time. This trend is the main feature that is used for the PRN-19
authentic and spoofing PRNs classification. Considering PRN-28
the results of Figure 8 it seems that some of the green PRN-30
lines have very small linear temporal variations. This is -0.5
0 50 100 150
because the single difference of those PRNs, for instance c) Single Difference An2-Ant 3
0.5
PRNs 7, 13, 30 in the Ant1-Ant2 case are highly
2,3 (cycles)
correlated in time. However, utilizing spatial diversity and
considering more double difference pairs in the
0
classification problem, the performance of the proposed
method can be significantly improved. After incorporating
all the pairs in the decision metric the combined test
-0.5
statistics for all pairs enter in the final stage of signal 0 50 Time (s) 100 150
classification. This stage employs graph theory to enhance
the performance of the spoofing/authentic classification Figure 7: Single difference carrier phase
module (Jafarnia et al 2015). Table 1 shows the authentic measurements for different antenna pairs
spoofing classification after 30 s of observation. The false a) Double Difference An1-Ant 2
alarm probability for authenticity verification was set to 1
1,2 (cycles)
-0.5
classification the signals in the authentic group were
tracked utilizing a modified software receiver to estimate -1
0 50 100 150
the actual location of each receiver and synchronize the Time (s)
receivers with GPS time. The position solutions of the c) Double Difference Ant2-Ant3
authentic signals for various receivers in the horizontal 1
2,3 (cycles)
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 10/12
Horizontal position of the antennas
10
Table 1: Spoofing authentic classification results
Classification Result in 30 s
Signal
PRN Ant1- Ant1- Ant2- Combined
type
Ant2 Ant3 Ant3
1 S S S S S
5
4 A A A A A
7 A A A A A
North (m)
11 A S A A A Estimated Ant1
12 S S S S S Estimated Ant2
13 A A A A A Estimated Ant3
0
16 S S S S S Actual Ant1
17 A A A A A Actual Ant2
19 A A A A A Actual Ant3
23 S S S S S Estimated Spoofer
25 S S S S S True spoofer
28 A S A S A -5
-15 -10 -5 0 5
29 S S S S S East (m)
30 A A A A A Figure 9: Receivers position solution
31 S S S S S
32 S S A S S
CONCLUSIONS
The position estimate rms errors for the three receivers are
The network based GNSS anti-spoofing architecture
tabulated in Table 2.
introduced herein has shown that spoofing signals
Table 2: Estimated position rms error
generated from a single point source can be effectively
East (m) North (m) Up (m)
detected using different metrics, namely AGC level,
Ant1 0.7 0.6 1.5 structural power content and acquisition level analyses.
Ant2 0.5 0.3 2.4 The acquisition level spoofing detection can effectively
Ant3 0.7 0.6 2 detect the presence of a spoofing attack in matched power
Spoofer 2.6 1.2 - spoofing propagation whereas the AGC level analysis and
The position and velocity solutions of the signals in the SPA methods are more reliable in overpowered spoofing
spoofing group result in the same estimates for all the propagation. Spoofing and authentic signals classification
three receivers. However, the clock bias measurements of was implemented by utilizing a test statistics based on
the signals in the spoofing group include the clock bias of carrier phase double-differences between two receivers.
the spoofer plus the cable lengths. Since the clock bias of The experimental results show that the reliability and
the spoofing source is common among all the clock bias performance of the classification module can be enhanced
measurements, the single difference between clock bias by incorporating several double-difference observations
measurements cancels the spoofer clock bias corresponding to the different receivers in the network.
contributions and the remaining term is the cable length The solution of the spoofing source location problem was
difference between receivers. Herein, since all receivers based on measuring the clock bias measurements of
are in the same plane, the 2-D spoofer position was signals in the spoofing group. The experimental results
considered. Figure 9 also shows the position solution of demonstrated the applicability of the proposed method in
the spoofing source based on the measured cable lengths a real-world test scenario.
and estimated position of each receiver at given time. The
rms error values of the positions of the spoofer source are
tabulated in Table 2. It should be noted that the REFERENCES
pseudorange measurement results for spoofing source
localization in this specific test scenario are not affected Akos, D. M. (2012) Whos Afraid of the Spoofer?
by multipath propagation since signals from the spoofer GPS/GNSS Spoofing Detection via Automatic Gain
source travelled in the cables. In real cases, the multipath Control (AGC), in Jounral of Navigation, vol. 59, No. 4,
propagated from a terrestrial source could affect the Winter, Institute of Navigation, pp. 281-290
measurements accuracy and consequently affect the
spoofing source localization performance. Broumandan, A., A. Jafarnia and G. Lachapelle
(2014) Spoofing Detection, Classification and
Cancellation (SDCC) Receiver Architecture for a Moving
GNSS Receiver, GPS Solutions, published online 23
September, DOI 10.1007/s10291-014-0407-3, 13 pages.
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 11/12
Broumandan, A., A. Jafarnia, V. Dehghanian, J. Kay, S. M. (1998) Fundamentals of Statistical Signal
Nielsen, and G. Lachapelle (2012) GNSS Spoofing Processing: Detection Theory, Prentice-Hall Inc.
