Next Article in Journal
Epileptic Disorder Detection of Seizures Using EEG Signals
Previous Article in Journal
Research on Nonlinear Compensation of the MEMS Gyroscope under Tiny Angular Velocity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A New GNSS Spoofing Signal Power Control Algorithm for Receiver Sensors in Acquisition Phase and Subsequent Control

1
State Key Laboratory of Geo-Information Engineering, Xi’an 710054, China
2
College of Geospatial Information, PLA Strategic Support Force Information Engineering University, Zhengzhou 450001, China
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(17), 6588; https://doi.org/10.3390/s22176588
Submission received: 27 July 2022 / Revised: 25 August 2022 / Accepted: 29 August 2022 / Published: 31 August 2022
(This article belongs to the Section Navigation and Positioning)

Abstract

:
Satellite navigation spoofing technology has become a hotspot of interference technology research because of its significant threat and high concealment. In a spoofing scenario, suppressive interference is typically used to ensure that the target receiver sensor is in the unlocked and reacquisition state, and then spoofing is implemented. This method has a high feasibility, and the power of the spoofing signal affects the concealment and efficiency of spoofing. Currently, there is limited research involving the GNSS spoofing signal power control. Moreover, there is no systematic complete power control scheme, most of which is limited to qualitative or simulation, and the actual application effect is still unclear. Therefore, a new GNSS spoofing signal power control algorithm under the power constraints of the receiver sensor in the acquisition phase and the subsequent control is proposed. The experimental platform is designed to prove that compared with the conventional spoofing signal high power control algorithm, the new GNSS spoofing signal power control algorithm shortens Doppler frequency fluctuation time by 72.2% and reduces the range by 75.9%. The carrier-to-noise ratio of the received signal is less than the threshold of the receiver sensor, and the range of three-dimensional coordinates of Earth-Centered, Earth-Fixed (ECEF) is significantly reduced during the spoofing signal taking over receiver sensor, this shows that the new design of the GNSS spoofing signal power control algorithm can make spoofing behavior more hidden, and it will make it more difficult for the target receiver sensor to detect spoofing behavior. The designed algorithm can take over the receiver sensor stealthily with the help of suppressing interference and then pull the bias positioning results, which has good feasibility and effectiveness.

1. Introduction

As the application of the satellite navigation system has penetrated into all aspects of social life and military applications, the navigation terminal may receive incorrect timing and positioning results owing to spoofing signals, which may lead to catastrophic consequences. Spoofing may gradually become a severe threat to satellite navigation systems [1]. Since the US Transportation Department first raised concerns regarding spoofing in satellite navigation in 2001, spoofing has been attracting increasing attention from several countries, especially the military, and has gradually become a hotspot in satellite navigation interference technology research [2].
Spoofing refers to the interference technology, wherein the interference source generates a spoofing signal that is highly similar to the authentic satellite navigation signal or forwards the authentic signal, causing the target receiver sensor to misinterpret the spoofing signal as the authentic satellite navigation signal for acquiring and tracking, which results in the receiver sensor outputting error messages or without information. Spoofing is more destructive and threatening than other forms of interference [3].
Regardless of whether the spoofing is spoofing on a target receiver in the signal acquisition phase or the tracking phase, the control of the spoofing signal power is an important problem to be studied. When a receiver is in the acquisition phase, the spoofing signal can effectively spoof the receiver by generating multiple false correlation peaks and increasing the noise floor [4]. During the signal acquisition phase, the receiver searches within the two-dimensional space of the Doppler shift and the code phase, and calculates the signal parameters at the highest correlation peak above the priori decision threshold [5]. A spoofing signal produces a higher power correlation peak in the search domain by generating a higher power signal. At this time, a receiver is easily locked at the peak of the spoofing signal, thereby affecting the positioning result of the receiver [6].
In an actual scenario, it is better to use the method of suppressing interference to make receiver lose lock, and then implement the method of spoofing [7]. When the receiver is in cold start or loss lock and reacquisition (loss of lock caused by natural environment or suppressed interference), a spoofing signal present in the environment may be and acquired by the receiver. The method of entering the receiver through the acquisition phase is simple and effective. However, for a receiver with a certain spoofing detection capability, after it is successfully pulled into the spoofing signal, to effectively implement persistent spoofing, it is necessary to control the power without being noticed by the receiver. For example, in a normal environment, the noise floor of the receiver is relatively stable; however, when a spoofing signal invades, there is a cross-correlation interference between the spoofing signal and authentic signal, and the noise floor is raised. When the noise floor is raised to a certain extent, authentic signals may be submerged in the noise [8]. If the power of spoofing signal is extremely high, it is easy for the target receiver to detect an abnormality and other navigation devices are used, and effective spoofing cannot be achieved [4]. Therefore, it is of immense importance to explore the implementation of spoofing and the subsequent power control problems for receivers in the acquisition phase.
Some scholars conducted research on the necessary conditions for successful spoofing. In 2014, Ma et al. discussed the effective implementation of spoofing, which requires a 5 dB jamming-to-signal ratio to ensure that the receiver acquires the spoofing signal during the acquisition phase [9]. In 2015, Hu and others adjusted the spoofing power in real time, while realizing the traction of the receiver acquisition loop, noise floor was limited to 3 dB, and the maximum spoofing signal-to-noise ratio was limited to 22 dB, thereby achieving a continuous effective spoofing [10]. In 2016, Pang et al. categorized spoofing into acquisition phase and tracking phase, it is believed that in the acquisition phase, if receiver has not locked signal, spoofing can be successfully implemented as long as the spoofing signal power is greater than the authentic signal power [11].
Additionally, avoiding spoofing detection is also a problem that needs to be studied [12]. In 2012, Ali jafarnia jahromi believed that because spoofing signals can raise the noise floor of the receiver, the receiver can detect and identify spoofing signals more effectively by measuring the absolute power of correlation peak than by monitoring technology. In 2013, Lv and others proposed that in the signal acquisition process, if the peak of the spoofing signal and authentic signal exceeds 1.5 chips, the correlation function will have multi-peak characteristics [13]. In 2014, Daniel P. Shepard et al. used the Monte Carlo experiments to verify that the carrier frequency difference is extremely large in the process of acquiring the spoofing signal and authentic signal under the specific receiver phase locked loop parameter setting, causing the receiver to loss of lock [14]. Some scholars also studied the implementation methods of spoofing. In 2018, Sheng and others studied spoofing algorithm, through theoretical analysis, it was confirmed that for the acquisition phase, the algorithm of suppressing and spoofing needs to be adopted [15].
There are also some spoofing detection methods, such as the method of measuring the total signal energy based on spoofing signal and authentic signal proposed by Hu et al. [16]. However, when the phase difference and Doppler frequency difference between the spoofing signal and authentic signal are small, the spoofing detection performance deteriorates, and for multipath signals, the spoofing detection performance also deteriorates. Oligeri et al. used the unencrypted IRIDIUM Ring Alert (IRA) message broadcast by IRIDIUM satellite to detect spoofing [17]. Pini et al. proposed a low complexity strategy for detecting intermediate spoofing attacks based on Neyman Pearson theory [18]. Chen et al. proposed a spoofing detection method using two antennas, which can detect a single spoofing signal or spoofing signals from multiple directions. However, for dynamic scenes, the spoofing detection value is unstable [19]. Obviously, any spoofing detection technology is difficult to detect all spoofing methods, and our research focuses on the design of spoofing signal power to avoid the related power detection techniques as much as possible. Navigation security, or GNSS security, like renewable energy, has attracted more and more attention [20,21].
Currently, there is limited research involving GNSS spoofing signal power control, and there is no systematic complete power control scheme, most of which is limited to qualitative or simulation, and the actual application effect is still unclear. It is of immense importance to explore the implementation of spoofing and the subsequent power control problems for receivers in the acquisition phase.
With regard to the application of the algorithm, we need to explain that in the application of the actual spoofer, when it is difficult for the spoofer to obtain the accurate position of target receiver, it is usually used to jamming first to make the receiver lose lock and then implement spoofing. In order to maintain the concealment of spoofing, the power control of spoofing signal is a key issue at this time. Under this background, we propose a spoofing signal power control strategy under the receiver power constraint for the receiver and subsequent control in the acquisition stage. On the one hand, the algorithm can make the spoofer successfully cheat the receiver, on the other hand, the power value of the spoofing signal can be kept as hidden as possible.
A new GNSS spoofing signal power control algorithm for receiver power constraints in the acquisition phase receiver and subsequent control is proposed in this research. The designed experimental platform proves that the designed algorithm can conceal itself, take over receiver and subsequently pull positioning results with the aid of suppression interference. Furthermore, it provides a power control algorithm for suppressing post-spoofing and has a high applicability.

2. Effect of Spoofing Signals on Acquisition

2.1. Noise Floor Estimation

When the target receiver receives both spoofing signal and authentic signal, the complex signal model can be expressed as [10]:
r ( n T s ) = h = J a P h a D h a ( n T s τ h a ) c h a ( n T s τ h a ) e j φ h a + j 2 π f h a n T s + m = J s P m s D m s ( n T s τ m s ) c m s ( n T s τ m s ) e j φ m s + j 2 π f m s n T s + η ( n T s )
where subscripts h and m represent the received authentic satellite signals and spoofing signals, respectively, J a and J s are the set of authentic and spoofing signals, respectively, and the superscripts a and s represent the received authentic satellite signals and spoofing signals, respectively. T s is the sampling interval, P is the power of received signal, c is the pseudorandom noise (PRN) code sequence, D is the navigation message, φ , f, and τ are the carrier phase of received signal, carrier frequency Doppler shift, and code phase delay, and η ( n T s ) is an additive white Gaussian noise with a mean of zero and a variance of σ n 2 .
The coherent integrated output value of the lth signal can be expressed as:
u l f ~ l , τ ~ l , k = 1 N n = ( k 1 ) N + 1 k N r ( n T s ) c l ( n T s τ ~ l ) e j 2 π f ~ l n T s
where f ~ l , τ ~ l represent the estimated Doppler shift and code phase delay, respectively, and k represents the number of integration interval related outputs.
Referring to Gaussian Sum Theory [22], the σ ^ 2 calculated using the averaging method can be expressed as:
σ ^ 2 = 1 2 h = J a P h a var ψ h l a f ~ l , τ ~ l , k + m = J s P m s var ψ m l s f ~ l , τ ~ l , k + var η ¯ k
The noise estimator comprises three parts: ① related interference generated by authentic signal; ② related interference generated by spoofing signal; ③ related interference generated by Gaussian noise. ψ h l a f ~ l , τ ~ l , k and ψ m l s f ~ l , τ ~ l , k represent the parameters of one channel authentic and one channel spoofing signal with the local code and carrier, respectively. Because this is a complex signal, both contain I and Q branches that are orthogonal to each other, and both the I and Q branches are subject to a zero-mean Gaussian distribution. Then, ψ h l a f ~ l , τ ~ l , k is represented by a two-dimensional covariance matrix with the I and Q branches as random variables [23]:
ψ h l a f ~ l , τ ~ l , k N 0 0 , σ ¯ ψ , n o r m a l i z a t i o n 2 0 0 σ ¯ ψ , n o r m a l i z a t i o n 2 σ ¯ ψ , n o r m a l i z a t i o n 2 = σ ¯ ψ 2 / max σ ¯ ψ , n o r m a l i z a t i o n 2 σ ¯ ψ 2
The cross-correlation variance σ ¯ ψ , n o r m a l i z a t i o n 2 of the normalized spreading codes of the I and Q branches is statistically averaged as 0.00033. ψ m l s f ~ l , τ ~ l , k obeys the same distribution.
The correlation value generated by noise is still a zero-mean Gaussian noise, and η ¯ [ k ] can be expressed by the same distribution as
η ¯ [ k ] N 0 0 , σ n 2 N 1 0 0 1
Then, the noise variance estimate can be expressed as [10]:
σ ^ 2 = N 0 2 N T s + h = J a P h a + m = J s P m s σ ¯ ψ , n o r m a l i z a t i o n 2 σ ¯ ψ , n o r m a l i z a t i o n 2 = σ ¯ ψ 2 / max σ ¯ ψ , n o r m a l i z a t i o n 2 σ ¯ ψ 2
Therefore, the noise variance estimation value is related to the ambient noise power N 0 , coherent integration time T c = N T s , variance σ ¯ ψ , n o r m a l i z a t i o n 2 of the I/Q branch normalized spreading code, total power of each spoofing signal m = J s P m s , and total power h = J a P h a of each channel. In Equation (12), we normalized σ ^ 2 to obtain the estimated noise variance. We add a flow chart for the acquisition and tracking loop structure used in this research to make the derivation in Section 2.1 and Section 2.2 more clear.
As shown in Figure 1, the correlation results i E , i P , i L , q E , q P and q L are coherent integrated to output coherent integration values I E , I P , I L , Q E , Q P and Q L . Then, after envelope detection and incoherent integration, the coherent integral values I P and Q P on the prompt branch are used as inputs to the PLL discriminator, and the coherent integral values of the other two related branches are used as inputs to the DLL discriminator. Finally, the DLL and the PLL filter the respective discrimination results, and adjust the output of code NCO and carrier NCO according to the filtering results, so that the locally output carrier and code are consistent with the received signal.
Figure 2 shows the relationship between the total power of spoofing signal and estimation of the noise floor of receiver when T c = 5   ms , T c = 10   ms , T c = 20   ms are used. Figure 2 shows that with the increase of the total power of the spoofing signal, noise floor estimation also increases and gradually exceeds total power of authentic signal.

