| Literature DB >> 29734715 |
Yang Liu1, Sihai Li2, Qiangwen Fu3, Zhenbo Liu4.
Abstract
In the face of emerging Global Navigation Satellite System (GNSS) spoofing attacks, there is a need to give a comprehensive analysis on how the inertial navigation system (INS)/GNSS integrated navigation system responds to different kinds of spoofing attacks. A better understanding of the integrated navigation system’s behavior with spoofed GNSS measurements gives us valuable clues to develop effective spoofing defenses. This paper focuses on an impact assessment of GNSS spoofing attacks on the integrated navigation system Kalman filter’s error covariance, innovation sequence and inertial sensor bias estimation. A simple and straightforward measurement-level trajectory spoofing simulation framework is presented, serving as the basis for an impact assessment of both unsynchronized and synchronized spoofing attacks. Recommendations are given for spoofing detection and mitigation based on our findings in the impact assessment process.Entities:
Keywords: GNSS spoofing; impact assessment; integrated navigation system
Year: 2018 PMID: 29734715 PMCID: PMC5982992 DOI: 10.3390/s18051433
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Global Navigation Satellite System (GNSS) spoofing attack illustration.
Figure 2Standard Kalman filter implementation with spoofing attacks introduced.
Figure 3Simulated flight trajectory.
Inertial measurement unit (IMU) and GPS specifications [23].
| Sensor | Parameter | Value | Unit |
|---|---|---|---|
| IMU | Gyro bias | 0.01 | °/h |
| Gyro random walk | 0.005 |
| |
| Accelerometer bias | 100 | μg | |
| Accelerometer random walk | 20 |
| |
| GPS | Residual satellite clock and ephemeris errors | 0.5 | m |
| Residual ionosphere error (single-frequency) | 4.0 | m | |
| Residual troposphere error | 0.2 | m | |
| Tracking noise | 0.67 | m | |
| Short-range multipath error | 0.94 | m |
Note: all the specifications are root mean square (RMS) values.
Figure 4Error covariance matrix ()-indicated and true position errors under normal conditions and (a) 0.3 m/s synchronized spoofing attack; (b) 12.4 m/s synchronized spoofing attack.
The absolute and relative change of the square root of each diagonal element of .
| State | Absolute (Relative) | State | Absolute (Relative) | State | Absolute (Relative) |
|---|---|---|---|---|---|
|
| 3.43 × 10−6° (0.20%) |
| 4.40 × 10−6° (0.26%) |
| 1.06 × 10−5° (0.19%) |
|
| 1.52 × 10−6 m/s (0.01%) |
| 1.96 × 10−5 m/s (0.14%) |
| 8.63 × 10−7 m/s (0.02%) |
|
| 3.69 × 10−4 m (0.05%) |
| 1.02 × 10−5 m (0.002%) |
| 2.87 × 10−5 m (0.004%) |
|
| 1.59 × 10−5 °/h (0.11%) |
| 2.52 × 10−5 °/h (0.18%) |
| 7.72 × 10−6 °/h (0.03%) |
|
| 6.33 × 10−2 μg (0.29%) |
| 7.17 × 10−2 μg (0.35%) |
| 1.14 × 10−3 μg (0.07%) |
Note: absolute and relative represent the absolute change, , as defined in Equation (45), and relative change,, as defined in Equation (46), respectively.
Figure 5(a) Three dimensional Kalman filter innovations; (b) longitude channel Kalman filter innovations. (Sync) is short for synchronized and (Unsycn) is short for unsynchronized.
Figure 6(a) Inertial sensor bias estimation and misalignment angle under a 1 m/s synchronized spoofing attack; (b) horizontal position accuracy comparison between two pure INS modes.
A comparison between unsynchronized and synchronized spoofing attacks.
| Parameters | Unsynchronized Spoofing | Synchronized Spoofing | |
|---|---|---|---|
|
| Signal power |
|
|
| Signal delay | Arbitrarily determined for simulator attacks; generally, | ||
| Doppler | Consistent with the spoofer’s code phase variations | ||
| Visible satellites | Generally, | ||
| Data sequence | Same structure as | Same as | |
| Code sequence | Strictly the same as the authentic signals | ||
| Carrier frequency | Strictly the same as the authentic signals | ||
|
| Pseudorange | Arbitrarily determined | Matched with |
| Carrier phase | Consistent with code phase, hard to align with the authentic signals | ||
|
| Position | Arbitrarily determined | Matched with the authentic condition in the transition process, then determined arbitrarily by the spoofer |
| Velocity | Consistent with position | ||
| Time | Arbitrarily determined for simulator attacks; generally earlier than true time for meaconing attacks | ||
|
| Platform | Repeater | Advanced repeater |
| Requirements | Jam-and-spoof | Know the real-time position of the target receiver | |