Detection in Handheld Receivers Based on Signal Spatial
McDowell, C.E. (2007) GPS Spoofer and Repeater
Correlation, in Proceedings of IEEE/ION PLANS 2012,
Mitigation System using Digital Spatial Nulling US
April 24-26, Myrtle Beach, South Carolina , pp. 479-487
Patent 7250903 B1, 7 pages
Daneshmand, S., A. Jafarnia, A. Broumandan and G.
Misra, P., and P. Enge (2006) Global Positioning
Lachapelle (2011) A Low Complexity GNSS Spoofing
System: Signals, Measurments, and Performance, Ganga-
Mitigation Technique Using a Double Antenna Array
Jamuna Press, 2nd Edition
GPS World magazine, December, vol 22, no 12, pp. 44-
46 Montgomery, P.Y., T.E. Humphreys, and B.M.
Ledvina (2009) Receiver-Autonomous Spoofing
Daneshmand, S., A. Jafarnia, A. Broumandan and G.
Detection: Experimental Results of a Multi-antenna
Lachapelle (2012) A Low-Complexity GPS Anti-
Receiver Defense Against a Portable Civil GPS Spoofer
Spoofing Method Using a Multi-Antenna Array in
in Proceedings of ION ITM 2009, Jan 26-28, Anaheim,
Proceedings of the 25th International Technical Meeting
CA, pp. 124-130
of The Satellite Division of the Institute of Navigation
(ION GNSS 2012), 17-21 September, Nashville TN, 11 Nielsen, J., A. Broumandan, and G. Lachapelle
pages (2011) GNSS Spoofing Detection for Single Antenna
Handheld Receivers in Journal of Navigation, vol 58, no
Heng, L., D. B. Work, G. X. Gao (2014) GPS
4, Winter, pp. 335-344
Signal Authentication From Cooperative Peers IEEE
TRANSACTIONS ON INTELLIGENT NovAtel Inc (2015) OEM638 receivers
TRANSPORTATION SYSTEMS, http://www.novatel.com/assets/Documents/Papers/OEM6
0.1109/TITS.2014.2372000, 12 pages 38-PS-D17916.pdf, last accessed May 28, 2015
Humphreys, T. E., B. M. Ledvina, M. L. Psiaki, B. Psiaki, M. L., S. P. Powell, and B. W. OHanlon
W. O'Hanlon, and P. M. Kintner (2008) Assessing the (2013) GNSS Spoofing Detection using High-Frequency
Spoofing Threat: Development of a Portable GPS Civilian Antenna Motion and Carrier-Phase Data in Proceedings
Spoofer,in Proceedings of ION GNSS 21st. International of the 26th International Technical Meeting of The
Technical Meeting of the Satellite Division, September Satellite Division of the Institute of Navigation (ION
16-19, Savannah, GA, pp. 2314-2325 GNSS+ 2013), 16-20 September, Nashville, TN, pp. 2949
2991.
Irsigler, M. and B. Eissfeller (2003) Comparison of
multipath mitigation techniques with consideration of Psiaki, M.L., B.W. O'Hanlon, S.P. Powell, J.A.
future signal structures, in Proceedings of the 16th Bhatti, K.D. Wesson, T.E. Humphreys, and A. Schofield
International Technical Meeting of the Satellite Division (2014) GNSS Spoofing Detection using Two-Antenna
of the Institute of Navigation, 9-12 September, Portland Differential Carrier Phase, Proc. ION GNSS+ 2014,
OR, USA Sept. 9-12, Tampa, FL, pp. 2776-2800.
Jafarnia, A., S. Daneshmand, A. Broumandan, J. Parsons, J. D. (2000) The Mobile Radio Propagation
Nielsen and G. Lachapelle (2013) PVT Solution Channel, John Wiley & Sons LTD, 2nd ed.
Authentication Based on Monitoring the Clock State for a
Moving GNSS Receiver in the European Navigation Scott, L. (2010) J911:Fast Jammer Detection and
Location Using Cell-phone Crowd-Sourcing GPS World
Conference (ENC2013), April 23-25, Vienna, Austria, 11
November.
pages
Swaszek, P. F. and R. J. Hartnett (2014) A Multiple
Jafarnia, A., A. Broumandan, S. Daneshmand, N.
COTS Receiver GNSS Spoof Detector Extensions
Sokhandan and G. Lachapelle (2014) A Double Antenna
Approach toward Detection, Classification and Mitigation Proceedings of the 2014 International Technical Meeting
of GNSS Structural Interference, Proceedings of of The Institute of Navigation, January 27-29, 2014, San
Diego, CA.
NAVITEC 2014, Noordwijk, Netherlands, 3-5 Dec, 8
pages. Townsend, B., D. J. R. van Nee, P. Fenton, and K.
Van Dierendonck (1995) Performance evaluation of the
Kaplan, E. D. and C. J. Hegarty (2006),
multipath estimating delay lock loop, Navigation Journal
Understanding GPS Principles and Applications, Artech
House, Boston, London, 2nd edition of the Institute of Navigation, 42(3), 503-514
ION GNSS + 2015 Conference, Session F2, Tampa, FL, Sept 14-18 2015 12/12