2.2. Acquisition Performance Analysis

Receiver’s acquisition search for a Global Navigation Satellite System (GNSS) signal is a signal search performed in a two-dimensional space consisting of frequency and time.
According to the signal detection theory [24], in the presence and absence of satellite signals, the non-coherent integral amplitude V is χ 2 distribution and Rayleigh distribution, respectively. When a satellite signal exists and the number of non-coherent integrations N n c is 1, the number of non-coherent integralion means that the receiving channel generates a pair of coherent integration results every other coherent integration time, and the number of incoherent integration results in each search unit is the number of incoherent integrals. The detection amount V of the satellite signal obeys the non-central χ 2 distribution, and the detection probability P d is:
P d ( V ) = D t V σ n 2 e V 2 + P l 2 σ n 2 I 0 V P l σ n 2 d V   ,   ( V > 0 )
Here, I 0 · is a zero-order first-order modified Bessel function, 2 σ n 2 is the noise power, and P l is the power after the coherent integration of the l th signal. D t is the detection threshold, and the above formula can be expressed as follows by pre check signal-to-noise SNR (where SNR is the dimensionless ratio) [25]:
P d = D t V σ n 2 e V 2 2 σ n 2 + S N R I 0 V 2 · S N R σ n d V   ,   ( V > 0 )
In fact, Equations (7) and (8) are equivalent, but the calculation methods are different. When satellite signal does not exist, the detection metric V presents Rayleigh distribution, and the false alarm rate P f a corresponding to the threshold V t is expressed as:
P f a = V t v σ n 2 e v 2 2 σ n 2 d v
For multi-channel spoofing signals and authentic signals, in order to detect correctly, all detection units should not appear as afalse alarm. Therefore, considering that detection units are independent of each other, the total false alarm probability P f a t o t a l is defined as:
P f a t o t a l = 1 ( 1 P f a ) N c
N c is the number of search units contained in the two-dimensional search range. The number of search units means that the area surrounded by the frequency indeterminate interval and the code phase indeterminate interval constitutes a two-dimensional search range for a received signal. The intersection of each code band and each frequency band is called a search unit. The number of search units means the number of search units within the above search range. Then the detection threshold V t is calculated from the total false alarm rate P f a t o t a l of signal acquisition as follows [25]:
V t 2 = 2 σ 2 ln 1 ( 1 P f a t o t a l ) 1 N c
The total power of spoofing signal and authentic signal are defined as T S P = 10 lg ( m = J s P m s ) and T A P = 10 lg ( h = J a P h a ) , respectively. The signal-to-noise ratio of power P m s and P h a of each spoofing signal and noise variance estimation σ ^ 2 are expressed as S N R i s and S N R i a , respectively [10]:
S N R i s = P m s 2 σ ^ 2   ,   S N R i a = P h a 2 σ ^ 2
In the above formula, let σ n = 1 (normalized). The conditional probability that GNSS signal is detected by target receiver and signal is a spoofing signal is used as the basis for spoofing signal acquisition performance [26], so that authentic signal and spoofing signal detection probabilities of the i th channel are P d , i a and P d , i s , respectively. This conditional probability is called the relative acquisition probability P i of spoofing signal:
P i = P d , i s P d , i s + P d , i a
Each branch spoofing signal satisfies the high acquisition performance while being constrained by noise floor and relative acquisition probability. Figure 3 shows the relationship between total power of spoofing signal and the probability of signal acquisition.
Figure 3 shows that when total power of spoofing signal increases from −170 dBW to –159 dBW, the acquisition probability of the spoofing signal increases from 0.86 to 1, the relative acquisition probability of the spoofing signal increases from 0.46 to 0.5, and the authentic signal acquisition probability is always 1. When total power of spoofing signal increases from −159 dBW to −143 dBW, the acquisition probability of spoofing signal, relative acquisition probability of the spoofing signal and acquisition probability of the authentic signal remain unchanged. When total power of spoofing signal increases from −143 dBW to −135 dBW, acquisition probability of the spoofing signal is always 1, while the acquisition probability of the authentic signal decreases from 1 to 0, and relative acquisition probability of spoofing signal increases from 0.5 to 1.
When the total power of spoofing signal is −170 dBW, because authentic signal is the default value −158 dBW, the acquisition probability of spoofing signal can be calculated as 0.86 according to Equation (7). However, it should be noted that this does not mean that the receiver is easier to acquire spoofing signal, because the acquisition probability of authentic signal is 1 and the relative acquisition probability of the spoofing signal is about 0.44. Therefore, we believe that the receiver still preferentially captures authentic signal, that is to say, it still depends on the relative acquisition probability of the spoofing signal. In Figure 3, because authentic signal is the default value −158 dBW, when the ‘Total Spoofing Power’ is −175 dbW, the power of the authentic signal is −158 dBW.

