Hostname: page-component-586b7cd67f-2plfb Total loading time: 0 Render date: 2024-11-25T18:59:06.888Z Has data issue: false hasContentIssue false

Detection of Intermediate Spoofing Attack on Global Navigation Satellite System Receiver Through Slope Based Metrics

Published online by Cambridge University Press:  03 April 2020

Abdul Malik Khan
Affiliation:
(National University of Sciences and Technology, Islamabad, Pakistan)
Naveed Iqbal
Affiliation:
(National University of Sciences and Technology, Islamabad, Pakistan)
Adnan Ahmed Khan*
Affiliation:
(National University of Sciences and Technology, Islamabad, Pakistan)
Muhammad Faisal Khan
Affiliation:
(National University of Sciences and Technology, Islamabad, Pakistan)
Attiq Ahmad
Affiliation:
(National University of Sciences and Technology, Islamabad, Pakistan)
*

Abstract

A spoofing attack on a global navigation satellite system (GNSS) receiver is a threat to a significant community of GNSS users due to the high stakes involved. This paper investigates the use of slope based metrics for the detection of spoofing. The formulation of slope based metrics involves monitoring correlators along with tracking correlators in the receiver's channel, which are slaved to the prompt tracking correlator. In this study, using some candidate metrics, detectors have been formed through the analysis of simulated spoofing attacks. A theoretical variance of each metric has also been calculated as a reference for the threshold. A threshold is estimated using the measured variance from the clean signals, for specific false alarm rate. By using the measured threshold, detectors are formed based on slope metrics. These detectors have been tested using TEXBAT data. The results show that the differential slope metrics have good performance. The results have also been compared with some other techniques of spoofing detection.

Type
Research Article
Copyright
Copyright © The Royal Institute of Navigation 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

