Efficient spoofing identification using baseline vector information of multiple receivers |
| |
Authors: | Seong-Hun Seo author-information" >,Byung-Hyun Lee,Sung-Hyuck Im,Gyu-In Jee,Kwan-Sung Kim |
| |
Affiliation: | 1.Electronics Engineering,Konkuk University,Seoul,Republic of Korea;2.EW R&D Center, Hanwha Systems,Seongnam-si,Republic of Korea;3.Korea Aerospace Research Institute,Daejeon,Republic of Korea;4.Electronics Engineering,Konkuk University,Seoul,Republic of Korea;5.Agency for Defense Development,Deajeon,Republic of Korea |
| |
Abstract: | In a spoofing environment, a Global Navigation Satellite System (GNSS) receiver must employ anti-spoofing techniques for obtaining a normal navigation solution from the GNSS signal. We propose a new method for identifying spoofing signals using the norm of the difference of baseline vectors (NDB) obtained from multiple receivers. The main focuses of this research are to reduce the initial time required to identify the spoofing signal and to mitigate the physical constraints on multiple antennas placement. First, the multi-correlators of each receiver track both GNSS and spoofing signals simultaneously and classify them into two signal groups. Then, the baseline vectors are generated from the double-differenced carrier phase measurements of the classified signal groups, and the NDB is calculated. If the target positions of the spoofing signal groups are almost the same, the NDB has a fairly small value when the base position of the selected baseline vectors is calculated from one of the GNSS groups and the rover positions of the baseline vectors are calculated from each spoofing group of the multiple receivers. Using the NDB, a hypothesis is established, and a hypothesis test is conducted for identifying the spoofing signal. The performance of the proposed test statistics is analyzed with respect to the distance between the GPS antennas and the tuning parameter. Our experimental results show that the proposed method effectively performs spoofing identification with a short baseline. Additionally, the method exhibits a very low probability of fault detection and fast response time. This means that the immediate anti-spoofing can work properly in spoofing environments. |
| |
Keywords: | |
本文献已被 SpringerLink 等数据库收录! |
|