2.3. Signal Power Transmission Loss Model

According to the free-space propagation theory of satellite signals [27], if the transmit power of the spoofing signal transmitted by the spoofing device is P T (unit: dBW ), the gain of the transmitting antenna in a certain direction is G T , and the corresponding gain of the target receiver of the receiving antenna at R is G R , λ is the signal wavelength, d is the spatial distance between the spoofer and receiver, and the power of spoofing signal received by receiving antenna is P R . The link power budget equation expressed in decibels is:
P R = P T + G T + G R + 20 lg λ 4 π d
where 20 lg λ 4 π d is the free space propagation loss, and signal received power, P R reflects the absolute strength of signal.
In the process of the spoofing, the power needs to be adjusted in real time according to the relative position change of the spoofer and target receiver, such that the signal power received by receiver is maintained within a certain range.

2.4. Relationship between Satellite Elevation Angle and Received Signal Power

The satellite signal strength received by receiver has a significant relationship with satellite elevation angle [27]. Therefore, for the spoofer that transmits the multi-channel spoofing signal, it is necessary to consider the influence of the satellite elevation angle on the power distribution of the spoofing signal. For some intermediate spoofing devices that receive authentic satellite signals to reconstruct spoofing signal, the elevation angle information of the simulated authentic satellite signals must be obtained according to the ephemeris received in real time, and the generated spoofing signals must consider the satellite elevation angle inside. The relationship between the satellite elevation angle and the power of spoofing signal applicable to this research is discussed below.
As illustrated in Figure 4, the ground receiver is located at R, the satellite is located at S, the spatial distance between the satellite and receiver is d, the Earth’s center is O, the Earth’s radius is R e , α is the angle between SR and SO, and θ is the angle between SR and RO. By applying the sine theorem to the triangle ORS in above figure, we obtain:
R e sin α = d sin ( 180 ° α θ 90 ° )
Then, the signal propagation distance d can be expressed as:
d = R e cos ( α + θ ) sin α
As the free space propagation loss obtained by Equation (14) is 20 lg λ 4 π d , the relationship between the satellite elevation angle and received signal power of the receiver is:
P R = P T + G T + G R + 20 lg λ sin α 4 π R e cos ( α + θ )
For the subsequent analysis, the above formula can be simplified as:
P R k 1 + k 2 cos ( α + θ )
where k 1 and k 2 represent coefficients. Therefore, it can be considered that the lower the satellite elevation angle, the smaller the corresponding satellite signal power received by receiver, and the specific quantization expression is defined in Equation (17).
It is shown in Section 2.1 and Section 2.2 that for the multi-channel spoofing signal model, if the power of spoofing signal is increased without restriction, the noise floor of the receiver will increase, which may be alerted by the power or noise floor monitoring function of some commercial receivers and may also reduce the probability of spoofing signal acquisition and interference efficiency. Therefore, the following gives the optimization algorithm of power allocation of each spoofing signal.

3. GNSS Spoofing Signal Power Control Algorithm

3.1. Constraint Analysis

In a spoofing scenario, the variance σ ¯ ψ 2 of the general ambient noise power N 0 , coherent integration time T c = N T s , and I/Q branch normalized spreading code remains unchanged. For spoofer, total power h = J a P h a of each channel is uncontrollable. Only spoofing signal P m s and total power m = J s P m s are designed to satisfy the following basic conditions: ① The maximum signal-to-noise ratio S N R m a x s of each branch spoofing signal is lower than the receiver signal-to-noise ratio detection threshold S N R t h r e s (or the maximum signal-to-noise ratio S N R m a x a of authentic satellite signal); ② the minimum signal-to-noise ratio S N R m i n s of each branch spoofing signal is higher than the average signal-to-noise ratio S N R a v e a of the authentic satellite signal; ③ the power of the spoofing signal of each branch corresponding satellite elevation angle matching; ④ if the target receiver is dynamic, spoofing signal power should be adjusted according to the signal power transmission loss model; ⑤ the relative acquisition probability of each spoofing signal satisfies P i > 0.5 . When the single-channel spoofing signal is relatively close to the probability of acquisition P i > 0.5 , the ability of the spoofing signal to be preferentially acquired is explained. The 5th constraint here means that we usually think that when the single-channel spoofing signal is relatively close to the probability of acquisition P i > 0.5 , it indicates that for the receiver, the acquisition probability of spoofing signal is greater than the acquisition probability of authentic signal, so the spoofing signal will be acquired preferentially, which is also a condition for successful spoofing.
The above constraint formula is expressed as:
S N R m a x s < S N R t h r e s S N R m i n s > S N R a v e a P m s k 1 + k 2 cos ( α + θ ) P m s = P T + G T + G R + 20 lg λ / ( 4 π d ) P i > 0.5

3.2. Building the Objective Function

Under the premise of satisfying the above constraints, the following three points should be optimized: ① the noise variance estimation σ ^ 2 should be minimum; ② the relative acquisition probability of each branch spoofing signal should be optimal; ③ the overall acquisition performance of the multi-channel spoofing signal achieved should be excellent. The overall acquisition performance of the multi-channel signal is represented by the sum of the relative acquisition performance of each spoofing signal: i = 1 n P i . Therefore, the objective function can be defined as:
F σ ^ 2 = N 0 2 N T s + h = J a P h a + m = J s P m s σ ¯ ψ 2 F P t = P d , i s P d , i s + P d , i a F P t o t a l = i = 1 n P i
where F σ ^ 2 , F P t , and F t o t a l represent three objective functions, respectively, to minimize F σ ^ 2 , F P t and F t o t a l reach the maximum.

3.3. Power Allocation Optimization Algorithm

The multi-objective optimization algorithm of sequential quadratic programming (SQP) is used to determine the power of each spoofing signal. SQP algorithm is an algorithm that converts the nonlinear constrained optimization problem into a relatively simple quadratic programming problem, and the quadratic programming problem is an optimization problem in which the objective function is a quadratic function, and the constraint function is a linear function. The specific process of the power allocation optimization algorithm based on SQP is as follows: F σ ^ 2 , F P t , F t o t a l in the above formula are taken as the objective function, and the expected values of the objective function are F σ ^ 2 = 0 , F P t = 1 , F t o t a l = N , respectively, N indicating the number of spoofing signals. The weight of each expected value is set as: W F σ ^ 2 = 0 , W F P t = 1 , W F t o t a l = N . Under the constraint condition in Equation (19), the smaller the values of F σ ^ 2 , F P t , F t o t a l , the better spoofing signal power allocation scheme is proved.

4. Experimental Verification

The experimental platform is setup as depicted in Figure 5. It comprises GNSS signal simulator, host computer control software, test receiver, and connection feeder. GNSS signal simulator is used as an authentic signal and spoofing signal generating device. The host computer control software controls the code offset (unit: m), carrier phase offset (unit: m), and code rate (unit: m/s) of each spoofing signal relative to the authentic signal and carrier phase rate (unit: m/s), and relative power gain (unit: dB), power increase/decrease rate (unit: dB/s) by writing instructions. In addition, the Space Vehicle Identification (SVID), number of satellites, and signal power value of authentic signal and spoofing signal can be selected initially. The experiment uses the PolaRx5 receiver of Septentrio as the target receiver, which has advanced interference monitoring and anti-interference ability.
The following two groups of experiments are designed to compare the spoofing effect of the newly designed GNSS spoofing signal power control algorithm and spoofing signal high power control algorithm on a test receiver. In experiment 1, the high-power control algorithm was performed for the spoofing signal, and in experiment 2, the new power control algorithm was performed for the spoofing signal. In the two groups of experiments, except the GNSS spoofing signal power control algorithm, the other experimental conditions were the same.

4.1. Experiment on High Power Control Algorithm of Spoofing Signal

In experiment 1, high power control algorithm was used for spoofing signal. The design experimental procedure is as follows: ① First, PolaRx5 receiver is cold-started to ensure that the receiver is in the state of signal loss-locking after the receiver is suppressed for a long duration by the signal; ② after cold start, signal simulator is used to generate 6 channels of L1 authentic signals and 6 channels of same SVID spoofing signals, each branch spoofing signal has an initial code phase offset of 500 m and an initial carrier phase offset of 500 m with respect to the authentic signal, the spoofing signal is consistent with code rate and carrier phase rate of the authentic signal, compared with authentic signal, the power advantage of spoofing signal is 8 dB, all signals are simultaneously injected into receiver from the connected feeder to simulate the spoofing of the receiver in the signal acquisition phase. The process lasts for 3 min; ③ after 3 min, the other parameters of each spoofing signal are kept unchanged, only the code rate is adjusted to 1 m / s and the carrier phase rate is adjusted to 1 m/s, which increases code phase and carrier phase by a fixed slope. The duration of this process is 3 min. After 246 s, the experimental key instruction design is depicted in Figure 6.
In Figure 6, “OFFSET” indicates the code phase offset, carrier phase offset, relative power gain relative to authentic signal, command start time, and duration time; “RAMP” indicates the initial code phase offset, initial carrier phase offset, initial relative power gain, code rate and carrier phase rate, power increase/decrease rate, relative to authentic signal, and command start time and duration time.
The following analyzes the changes of Doppler frequency, carrier-to-noise ratio, and Earth-Centered, Earth-Fixed (ECEF) of the receiver in the test process.
The ground truth in ECEF has been set, the reference position in ECEF is −1,445,000 m in the X-axis direction, 6,150,000 m in the Y-axis direction, 180,000 m in the Z-axis direction. The ECEF coordinate given in this experiment is the positioning error vector subject to the reference position.
The statistical results of Doppler frequency range (difference between maximum and minimum), maximum C / N 0 , minimum C / N 0 and average C / N 0 of six signals received by test receiver are shown in Table 1.
Figure 7 and Figure 8 show the change of Doppler frequency with time of the six signals received by test receiver. During the period of 4–184 s, spoofing signal and authentic signal affect receiver at the same time, and Doppler frequency of six signals fluctuates. According to the statistics during 0–200 s, the range of Doppler frequency is 87,900 Hz. During 184–200 s, code rate and carrier phase rate of spoofing signals change, and Doppler frequency of signals remains stable.
Figure 9 and Figure 10 show the change of C / N 0 of the six signals received by test receiver with time. During the period of 0–200 s, C / N 0 changes smoothly. The maximum C / N 0 of SVID18, SVID30 and SVID31 signals are not less than the threshold C / N 0 of the receiver for 45 dB/Hz, then the received signal C / N 0 is not less than the threshold C / N 0 of the receiver, this will make it easy for the power monitoring technology of the receiver to detect the spoofing signal.
Figure 11 shows the change of ECEF coordinate positioning results with time. During the period of 4–184 s, the spoofing signal and authentic signal affect the receiver at the same time. The range of ECEF three-dimensional coordinates is 12,260 m, 104,200 m and 10,180 m, respectively. The high-power spoofing signal causes a large fluctuation in the positioning results of receiver. During the period of 184–200 s, the corresponding spoofing signal begins to pull the positioning result stage, and the positioning result of the receiver is gradually pulled. The range of three-dimensional coordinates of ECEF is 213.5 m, 1848 m and 93.45 m, respectively, so the positioning result of the receiver has changed greatly.
In the experiment, we have explained in the designed experimental steps. In order to verify that the receiver in the state of lost lock recapture and cold start is spoofed, after the cold start of receiver, spoofing signal and authentic signal are injected into receiver at the same time. Because the code rate and carrier phase rate of spoofing signal are changed, if the receiver is controlled by spoofing signal, The positioning result of receiver will change. Because the positioning result of the receiver is constantly biased in the experiment, we can judge that the receiver is controlled by spoofing signal, but the high-power spoofing signal is not hidden enough.

