YUAN Dingbo, LI Hong, WANG Fei, LU Mingquan. A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation[J]. Chinese Journal of Electronics, 2018, 27(1): 213-222. doi: 10.1049/cje.2017.11.001
Citation: YUAN Dingbo, LI Hong, WANG Fei, LU Mingquan. A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation[J]. Chinese Journal of Electronics, 2018, 27(1): 213-222. doi: 10.1049/cje.2017.11.001

A GNSS Acquisition Method with the Capability of Spoofing Detection and Mitigation

doi: 10.1049/cje.2017.11.001
Funds:  This work is supported by the National Natural Science Foundation of China (No.61571255), and the National Science and Technology Major Project of China (No.GFZX0303010801).
More Information
  • Corresponding author: LI Hong (corresponding author) was born in 1981. He is an associate professor in the Department of Electronic Engineering at Tsinghua University, Beijing, China. He received the B.S. degree (with honors) in electronic engineering and the secondary B.S. degree in business administration, both from Sichuan University, Chengdu, China, and both in 2004. In 2009, he received the Ph.D. degree (with honors) in electronic engineering from Tsinghua University, Beijing, China. His current interests include security of GNSS and signal processing. (Email:lihongee@tsinghua.edu.cn)
  • Received Date: 2015-01-26
  • Rev Recd Date: 2015-08-06
  • Publish Date: 2018-01-10
  • For Global navigation satellite system (GNSS), spoofing attack is extremely dangerous and destructive since it can lead GNSS receivers to generate misleading time and position information. Thus, reliable and timely spoofing detection and mitigation methods are of great importance. A new GNSS acquisition method with the capability of spoofing detection and mitigation is proposed in the paper. The proposed method can not only perform acquisition, but also detect and mitigate spoofing signals based on joint consistency detection of code and carrier Dopplers. We provide performance analysis and numerical simulation results to demonstrate the validity of the proposed method when there are one or even more spoofing signals. Successful acquisition probability of the authentic signal is compared to that achieved by traditional acquisition method. The proposed method can be easily implemented with only a little modification of current receiver acquisition module.
  • loading
  • U.S. Goverment, "Global positioning system", http://www.gps.gov, 2017-10-01.
    X. Chen, G. Lenzini, M. Martins, et al., "A trust framework for evaluating GNSS signal integrity", 2013 IEEE 26th Computer Security Foundations Symposium (CSF), pp.179-192, 2013.
    T.E. Humphreys, B.M. Ledvina, M.L. Psiaki, et al., "Assessing the spoofing threat:Development of a portable GPS civilian spoofer", Proceedings of the ION GNSS International Technical Meeting of the Satellite Division, Vol.5, pp.56-67, 2008.
    J.S. Warner and R.G. Johnston, "A simple demonstration that the global positioning system (GPS) is vulnerable to spoofing", Journal of Security Administration, Vol.25, No.2, pp.19-27, 2002.
    B.M. Ledvina, W. J. Bencze, B. Galusha, et al., "An in-line anti-spoofing device for legacy civil GPS receivers", Proceedings of the 2010 International Technical Meeting of the Institute of Navigation, pp.698-712, 2001.
    M. Nicola, L. Musumeci, M. Pini, et al., "Design of a GNSS spoofing device based on a GPS/Galileo software receiver for the development of robust countermeasures", Proceeding of European Navigation Conference (ENC 2010), pp.19-21, 2010.
    T.E. Humphreys, "GPS spoofing and the financial sector", http://radionavlab.ae.utexas.edu/publications/196-gpsspoofing-and-the-financial-sector, 2017-10-01.
    Z. Zhang, S. Gong, A.D. Dimitrovski, et al., "Time synchronization attack in smart grid:Impact and analysis", IEEE Transactions on Smart Grid, Vol.4, No.1, pp.87-98, 2013.
    D. Divis, "GPS spoofing experiment knocks ship off course", http://www.insidegnss.com/node/3659, 2013-07-31.
    A. Cavaleri, B. Motella, M. Pini, et al., "Detection of spoofed GPS signals at code and carrier tracking level", 20105th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), pp.1-6, 2010.
    E.D. Kaplan and C.J. Hegarty, Understanding GPS:Principles and Applications, Second Edition, Artech House, Boston, USA, 2005.
    D. Yuan, H. Li and M. Lu, "GNSS spoofing mitigation based on joint detection of code doppler and carrier doppler in acquisition", Proceedings of China Satellite Navigation Conference (CSNC), Vol.1, pp.763-774, 2014.
    G. McLachlan and T. Krishnan, The EM Algorithm and Extensions, John Wiley & Sons, New York, 2001.
    D.H. Ballard, "Generalizing the Hough transform to detect arbitrary shapes", Pattern Recognition, Vol.13, No.1, pp.111-122, 1981.
    S.M. Kay, Foundamentals of Statistic Signal Processing Volume Ⅱ:Detection Theory, First Edition, NJ, USA:Prentice Hall, 1993.
    B.W. Parkinson and J.J. Spilker, Global Positioning System:Theory and Applications, Vol.1, AIAA, Washington DC, 1996.
    M.A. Wong and T. Lane, "A kth nearest neighbour clustering procedure", in Computer Science and Statistics:Proceedings of the 13th Symposium on the Interface, pp.308-311, 1981.
    J. Proakis and M. Salehi, Fundamentals of communication systems, NJ, USA:Prentice Hall, 2005.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (212) PDF downloads(403) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint