Spoofing Detection Algorithm Based on Pseudorange Differences

Intentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS). For spoofing interference, an anti-spoofing algorithm based on pseudorange differences for a single receiver is proposed, which can be used to detec...

Full description

Bibliographic Details
Main Authors: Ke Liu, Wenqi Wu, Zhijia Wu, Lei He, Kanghua Tang
Format: Article
Language:English
Published: MDPI AG 2018-09-01
Series:Sensors
Subjects:
Online Access:http://www.mdpi.com/1424-8220/18/10/3197
_version_ 1811298006187638784
author Ke Liu
Wenqi Wu
Zhijia Wu
Lei He
Kanghua Tang
author_facet Ke Liu
Wenqi Wu
Zhijia Wu
Lei He
Kanghua Tang
author_sort Ke Liu
collection DOAJ
description Intentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS). For spoofing interference, an anti-spoofing algorithm based on pseudorange differences for a single receiver is proposed, which can be used to detect simplistic and intermediate spoofing attacks, as well as meaconing attacks. Double-difference models using the pseudorange of two adjacent epochs are established followed by the application of Taylor expansion to the position relationship between the satellite and the receiver (or the spoofer). The authenticity of the signal can be verified by comparing the results of the proposed spoofing detection algorithm with the traditional least squares method. The results will differ when spoofing is present. The parameter setting of the proposed algorithm is introduced. The algorithm has the advantage of both simplicity and efficiency and needs only a single receiver and pseudorange data. A NovAtel receiver is adopted for the actual experiments. The Texas spoofing test battery (TEXBAT), as well as two other simulation experiments are used to verify the performance of the algorithm. The simulation results validate the feasibility and effectiveness of the algorithm.
first_indexed 2024-04-13T06:13:21Z
format Article
id doaj.art-61a10edfbdeb44c794b6ca31b71372b7
institution Directory Open Access Journal
issn 1424-8220
language English
last_indexed 2024-04-13T06:13:21Z
publishDate 2018-09-01
publisher MDPI AG
record_format Article
series Sensors
spelling doaj.art-61a10edfbdeb44c794b6ca31b71372b72022-12-22T02:58:56ZengMDPI AGSensors1424-82202018-09-011810319710.3390/s18103197s18103197Spoofing Detection Algorithm Based on Pseudorange DifferencesKe Liu0Wenqi Wu1Zhijia Wu2Lei He3Kanghua Tang4College of Artificial Intelligence, National University of Defense Technology, Changsha 410073, ChinaCollege of Artificial Intelligence, National University of Defense Technology, Changsha 410073, ChinaCollege of Artificial Intelligence, National University of Defense Technology, Changsha 410073, ChinaCollege of Systems Engineering, National University of Defense Technology, Changsha 410073, ChinaCollege of Artificial Intelligence, National University of Defense Technology, Changsha 410073, ChinaIntentional spoofing interference can cause damage to the navigation terminal and threaten the security of a global navigation satellite system (GNSS). For spoofing interference, an anti-spoofing algorithm based on pseudorange differences for a single receiver is proposed, which can be used to detect simplistic and intermediate spoofing attacks, as well as meaconing attacks. Double-difference models using the pseudorange of two adjacent epochs are established followed by the application of Taylor expansion to the position relationship between the satellite and the receiver (or the spoofer). The authenticity of the signal can be verified by comparing the results of the proposed spoofing detection algorithm with the traditional least squares method. The results will differ when spoofing is present. The parameter setting of the proposed algorithm is introduced. The algorithm has the advantage of both simplicity and efficiency and needs only a single receiver and pseudorange data. A NovAtel receiver is adopted for the actual experiments. The Texas spoofing test battery (TEXBAT), as well as two other simulation experiments are used to verify the performance of the algorithm. The simulation results validate the feasibility and effectiveness of the algorithm.http://www.mdpi.com/1424-8220/18/10/3197single receivermeaconing attacksimplistic attackintermediate attackanti-spoofing technologypseudorange difference
spellingShingle Ke Liu
Wenqi Wu
Zhijia Wu
Lei He
Kanghua Tang
Spoofing Detection Algorithm Based on Pseudorange Differences
Sensors
single receiver
meaconing attack
simplistic attack
intermediate attack
anti-spoofing technology
pseudorange difference
title Spoofing Detection Algorithm Based on Pseudorange Differences
title_full Spoofing Detection Algorithm Based on Pseudorange Differences
title_fullStr Spoofing Detection Algorithm Based on Pseudorange Differences
title_full_unstemmed Spoofing Detection Algorithm Based on Pseudorange Differences
title_short Spoofing Detection Algorithm Based on Pseudorange Differences
title_sort spoofing detection algorithm based on pseudorange differences
topic single receiver
meaconing attack
simplistic attack
intermediate attack
anti-spoofing technology
pseudorange difference
url http://www.mdpi.com/1424-8220/18/10/3197
work_keys_str_mv AT keliu spoofingdetectionalgorithmbasedonpseudorangedifferences
AT wenqiwu spoofingdetectionalgorithmbasedonpseudorangedifferences
AT zhijiawu spoofingdetectionalgorithmbasedonpseudorangedifferences
AT leihe spoofingdetectionalgorithmbasedonpseudorangedifferences
AT kanghuatang spoofingdetectionalgorithmbasedonpseudorangedifferences