4.2. Experiment of New GNSS Spoofing Signal Power Control Algorithm

In experiment 2, a new power control algorithm is performed for the spoofing signal. The design experimental procedure is as follows: ① First, the PolaRx5 receiver is cold-started to ensure that receiver is in the state of signal loss-locking after the receiver is suppressed for a long duration by the signal; ② after a cold start, a signal simulator is used to generate 6 channels of L1 authentic signals and 6 channels of same SVID spoofing signals, each branch spoofing signal has an initial code phase offset of 500 m and an initial carrier phase offset of 500 m with respect to the authentic signal, the spoofing signal is consistent with the code rate and carrier phase rate of the authentic signal, the power of spoofing signal relative to the authentic signal is set according to the power allocation optimization algorithm, all signals are simultaneously injected into the receiver from the connected feeder to simulate the spoofing of receiver in the signal acquisition phase. The process lasts for 3 min; ③ after 3 min, the other parameters of each spoofing signal are kept unchanged, only the code rate is adjusted to 1 m/s and the carrier phase rate is adjusted to 1 m/s, which increases code phase and carrier phase by a fixed slope. The duration of this process is 3 min. After 246 s, the experimental key instruction design is depicted in the figure below.
In Figure 12, “OFFSET” indicates the code phase offset, carrier phase offset, relative power gain relative to authentic signal, command start time, and duration time; “RAMP” indicates the initial code phase offset, initial carrier phase offset, initial relative power gain, code rate and carrier phase rate, power increase/decrease rate, relative to authentic signal, and command start time and duration time.
The following analyzes the changes of Doppler frequency, carrier-to-noise ratio, and ECEF of the receiver in the test process.
The ground truth in ECEF has been set, the reference position in ECEF is −1,448,700 m in the X-axis direction, 6,209,100 m in the Y-axis direction, 175,000 m in the Z-axis direction. The ECEF coordinate given in this experiment is the positioning error vector subject to the reference position.
The statistical results of Doppler frequency range (difference between maximum and minimum), maximum C / N 0 , minimum C / N 0 and average C / N 0 of six signals received by test receiver are shown in Table 2.
Figure 13 and Figure 14 show the change of Doppler frequency with time of six signals received by the test receiver. During the period of 4–184 s, spoofing signal and authentic signal affect receiver at the same time, and Doppler frequency of six signals fluctuates. Compared with experiment 1, Doppler frequency fluctuation period is only 0–50 s, and the duration is shortened by 130 s, with a reduction percentage of 72.2%, the average value of Doppler frequency range is 21,183 Hz from 0 s to 200 s. Compared with experiment 1, Doppler frequency range is reduced by 66,717 Hz, with a reduction percentage of 75.9%; During 184–200 s, code rate and carrier phase rate of spoofing signals change, and Doppler frequency of the signal remains stable.
Figure 15 and Figure 16 show the change of C / N 0 of six signals received by test receiver with time. During the period from 0 s to 200 s, C / N 0 changes smoothly. If the maximum C / N 0 of six signals is less than the threshold C / N 0 of receiver for 45 dB/Hz, received signal C / N 0 is less than the threshold C / N 0 of receiver, so receiver is not easy to detect spoofing signal.
Figure 17 shows the change of ECEF coordinate positioning results with time. During the period from 4 s to 184 s, the spoofing signal and authentic signal affect the receiver at the same time. The range of ECEF three-dimensional coordinates is 13.64 m, 194.7 m and 33.81 m, respectively. Compared with experiment 1, the change range of positioning results caused by spoofing signal is obviously small, which indicates that the process of spoofing signal taking over receiver is more stable, this is helpful to improve the concealment of spoofing. The time is between 184 s and 200 s. At this time, the corresponding spoofing signal begins to be biased. The positioning result of the receiver is gradually biased. The three-dimensional coordinate range of ECEF is 1.498 m, 12.68 m and 2.747 m, respectively. Because the code phase and carrier phase of six spoofing signals change 16 m during this period, the three-dimensional coordinate range of ECEF in experiment 2 is more reasonable than that in experiment 1. It shows that receiver is taken over by spoofing signal, and spoofing is implemented successfully.
Based on the analysis of experiment 1 and experiment 2, compared with the conventional spoofing signal high power control algorithm, the new GNSS spoofing signal power control algorithm can shorten Doppler frequency fluctuation time by 72.2%, reduce the range by 75.9%, and reduce C / N 0 of the received signal. When spoofing signal takes over the receiver, the range of the three-dimensional coordinates of ECEF is significantly reduced, which indicates that the newly designed GNSS spoofing signal power control algorithm can make the spoofing behavior more hidden and make it more difficult for the target receiver to detect the spoofing behavior.

5. Conclusions

In the actual application scenario of spoofing, it is difficult for the spoofer to obtain the accurate position of the antenna phase center of target receiver due to the limitation of observation conditions. Generally, the method of suppressing interference first to make the receiver lose lock and then performing spoofing is widely adopted. Under this application background, in this paper, a spoofing signal power control strategy is proposed for the receiver in the acquisition phase and subsequent control under the receiver power constraint is proposed. The actual practical experiments show that, compared with the conventional spoofing signal high power control strategy, when the newly designed spoofing signal power control strategy is adopted, the Doppler frequency fluctuation duration of the received signal is shortened by 72.2%, and the range is reduced by 75.9%, the C / N 0 of the received signal is less than the threshold value of C / N 0 . During the process of spoofing signal taking over the receiver, ECEF is significantly reduced, which indicates that the newly designed spoofing signal power control strategy can make the spoofing behavior more concealed and will make it more difficult for the target receiver to detect the spoofing behavior. The designed power control strategy can covertly take over the receiver with the assistance of suppressing interference and then pull off the positioning results. It has good feasibility and effectiveness. After accurately mastering the receiver parameters, the more covert spoofing of the receiver can be realized by changing the constraint amount.