REFERENCES

Ali, K., Manfredini, E. G. and Dovis, F. (2014). Vestigial Signal Defense Through Signal Quality Monitoring Techniques Based on Joint Use of Two Metrics. IEEE/ION PLANS 2014, Monterey, CA, 2014, pp. 1240–1247.CrossRefGoogle Scholar
Alonso-Arroyo, A., Querol, J., Lopez-Martinez, C., Zavorotny, V. U., Park, H., Pascual, D., Onrubia, R. and Camps, A. (2017). SNR and standard deviation of cGNSS-R and iGNSS-R scatterometric measurements. Sensors (Basel, Switzerland), 17(1), 183. http://doi.org/10.3390/s17010183CrossRefGoogle ScholarPubMed
Borre, K., Akos, D., Bertelsen, N., Rinder, P. and Jensen, S. H. (2006). A Software-Defined GPS and Galileo Receiver: Single-Frequency Approach. Boston, MA: Birkhäuser.Google Scholar
Cavaleri, A., Motella, B., Pini, M. and Fantino, M. (2010). Detection of Spoofed GPS Signals at Code and Carrier Tracking Level. 2010 5th ESA Workshop on Satellite Navigation Technologies and European Workshop on GNSS Signals and Signal Processing (NAVITEC), Dec. 2010.CrossRefGoogle Scholar
Gross, J. N., Kilic, C. and Humphreys, T. E. (2019). Maximum-likelihood power-distortion monitoring for GNSS-signal authentication. IEEE Transactions on Aerospace and Electronic Systems, 55(1), 469475.CrossRefGoogle Scholar
Huang, J., Lo Presti, L., Motella, B. and Pini, M. (2016). GNSS spoofing detection: theoretical analysis and performance of the Ratio Test metric in open sky. ICT Express, 2(1), 3740.CrossRefGoogle Scholar
Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O'Hanlon, B. W. and Kintner, P. M. (2008). Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proc. 21st International Technical Meeting of the Satellite Division of Institute of Navigation, Savannah, Ga, September 16–19, pp. 2314–2325.Google Scholar
Humphreys, T. E., Bhatti, J. A., Shepard, D. P. and Wesson, K. D. (2012). The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques. Proceedings of the 25th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2012), Nashville, TN, September 17–21, pp. 3569–3583.Google Scholar
Ioannides, R. T., Pany, T. and Gibbons, G. (2016). Known vulnerabilities of global navigation satellite systems, status, and potential mitigation techniques. Proceedings of the IEEE, 104(6).CrossRefGoogle Scholar
Irsigler, M. (2008). Multipath propagation, mitigation and monitoring in the light of Galileo and modernized GPS. Ph.D. dissertation, University of Federal Armed Forces, Munich, Germany.Google Scholar
Jafarnia-Jahromi, A., Broumandan, A., Nielsen, J. and Lachapelle, G. (2012). GPS vulnerability to spoofing threats and a review of antispoofing techniques. International Journal of Navigation and Observation, 2012, 16 pages. Article ID 127072.CrossRefGoogle Scholar
Juang, J. C. (2009). Analysis of global navigation satellite system position deviation under spoofing. IET Radar, Sonar & Navigation, 3(1), pp. 17.CrossRefGoogle Scholar
Kaplan, E. D. and Hegarty, C. J. (ed) (2005). Understanding GPS: Principles and Applications. 2nd ed.Boston/London: Artech House, 2005.Google Scholar
Khan, A. M., Iqbal, N. and Khan, M. F. (2018). Synthetic GNSS spoofing data generation using field recorded signals. MethodsX, 5, 12721280.CrossRefGoogle ScholarPubMed
Lemmenes, A., Corbell, P. and Gunawardena, S. (2016). Detailed Analysis of the TEXBAT Datasets Using a High Fidelity Software GPS Receiver. Proceedings of the 29th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS + 2016), Portland, OR, September 2016.CrossRefGoogle Scholar
Mitelman, A. M., Phelts, E., Akos, D. M., Pullen, S. P. and Enge, P. K. (2000). A Real-Time Signal Quality Monitor for GPS Augmentation Systems. Proceedings of the 13th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GPS 2000), Salt Lake City, UT, September 19–22, 2000, pp. 862–871.Google Scholar
Phelts, R. E., Walter, T. and Enge, P. (2003). Toward Real-Time SQM for WAAS: Improved Detection Techniques. ION GPS/GNSS 2003, 9–12 September 2003, Portland, OR.Google Scholar
Pirsiavash, A., Broumandan, A. and Lachapelle, G. (2017). Performance Evaluation of Signal Quality Monitoring Techniques for GNSS Multipath Detection and Mitigation. International Technical Symposium on Navigation and Timing (ITSNT) 2017, ENAC, Toulouse, France, Nov14–17, 2017.Google Scholar
Psiaki, M. L. and Humphreys, T. E. (2016). GNSS spoofing and detection. Proceedings of the IEEE, 104(6), 12581270.CrossRefGoogle Scholar
Townsend, B. and Fenton, P. (1994). A Practical Approach to the Reduction of Pseudorange Multipath Errors in a L1 GPS Receiver. Proceedings of the 7th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION-GPS 94, September 20–23, 1994, Salt Lake City, Utah, pp. 143148.Google Scholar
Wang, F., Li, H. and Lu, M. Q. (2017). GNSS spoofing detection and mitigation based on maximum likelihood estimation. Sensors, 17(7), 1532; https://doi.org/10.3390/s17071532.CrossRefGoogle ScholarPubMed
Wesson, K. D., Shepard, D. P., Bhatti, J. A. and Humphreys, T. E. (2011). An Evaluation of the Vestigial Signal Defense for Civil GPS Anti-Spoofing. Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2011), Portland, OR, September 2011, pp. 2646–2656.Google Scholar
Wesson, K. D., Gross, J. N., Humphreys, T. E. and Evans, B. L. (2018). GNSS signal authentication via power and distortion monitoring. IEEE Transactions on Aerospace and Electronic Systems, 54(2), 739754.CrossRefGoogle Scholar