Author Contributions

Methodology, Y.G.; writing—original draft preparation, Y.G.; writing—review and editing, Y.G. and G.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by State Key Laboratory of Geo-Information Engineering, grant number SKLGIE2020-Z-2-1.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used in this research is not publicly available.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M., Jr. Assessing the Spoofing Threat. GPS World 2009, 20, 28–38. [Google Scholar]
  2. Scott, L. Anti-Spoofing and Authenticated Signal Architectures for Civil Navigation Systems. In Proceedings of the 16th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS/GNSS 2003), Portland, OR, USA, 9–12 September 2003. [Google Scholar]
  3. Humphreys, T.E.; Ledvina, B.M.; Psiaki, M.L.; O’Hanlon, B.W.; Kintner, P.M. Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. In Proceedings of the 21st International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GNSS 2008), Savannah, GA, USA, 16–19 September 2008; pp. 1169–1180. [Google Scholar]
  4. Jahromi, A.J.; Broumandan, A.; Nielsen, J.; Lachapelle, G. GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N0 measurements. Int. J. Satell. Commun. Netw. 2012, 30, 181–191. [Google Scholar] [CrossRef]
  5. Costa, F.; Albuquerque, G.L.; Silveira, L.F.; Valderrama, C.; Xavier-de-Souza, S. Variance-triggered two-step GPS acquisition. Sensors 2019, 19, 3177. [Google Scholar] [CrossRef] [PubMed]
  6. Kim, T.H.; Sin, C.S.; Lee, S. Analysis of effect of spoofing signal in GPS receiver. In Proceedings of the 12th International Conference on Control, Automation and Systems, Jeju, Korea, 17–21 October 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 2083–2087. [Google Scholar]
  7. Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E.; Fansler, A.A. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Proceedings of the 25th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS 2012), Nashville, TN, USA, 17–21 September 2012; pp. 3591–3605. [Google Scholar] [CrossRef]
  8. Broumandan, A.; Jafarnia-Jahromi, A.; Dehghanian, V.; Nielsen, J.; Lachapelle, G. GNSS spoofing detection in handheld receivers based on signal spatial correlation. In Proceedings of the 2012 IEEE/ION Position, Location and Navigation Symposium, Myrtle Beach, SC, USA, 23–26 April 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 479–487. [Google Scholar] [CrossRef]
  9. Ma, K.; Sun, X.; Nie, Y. Research on key technologies of GPS generated spoofing. Aerosp. Electron. Warface 2014, 30, 24–26. [Google Scholar]
  10. Hu, Y.; Bian, S.; Cao, K.; Feng, G. Spoofing power control strategy for GNSS receiver. J. Chin. Inert. Technol. 2015, 23, 207–210. [Google Scholar]
  11. Pang, J.; Ni, S.J.; Nie, J.W.; Ou, G. An overview to GNSS spoofing technologies. Fire Control Command Control 2016, 41, 1–4. [Google Scholar]
  12. Ziedan, N.I. Investigating and utilizing the limitations of spoofing in a map-matching anti-spoofing algorithm. Positions 2014, 3, 2843–2852. [Google Scholar]
  13. Lv, H.; Zhai, J.; Wang, W. The spoofing threat and anti-spoofing measurements analysis for satellite navigation receiver. In Proceedings of the China Satellite Navigation Conference (CSNC), Wuhan, China, 15–17 May 2013; Spinger: Berlin/Heidelberg, Germany, 2013. [Google Scholar]
  14. Kerns, A.J.; Shepard, D.P.; Bhatti, J.A.; Humphreys, T.E. Unmanned Aicraft Capture and Control via GPS Spoofing. J. Field Robot. 2014, 31, 617–636. [Google Scholar] [CrossRef]
  15. Sheng, Y.; Li, H.; Zhou, S.; Zhang, B. Research of GPS generated spoofing method. Foreign Electron. Meas. Technol. 2018, 37, 39–43. [Google Scholar]
  16. Hu, Y.; Bian, S.; Cao, K. GNSS spoofing detection based on new signal quality assessment model. GPS Solut. 2018, 22, 28. [Google Scholar] [CrossRef]
  17. Oligeri, G.; Sciancalepore, S.; Pietro, R.D. GNSS Spoofing Detection via Opportunistic IRIDIUM Signals. In Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, New York, NY, USA, 8–10 July 2020. [Google Scholar]
  18. Pini, M.; Fantino, M.; Cavaleri, A.; Ugazio, S.; Presti, L.L. Signal quality monitoring applied to spoofing detection. In Proceedings of the 24th International Technical Meeting of The Satellite Division of the Institute of Navigation, Portland, OR, USA, 19–23 September 2011; pp. 1888–1896. [Google Scholar]
  19. Chen, J.; Xu, Y.; Yuan, H.; Yuan, Y. A new GNSS spoofing detection method using two antennas. IEEE Access 2020, 8, 110738–110747. [Google Scholar] [CrossRef]
  20. Thomas, S.; Rasa, M.; Espen, M. Searching for energy independence, finding renewables? Energy security perceptions and renewable energy policy in Lithuania. Political Geogr. 2022, 96, 102656. [Google Scholar]
  21. Matthew, J.L.; James, M.; Chad, B. Spoofed Networks: Exploitation of GNSS Security Vulnerability in 4G and 5G Mobile Networks. In Proceedings of the Conference: 2021 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Fairfax, VA, USA, 19–22 July 2021. [Google Scholar]
  22. Kubo, Y.; Munetomo, N.; Matsunaga, Y.; Sugimoto, S. GNSS Positioning Algorithms by Gaussian Sum Filtering Methods. In Proceedings of the 42nd ISCIE International Symposium on Stochastic Systems Theory and its Applications, Okayama, Japan, 26–27 November 2011. [Google Scholar]
  23. Huang, S.; Chen, S.; Yang, B.; Wu, H. A power control strategy of multiple GNSS spoofing signals. J. Air Force Eng. Univ. Nat. Sci. Ed. 2017, 18, 76–80. [Google Scholar]
  24. Chandrasekhar, J.; Murthy, C.R. GNSS Signal Detection Under Noise Uncertainty. In Proceedings of the 2010 IEEE International Conference on Communications, Cape Town, South Africa, 23–27 May 2010. [Google Scholar]
  25. Rycroft, M.J. Understanding GPS—Principles and Applications. J. Atmos. Sol. Terr. Phys. 1997, 59, 598–599. [Google Scholar] [CrossRef]
  26. Wang, X. SINS/GPS Integrated Navigation Technology; Beihang University Press: Beijing, China, 2015. [Google Scholar]
  27. Xie, G. Principles of GPS and Receiver Design; Publishing House of Electronics Industry: Beijing, China, 2009. [Google Scholar]
Figure 1. Flow chart for the acquisition and tracking loop structure.
Figure 1. Flow chart for the acquisition and tracking loop structure.
Sensors 22 06588 g001
Figure 2. Relationship between total power of spoofing signal and estimation of receiver noise floor.
Figure 2. Relationship between total power of spoofing signal and estimation of receiver noise floor.
Sensors 22 06588 g002
Figure 3. Relationship between total power of spoofing signal and acquisition probability.
Figure 3. Relationship between total power of spoofing signal and acquisition probability.
Sensors 22 06588 g003
Figure 4. Free space propagation of satellite signals.
Figure 4. Free space propagation of satellite signals.
Sensors 22 06588 g004
Figure 5. Experimental platform setup.
Figure 5. Experimental platform setup.
Sensors 22 06588 g005
Figure 6. Experimental instruction design in experiment 1.
Figure 6. Experimental instruction design in experiment 1.
Sensors 22 06588 g006
Figure 7. Changes in Doppler frequency of SVID9, 14, 18 in experiment 1.
Figure 7. Changes in Doppler frequency of SVID9, 14, 18 in experiment 1.
Sensors 22 06588 g007
Figure 8. Changes in Doppler frequency of SVID29, 30, 31 in experiment 1.
Figure 8. Changes in Doppler frequency of SVID29, 30, 31 in experiment 1.
Sensors 22 06588 g008
Figure 9. Changes in C / N 0 of SVID9, 14, 18 in experiment 1.
Figure 9. Changes in C / N 0 of SVID9, 14, 18 in experiment 1.
Sensors 22 06588 g009
Figure 10. Changes in C / N 0 of SVID29, 30, 31 in experiment 1.
Figure 10. Changes in C / N 0 of SVID29, 30, 31 in experiment 1.
Sensors 22 06588 g010
Figure 11. Changes in ECEF three dimensional coordinates of receiver in experiment 1.
Figure 11. Changes in ECEF three dimensional coordinates of receiver in experiment 1.
Sensors 22 06588 g011
Figure 12. Experimental instruction design in experiment 2.
Figure 12. Experimental instruction design in experiment 2.
Sensors 22 06588 g012
Figure 13. Changes in Doppler frequency of SVID9, 14, 18 in experiment 2.
Figure 13. Changes in Doppler frequency of SVID9, 14, 18 in experiment 2.
Sensors 22 06588 g013
Figure 14. Changes in Doppler frequency of SVID29, 30, 31 in experiment 2.
Figure 14. Changes in Doppler frequency of SVID29, 30, 31 in experiment 2.
Sensors 22 06588 g014
Figure 15. Changes in C / N 0 of SVID9, 14, 18 in experiment 2.
Figure 15. Changes in C / N 0 of SVID9, 14, 18 in experiment 2.
Sensors 22 06588 g015
Figure 16. Changes in C / N 0 of SVID29, 30, 31 in experiment 2.
Figure 16. Changes in C / N 0 of SVID29, 30, 31 in experiment 2.
Sensors 22 06588 g016
Figure 17. Changes in ECEF three dimensional coordinates of receiver in experiment 2.
Figure 17. Changes in ECEF three dimensional coordinates of receiver in experiment 2.
Sensors 22 06588 g017
Table 1. Statistical table of experiment 1 Results.
Table 1. Statistical table of experiment 1 Results.
Experiment 1SVID9SVID14SVID18SVID29SVID30SVID31
Doppler frequency range (Hz)87,90087,90087,90087,90087,90087,900
Maximum C / N 0 36.2536.545.536.7545.545
Minimum C / N 0 3535.2544.535.7544.7544.25
Average C / N 0 35.7136.0144.9336.1845.1244.67
Table 2. Statistical table of Experiment 1 Results.
Table 2. Statistical table of Experiment 1 Results.
Experiment 1SVID9SVID14SVID18SVID29SVID30SVID31
Doppler frequency range (Hz)20,95020,94020,98020,94020,99020,990
Maximum C / N 0 36.2540.254342.537.7537.25
Minimum C / N 0 35.2539.2542.2541.753636.25
Average C / N 0 35.7439.7542.6242.1336.8936.7
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gao, Y.; Li, G. A New GNSS Spoofing Signal Power Control Algorithm for Receiver Sensors in Acquisition Phase and Subsequent Control. Sensors 2022, 22, 6588. https://doi.org/10.3390/s22176588

AMA Style

Gao Y, Li G. A New GNSS Spoofing Signal Power Control Algorithm for Receiver Sensors in Acquisition Phase and Subsequent Control. Sensors. 2022; 22(17):6588. https://doi.org/10.3390/s22176588

Chicago/Turabian Style

Gao, Yangjun, and Guangyun Li. 2022. "A New GNSS Spoofing Signal Power Control Algorithm for Receiver Sensors in Acquisition Phase and Subsequent Control" Sensors 22, no. 17: 6588. https://doi.org/10.3390/s22176588

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop