Next Article in Journal
FCOSR: A Simple Anchor-Free Rotated Detector for Aerial Object Detection
Next Article in Special Issue
A Multi-Step Pseudo-Measurement Adaptive Kalman Filter Based on Filtering Performance Evaluation and Its Application in the INS/GNSS Navigation System
Previous Article in Journal
Optimizing the Retrieval of Wheat Crop Traits from UAV-Borne Hyperspectral Image with Radiative Transfer Modelling Using Gaussian Process Regression
Previous Article in Special Issue
The CNES Solutions for Improving the Positioning Accuracy with Post-Processed Phase Biases, a Snapshot Mode, and High-Frequency Doppler Measurements Embedded in Recent Advances of the PPP-WIZARD Demonstrator
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna

1
National Laboratory of Radar Signal Processing, Xidian University, Xi’an 710000, China
2
China Research Institute of Radiowave Propagation, Qingdao 266000, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2023, 15(23), 5497; https://doi.org/10.3390/rs15235497
Submission received: 14 October 2023 / Revised: 19 November 2023 / Accepted: 23 November 2023 / Published: 25 November 2023
(This article belongs to the Special Issue International GNSS Service Validation, Application and Calibration)

Abstract

:
GNSS spoofing interference utilizes falsified navigation signals to launch attacks on GNSS systems, posing a significant threat to applications that rely on GNSS signals for positioning, navigation, and time services. Therefore, achieving effective localization of the sources causing spoofing interference is crucial in ensuring the secure operation of GNSS. This article proposes a method for locating GNSS spoofing interference sources using a moving array antenna. Firstly, the proposed method utilizes the inherent characteristics of the double-differenced carrier phase from the deception signals received by the array antenna to effectively extract the spoofing signals. Subsequently, by moving the antenna array, the original carrier phase single-difference data of multiple observation points for deception signals are fused to provide a cost function for direct localization of spoofing interference, and a solution method for the cost function is designed. The proposed method addresses the challenge of extracting and localizing GNSS spoofing interference weak signals, effectively avoiding the data correlation of traditional two-step methods for DOA estimation parameters and ensuring the location accuracy of spoofing interference and the robustness of the method. The effectiveness of the proposed method has been validated through simulation experiments, and its adaptability to factors such as errors in carrier phase measurements has been examined. The method exhibits strong applicability and is well-suited for the hardware platform of the GNSS nulling antenna, thereby enabling it to possess simultaneous capabilities in both anti-interference and spoofing interference localization.

1. Introduction

The term global navigation satellite system (GNSS) typically refers to various global satellite navigation systems and their enhanced systems, including GPS in the United States, Galileo in Europe, GLONASS in Russia, and Beidou in China [1]. Due to the weak GNSS received power of −130 dBm, the GNSS spectrum is heavily immersed in environmental noise and exhibits elevated susceptibility to electromagnetic interference [2,3]. Jamming and spoofing are the two most significant forms of intentional interference, with spoofing involving the generation of counterfeit satellite navigation signals or the retransmission of authentic satellite navigation signals [4,5]. Spoofing can manipulate the code phase, carrier phase, message content, and additional parameters depending on the spoofing intention. This allows the receiver to unknowingly capture and track the spoofing signals, leading to erroneous positioning results and enabling control over the receiver [6]. Compared to jamming, spoofing exhibits a power level akin to authentic satellite signals but with lower signal strength, better concealment, and greater potential for harm [7]. The aforementioned characteristics of spoofing interference pose significant challenges for wireless detection and localization approaches, and hence, this paper focuses on the problem of localizing GNSS spoofing sources.

1.1. Related Work

Currently, numerous anti-spoofing technologies [8] are available for the detection, identification, and suppression of spoofing signals in GNSS systems. These include in-band power monitoring [9], signal quality monitoring [10], receiver timing monitoring [11], navigation message authentication [12], multi-antenna technology [13], and multi-receiver technology [14], among others. However, there have been limited studies on the localization of GNSS spoofers.
The commonly employed methods for localizing GNSS interference sources include direction of arrival (DOA) methods [15,16], time difference of arrival (TDOA) methods [17,18], and received signal strength (RSS) methods [19,20]. The signal strength of spoofing interference is equivalent to the real GNSS signal strength, and the signal-to-noise ratio (SNR) of the signal can be as low as −19 dB, which makes it difficult to extract the DOA, TDOA, and RSS of the signal. DOA methods frequently use algorithms such as CAPON and MUSIC to estimate signal arrival angles, which cannot efficiently extract the DOA of spoofing interference signals in the aforementioned low-SNR conditions. The extraction of TDOA with weak spoofing interference requires long-term data correlation operations, which requires TDOA methods to collect and transmit a large amount of raw data. It is difficult to extract the RSS because the spoofing signal is submerged in noise. Importantly, due to the extreme similarity between the spoofing signal and the real signal, it is difficult to distinguish the signal features of the real and spoofing signals from the extracted ones, even if the above localization methods implement signal feature estimation. For example, the navigation receiver can compute the C/N0 of the spoofing signal to achieve the RSS measurement, but it cannot distinguish the C/N0 of the real satellite signal from that of the deception signal, and the DOA and TDOA methods face similar problems.
The deception localization methods proposed by [21,22] have shown relative effectiveness; however, their establishment relies on stringent restrictive assumptions, thereby impacting the practicality of these methods. Reference [21] is a low-cost deception interference localization method, but the establishment of the method requires accumulating observation data under the assumption that the deception interference source is stationary and the replay delay does not modify over time or has the same shift, which is a relatively strict assumption condition. In addition, reference [21] can only realize the repeater spoofing localization, while the generative deception source is more common. Reference [22] is a deception interference localization method based on TDOA, and the article utilizes the geometry and known positions of multiple static GPS receivers distributed within the power substation. The establishment of this method requires the construction of a GNSS monitoring sensor network and requires the receivers in the network to return relevant peak information, which brings certain limitations to the practical application of the method.
This article adopts a direct localization method, while the traditional localization method adopts a two-step processing [23]. The two-step method first extracts measurement parameters (such as DOA and TDOA) and then estimates the source location. Direct localization achieves source localization without estimating signal parameters. This type of method can avoid correlation problems [24], and its localization accuracy has been proven to be significantly higher than traditional two-step methods, especially under low signal-to-noise ratio conditions [25]. In the application of this paper, due to the weak signal of the spoofing signal and the dynamic monitoring scenario, the direct localization method is used to localize the GNSS spoofing interference, which improves the localization accuracy and robustness of the method in this scenario.
The article proposes a moving array antenna-based method aiming to address the issue of locating GNSS spoofing interference sources. This method can be implemented on the widely used hardware platforms of GNSS nulling antenna [26], enabling it to possess simultaneous capabilities of anti-interference and deception interference detection and localization.

1.2. Our Contributions

The article presents a method to implement the recommended antenna model and navigation signal capture tracking method and proposes our approach based on this. The proposed method leverages the consistent emission of deceptive satellite signals from a common source of interference, effectively extracting and confirming these misleading signals through statistical analysis of the double-differenced carrier phase. The article then formulates a cost function to address the direct positioning of spoofing interference with a moving antenna array and integrating carrier phase single-difference raw observation data from multiple observation points, while also presenting a solution methodology for this cost function. Additionally, the article also provides the Cramer Rao Bound (CRB) for the localization method of GNSS spoofing interference sources.
The effectiveness of the proposed method has been verified through simulations, and the simulation results demonstrate that the proposed method can effectively achieve the detection, extraction, and localization of GNSS spoofing interference sources. In comparison to the conventional two-step methods, the proposed method has stronger adaptability toward larger carrier phase measurement errors (weaker deceptive interference signal strength) and antenna positioning errors. Moreover, the localization accuracy achieved by this approach closely approximates that of the global search method and CRB. It also examines the performance of the proposed method on typical localization observation paths and suggests optimal localization paths. By conducting experiments to assess the effect of varying the number of observation points on the localization accuracy, we propose optimal configurations for the number of observation points in this particular scenario.
The subsequent sections of this paper are structured as follows. Section 2 initially presents the system model of our approach, encompassing the antenna model and methods for navigation signal acquisition and tracking. Building upon this foundation, Section 3 proposes a method for localizing GNSS spoofing interference sources using a moving array antenna. Section 4 of this paper presents the experimental chapter for the proposed method, which validates the effectiveness of the method and performs a comprehensive and systematic simulation analysis of the key factors affecting its performance. Section 5 is devoted to the conclusion of this paper.

2. System Model and Signal Processing Methods

This article presents a method for localizing GNSS spoofing interference sources using a moving array antenna, which is commonly employed in the scenario depicted in Figure 1. In this scenario, the unmanned aerial vehicle (UAV) for spoofing interference monitoring is equipped with an array antenna and a receiver dedicated to monitoring spoofing interference. It employs mobile monitoring to collect authentic satellite signals as well as navigation deceptive spoofing signals, which are then processed using the methodology proposed in this paper to effectively monitor and locate instances of GNSS deceptive interference behavior. The proposed method is also applicable to the monitoring and localization of GNSS spoofing interference sources in vehicular scenarios.

2.1. Antenna Model

The proposed method is applicable to any array antenna operating in the navigation frequency band, and it is recommended to utilize the 6 + 1 array antenna model described in reference [27]. This particular model has been widely adopted to design GNSS anti-jamming nulling antennas, as illustrated in Figure 2. The design effectively achieves a trade-off between signal measurement accuracy and antenna availability by integrating relatively more elements within a compact space. The model consists of 7 antenna elements, where element 0 serves as the reference and is located at the center of the antenna structure, while elements 1–6 are uniformly distributed along a circular path of a radius, denoted by R . To ensure that there is no spatial ambiguity between adjacent array elements, the baseline length between elements is equal to half of the carrier wavelength.
As depicted in Figure 2, we build a Cartesian coordinate system with the position of antenna element 0 as the origin. The x-axis is oriented positively from element 0 towards element 1, while the y-axis is oriented positively from element 0 towards the midpoint between elements 2 and 3. Moreover, the z-axis is perpendicular to the plane of the antenna model. The angle γ i = 2 π ( i 1 ) / 6 ,   i = 1 ,   2 , , 6 represents the inclination of element i with respect to the positive x-axis, thus allowing us to express the position vector of the array elements as p i = [ R cos γ i , R sin γ i , 0 ] T . This diagram provides a schematic depiction of i = 2 positioned at an angle γ 2 .

2.2. Signal Acquisition and Tracking Methods

After implementing the antenna model described in Section 2.1 for signal reception, this method devises a signal receiving and processing process, as depicted in Figure 3, to effectively handle all received genuine and spoofing GNSS signals at each antenna element, thereby the acquisition, tracking, and carrier phase measurement of all the signals can be accurately achieved. Each array element of the antenna array depicted in Figure 3 corresponds to a single radio frequency (RF) channel, enabling RF signal conditioning, down-conversion, intermediate frequency (IF) signal filtering and amplification, and analog-to-digital (AD) conversion to obtain the digital IF signal corresponding to each element.
As shown in Figure 3, we have designed an efficient satellite signal acquisition method suitable for the scenario described in this paper. This method performs signal acquisition only on the signals received from array element 0 to obtain observation vectors τ 0 1 , τ 0 h , , τ 0 K and f 0 1 , f 0 h , , f 0 K , where τ 0 h and f 0 h represent a coarse estimate of the code phase and carrier frequency measurement for satellite h, respectively. Given that the inter-element spacing is within half of the carrier wavelength, this approach uses the acquisition observation vector of element 0 directly as input to track the signals from the other antenna elements, thereby circumventing the need for signal acquisition processes involving the remaining 6 elements. At the same time, the algorithm in reference [28] can be used to further reduce the implementation cost of the method. This algorithm is an improved parallel code phase acquisition (PCA) algorithm that can speed up the acquisition process while slightly reducing the detection probability.
The signal tracking process in Figure 3 involves assigning a tracking channel to each satellite signal received by each antenna element, where the tracking channel i , h is the channel to satellite h received by element i . The tracking process enables the measurement of the carrier phase and generates the observed vector ϕ 0 1 , ϕ i h , , ϕ 6 K of carrier phase, where ϕ i h represents the measured value of satellite h’s carrier phase received by array element i . The method described in this paper leverages the aforementioned carrier phase observations for efficient extraction and localization of GNSS spoofing interference.
Figure 4 depicts the signal reception loop design employed for the tracking channel. In Figure 4, the loop consists of a code loop located at its upper part and a carrier loop located at its lower part. The signal tracking method employed in this paper follows the classical approach described in reference [29], which is widely adopted for GNSS receiver design.
The correction parameters for the code phase and carrier phase, denoted as τ and ϕ , respectively, in Figure 4, are calculated according to the method detailed in reference [30]. The proposed method, which can be implemented on a GNSS nulling antenna hardware platform, enables simultaneous spoofing interference detection and localization with anti-jamming. However, adaptive beamforming modifies the array pattern in real time, which has the potential to introduce phase–center bias into the antenna array. Since we need to maintain the accurate measurement of the carrier phase in the application scenario of this paper, these deviations must be compensated for to reduce the carrier phase measurement error of the GNSS receiver. Reference [30] gives the calculation method of the code phase and carrier phase correction amount to compensate for the above error. In this paper, we use the carrier phase correction amount to correct the carrier phase measurements of the tracking loop and obtain accurate carrier phase measurements.

3. Proposed Methods

The power of the spoofing interference is similar to that of the genuine satellite signal compared to the suppressed interference. Due to the fact that deceptive interference is submerged in noise, angle estimation methods based on antenna arrays are difficult to achieve efficient direction finding for deceptive interference. The article utilizes the spread-spectrum characteristics of deceptive interference and implements conditioning, acquisition, and tracking of all GNSS signals received by the antenna array using the system and signal processing model described in Section 2, thereby obtaining measurements of the carrier phase. The paper proposes a moving array antenna-based method for localizing GNSS spoofing interference sources. The method first uses double-differenced carrier phase observations to distinguish between genuine GNSS signals and spoofing signals, thereby confirming and extracting the spurious spoofing satellite signals. Subsequently, this approach combines the raw carrier phase single-difference measurements from multiple observation points of an array antenna to achieve direct localization of the spoofing source. A comprehensive description of this methodology will be provided in this section.

3.1. Extraction of Spoofing Interference Based on the Double-Differenced Carrier Phase

After successfully receiving both authentic and spoofing GNSS signals, this method effectively extracts and confirms the deceptive signals among the previously received signals, thereby enabling subsequent localization of the spoofing source. The proposed method leverages the inherent characteristics of same-origin signals and the spread spectrum properties of spoofing interference to effectively extract the deceptive interference by observing and statistically analyzing the double-differenced carrier phase feature. According to the content referenced in [31], we present the observation model for the carrier phase measurement value obtained in Section 2 as follows:
ϕ = 2 π λ ρ + δ ρ + c ( δ t r δ t s ) + δ ρ c + T I + δ ρ m 2 π N + ε
in which ϕ is the carrier phase observation value of the navigation signal, λ is the carrier wavelength of the signal, ρ is the distance from the satellite to the receiver antenna, δ ρ is the orbit error of the satellite, c is the speed of light, δ t r  is the receiver clock difference, δ t s is the satellite clock difference, δ ρ c is the error caused by the receiver cable, T is the error caused by the troposphere, I is the error caused by the ionosphere, δ ρ m is the error caused by the multi-path effect, N is the number of complete cycles of carrier phase, and ε is the measurement noise. The units of ϕ and ε are rad, the units of ρ , δ ρ , δ ρ c , T , I , and δ ρ m are m, the units of δ t r and δ t s are s, the unit of c is m/s, and the unit of N is 1.
According to Equation (1), the carrier phase single-difference between array element  i and array element 0 can be calculated, i.e.,   φ i = ϕ i ϕ 0 . Taking satellite signal h as an example, its single-difference calculation equation is as follows.
φ i h = ϕ i h ϕ 0 h = 2 π λ ρ i h + δ ρ i h + c ( δ t r i h δ t s i h ) + δ ρ c i h + T i h I i h + δ ρ m i h 2 π N i h + ε i h 2 π λ ρ 0 h + δ ρ 0 h + c ( δ t r 0 h δ t s 0 h ) + δ ρ c 0 h + T 0 h I 0 h + δ ρ m 0 h + 2 π N 0 h ε 0 h
According to reference [32], for the same signal source, due to the very close distance between the array elements, it can be assumed that the parameters δ ρ , T , I , and δ t s between the array elements are the same. By implementing an equal-length design for the antenna element feed lines, an equal-length layout design for the sampling circuit, and digital delay correction for each channel, it becomes feasible to maintain consistent δ ρ c values across all array elements. By employing the same highly stable crystal oscillator as the time-frequency reference for the sampling circuit, the RF circuit, and the navigation signal processing circuit associated with each array element, the parameter δ t r between each array element can be consistent. Moreover, since the distances between antenna array elements are designed without integer ambiguities, the formulation of the carrier phase single-difference measurement φ i h can be further simplified as follows.
φ i h = 2 π λ ( ρ i h ρ 0 h ) + ε i h ε 0 h
The conditions described here are overly idealized, but they can be achieved in practice. Reference [32] adopts a similar approach to this article to achieve the above conditions. The software-defined radio (SDR) platform proposed in reference [26] implements the above equal-length conditions, which can be used for the implementation and testing of the method in this paper. In practical applications, the GNSS signal source can be used to calibrate multiple hardware channels (including antenna feeders), and the calibration diagram is shown in Figure 5.
In this method, the seven channels corresponding to the 6 + 1 array antenna track the same navigation satellite signal output by the GNSS signal source and output the carrier phase measurement differences between the hardware channels of element 1 to element 6 and the hardware channel of element 0 as the correction values. In practice, these correction values are used to achieve a consistent correction for each channel.
In this paper, the GNSS spoofing interference extraction is performed using double-difference carrier phase measurements. For satellite signals k and h , the carrier phase double-difference equation for array element i is defined as follows.
φ i k , h = φ i k φ i h = 2 π λ   ( ρ i k ρ 0 k ) + ε i k ε 0 k 2 π λ   ( ρ i h ρ 0 h ) ε i h + ε 0 h  
If the signals from satellites k and h originate from the same spoofing source, then the propagation paths of both satellite signals from transmitter to receiver are identical. Therefore, the carrier phase double-difference φ i k h can be simplified as follows.
φ i k , h = ( ε i k ε 0 k ) ( ε i h ε 0 h )
The tracking error of the carrier phase is typically less than 1% of the carrier wavelength [33], that is, ε 0.005 × 2 π   r a d , thus we set the maximum value of 8 ε as the threshold for identifying and extracting spoofing interference, that is, T h = 0.04 × 2 π   r a d . If the double-differenced carrier phase observation between the satellite signal k and the satellite signal h is less than the threshold value T h , then it is possible that both the satellite signals originate from the same spoofing interference. In practical application scenarios, considering the method’s accuracy and real-time nature, we establish that signals from two satellites originate from the same spoofing interference source when there are continuous five-carrier phase double-difference observation values below a certain threshold.
Considering that the carrier phase may fluctuate in dynamic scenarios, we use the statistical method for carrier phase measurement errors in reference [34]. When implementing the proposed method in this paper, we can set up two hardware channels for carrier phase measurement on the same antenna element and can monitor and compile statistics on the carrier phase measurement error ε , in real-time. Then, 8 ε , corresponding to the measured ε , is used as the interference extraction threshold to improve the effectiveness of the spoofing interference extraction and confirmation in this paper.

3.2. Spoofing Interference Direct Location Based on Carrier Phase Single-Difference

The method described in Section 3.1 enables the extraction and determination of spoofing interference signals from the received GNSS signals by the array antenna. Expanding on this, in this section, we directly obtain the position of the spoofing interference source by fusing raw carrier phase observations using a moving antenna array. Due to the dynamic observing scenario in this paper, there are some carrier phase observation errors and array antenna positioning errors. We use carrier phase single-difference measurements to construct the observation equations for the spoofing source and directly determine the location of the spoofing source by moving the antenna array and combining the observation equations. Compared with traditional two-stage positioning methods, the direct location method avoids spatial correlation of signal estimation parameters and enhances the robustness of spoofing localization in dynamic scenarios [23].
We set up the scenario model for the spoofing interference source location in this paper, illustrated in Figure 6, employing the same Cartesian coordinate system approach as depicted in Figure 2. In this model, we designate the initial position p 1 of antenna element 0 as the origin. p t represents the vector of coordinates corresponding to the location of the spoofing source. p j denotes the j-th signal acquisition position of element 0, while M   signifies the total number of observations.
The observation equation can be established at observation position p j by utilizing the carrier phase single-difference measurement φ j , i of array element i . The formulated expression is as follows:
p t p j , i p t p j = λ φ j , i 2 π  
in which p j , i is the coordinate of array element i at position p j = [ x j , y j , z j ] T , and p j , i = p j + [ R cos γ i , R sin γ i , 0 ] T . The coordinate p t , which represents the interference source in Equation (6), is the unknown variable to be determined. By substituting p t = [ x , y , z ] T , Equation (6) can be reformulated as follows.
x x j , i 2 + y y j , i 2 + z z j , i 2 x x j 2 + y y j 2 + z z j 2 = λ φ j , i 2 π
We take the equations of position p j as an example, and we can obtain six nonlinear equations at the position for array elements 1 to 6. In Figure 6, there are M observation positions in the scene, each of which gives the above six nonlinear equations; thus, the number of equations we can obtain is 6 M , where the number of unknowns in the equations is 3 (x, y, and z), and the rest variables are known observations.
We express the nonlinear Equation (7) as follows:
g ( x , y , z , v j , i ) = u j , i
In the equation, g · represents the nonlinear relationship in Equation (7), while v j , i and u j , i , respectively, denote known variables associated with the position of the receiving antenna and carrier phase observation values, where v j , i = ( p j i T , p j T ) T , u j , i = λ φ j , i / 2 π . By combining Equation (8) from various positions and array elements, the following system of equations is formulated.
g ( x , y , z , v 1,1 ) = u 1,1 g ( x , y , z , v 1,2 ) = u 1,2 g ( x , y , z , v j , i ) = u j , i g ( x , y , z , v M , 6 ) = u M , 6
We linearize Equation (8) by Taylor expansion and obtain the following result:
u j , i g ( x k 1 , y k 1 , z k 1 , v j , i ) + g ( x k 1 , y k 1 , z k 1 , v j , i ) x ( x x k 1 ) + g ( x k 1 , y k 1 , z k 1 , v j , i ) y ( y y k 1 ) + g ( x k 1 , y k 1 , z k 1 , v j , i ) z ( z z k 1 )
where g ( x k 1 , y k 1 , z k 1 , v j , i ) / x is calculated as follows.
g ( x k 1 , y k 1 , z k 1 , v j , i ) x = g ( x , y , z , v j , i ) x x = x k 1 y = y k 1 z = z k 1 = g ( x , y k 1 , z k 1 , v j , i ) x x = x k 1
Therefore, the iterative calculation formula for equation system (9) can be provided as follows:
H δ p = b
in which
H = g ( x k 1 , y k 1 , z k 1 , v 1,1 ) x g ( x k 1 , y k 1 , z k 1 , v 1,1 ) y g ( x k 1 , y k 1 , z k 1 , v 1,1 ) z g ( x k 1 , y k 1 , z k 1 , v j , i ) x g ( x k 1 , y k 1 , z k 1 , v j , i ) y g ( x k 1 , y k 1 , z k 1 , v j , i ) z g ( x k 1 , y k 1 , z k 1 , v M , 6 ) x g ( x k 1 , y k 1 , z k 1 , v M , 6 ) y g ( x k 1 , y k 1 , z k 1 , v M , 6 ) z
δ p = p t p t , k 1 = x y z x k 1 y k 1 z k 1
b = u 1,1 g ( x k 1 , y k 1 , z k 1 , v 11 ) u j , i g ( x k 1 , y k 1 , z k 1 , v j i ) u M , 6 g ( x k 1 , y k 1 , z k 1 , v M 6
Among them, p t , k 1 represents the spoofer’s location after k 1 iterations, while H denotes the Jacobian matrix. In order to achieve an iterative solution, solve δ p in Equation (12). By adopting a least-squares solution approach, we formulate the cost function as follows.
F ( δ p ) H δ p b 2 = ( H δ p b ) T ( H δ p b )
By expanding the cost function, we obtain Equation (17).
F ( δ p ) = δ p T H T H δ p δ p T H T b b T H δ p + b T b = δ p T H T H δ p 2 δ p T H T b + b T b
Due to the symmetric positive definiteness and invertibility of the matrix H T H , the minimum of F ( δ p ) is guaranteed. By computing the derivative of F ( δ p ) with respect to δ p , we can derive the following equation.
d F ( δ p ) d ( δ p ) = 2 H T H δ p H T b
The value of δ p , when the above derivative value equals 0, is the desired iterative solution, which is formulated as follows.
δ p = H T H 1 H T b
Upon obtaining δ p , the solution of Equation (9) can be updated from p t , k 1 to p t , k , denoted specifically as p t , k = p t , k 1 + δ p .
To enhance the location accuracy of the method, we can perform multiple phase carrier phase measurements at the same observation point and use the weighted least squares method described in reference [35] to further reduce the impact of measurement errors on the effectiveness of the method. If σ j i represents the standard deviation obtained from multiple measurements of u j i , the corresponding weight assigned to u j i is as follows.
w j , i = 1 σ j , i
Add weights to Equation (12), which can be rewritten as:
W H δ p = W b
in which W is given as follows.
W = w 1,1 w 1,2 w M , 6
For Equation (20), we directly apply the least squares solution Equation (18) of Equation (11) to obtain the weighted least squares solution of Equation (20) as follows.
δ p = H T W T W H 1 H T W T W b
In this paper, the spoofing interference location is solved iteratively using Equation (23).

3.3. The CRB of the Method Proposed in This Article

In this section, we present the CRB for our proposed method, taking into account the presence of measurement errors in carrier phase measurements and array antenna positioning. CRB is a widely recognized tool that establishes a lower bound on the accuracy of unbiased estimators. According to Equation (8), the error in spoofing location accuracy is influenced by two components: the measurement error of the carrier phase for each array element and the positioning error of the antenna array itself. To derive the CRB for the proposed method, we introduce an observation vector u ^ = [ u ^ 11 , u ^ 12 , , u ^ j i , , u ^ M 6 ] T , representing the carrier phase measurements. Here, u ^ j i corresponds to u j i in Equation (8) and encompasses the observation error. We define vector u ^ ’s true value as u = [ u 11 , u 12 , , u j i , , u M 6 ] T and its measurement error vector as Δ u = u ^ u , where Δ u follows a zero-mean Gaussian distribution with a covariance matrix Q u = E Δ u Δ u T .
Similarly, we define the observation vector v ^ = [ v ^ 11 T , v ^ 12 T , , v ^ j i T , , v ^ M 6 T ] T related to the position of the antenna array, where v ^ j i corresponds to v j i in Equation (8) and contains the observation error. We define vector v ^ ’s true value as v = [ v 11 T , v 12 T , , v j i T , , v M 6 T ] T and its measurement error vector as Δ v = v ^ v , where Δ v follows a zero-mean Gaussian distribution with a covariance matrix Q v = E Δ v Δ v T . According to the method in reference [36], we define vector Φ = [ p t T , v T ] , where p t represents the exact location of the target spoofing interference source. Given that Δ u and Δ v are independent of each other and follow zero-mean Gaussian distributions, the logarithm of the joint density function of u ^ and v ^ , parametrized on Φ , can be expressed as follows:
ln f ( u ^ , v ^ , Φ ) = ln f ( u ^ , Φ ) + ln f ( v ^ , Φ ) = K 1 2 [ u ^ u ] T Q u 1 [ u ^ u ] 1 2 [ v ^ v ] T Q v 1 [ v ^ v ]
in which f ( · ) is the probability density function and the parameter K associated with Q u and Q v is calculated as follows.
K = 1 2 ln 2 π 6 M Q u 1 2 ln 2 π 6 M Q v
According to the definition of CRB, the CRB equation for Φ is as follows.
C R B ( Φ ) = E 2 ln f ( u ^ , v ^ , Φ ) Φ Φ T 6 M + 3 × 6 M + 3 1
It can be seen from Equation (25) that C R B ( Φ ) is a 6 M + 3 square matrix, in which only the upper left 3 × 3 submatrix corresponding to the CRB is of interest to us. For the convenience of expression, we convert Equation (26) into submatrix form shown as:
C R B ( Φ ) = R 1 R 2 R 2 T R 3 1
where R 1 , R 2 , and R 3 are defined as follows.
R 1 = E 2 ln f ( u ^ , v ^ , Φ ) p t p t T = u p t T T Q u 1 u p t T
R 2 = E 2 ln f ( u ^ , v ^ , Φ ) p t v T = u p t T T Q u 1 u v T
R 3 = E 2 ln f ( u ^ , v ^ , Φ ) v v T = u v T T Q u 1 u v T + Q v 1  
Based on the inverse formula of the block matrix in [37], the following CRB calculation equation can be given.
C R B ( p t ) = R 1 R 2 R 3 1 R 2 T 1 = R 1 1 + R 1 1 R 2 R 3 R 2 T R 1 1 R 2 1 R 2 T R 1 1

3.4. The Method Processing Flow

Figure 7 illustrates the data processing flow description of the GNSS spoofing interference source localization method based on a moving array antenna. The steps of the method are as follows:
  • We conduct real-time monitoring of the satellite identification code tracked by each tracking channel and determine whether there are two different channels tracking the same satellite. If the above conditions exist, it is judged spoofing interference is detected, and output the corresponding tracking channel vector C h a = C h a 1 , C h a 1 , C h a j , C h a j , , C h a K , C h a K , where C h a j and C h a j are channel numbers tracking the same satellite.
  • Take any pair of tracking channels C h a j and C h a j that track the same satellite signal, take any antenna array element i , and calculate the carrier phase double-difference between the other channels in C h a and the selected channel to obtain the carrier phase double-difference observation vectors Φ i C h a j = [ φ i C h a 1 , C h a j , φ i C h a j 1 , C h a j , , φ i C h a K , C h a j ] and Φ i C h a j = [ φ i C h a 1 , C h a j , φ i C h a j 1 , C h a j , , φ i C h a K , C h a j ] , where the expression of double-differenced carrier phase φ i C h a j 1 , C h a j is the same as that of Equation (5).
  • After obtaining the carrier phase double-difference, use the method in Section 3.1 to extract and confirm the spoofing interference signals and output the tracking channel vector C h a  =  C h a 1 , C h a j , C h a K corresponding to the deception satellite signals.
  • Compare the carrier-to-noise ratio (C/N0) of the tracking signals of each channel in vector C h a , and take the deception satellite signal C h a m a x with the highest C/N0 among them.
  • Collect carrier phase single-difference data of the deception signal C h a m a x along the spoofing location path and obtain the observation vector φ C h a m a x = [ φ 1,1 C h a m a x , φ 1,2 C h a m a x , , φ j , i C h a m a x , , φ M , 6 C h a m a x ] T , where the expression of carrier phase single-difference φ j , i C h a m a x is the same as that of Equation (6).
  • After acquiring the carrier phase single difference data, employ the methodology elucidated in Section 3.2 to directly ascertain the precise location of the spoofing interference and yield the spatial coordinates of its source p t .
We would like to give the following explanation for the practical application of the method:
  • The double-differenced carrier phase-based spoofing interference extraction method enables an efficient separation between the real satellite signals and the spoofing signals, thereby facilitating the use of authentic satellite signals for determining the position of the array antenna itself.
  • After implementing spoofing interference extraction, in principle, any satellite signal of the spoofing interference can be utilized to construct equation system (9). With increased signal strength, the accuracy of carrier phase measurement also improves, thus enhancing the effectiveness of the method; we select the satellite signal with the highest C/N0 for establishing the equation.
  • The method presented in this paper is also applicable to multiple spoofing interference source localization scenarios; however, the applicable scenario requires that the located interfering source emits two or more spurious satellite signals. For multiple spoofing interference sources, the method in Section 3.1 of this paper can be used multiple times to extract multiple spoofing source signals. After the multiple spoofing sources are identified, the method described in Section 3.2 can be applied to each spoofing source to achieve efficient localization of multiple spoofing sources.

4. Simulations and Results

The effectiveness of the proposed method in this paper is evaluated through simulations, which are performed using the MATLAB R2021b software platform. The effectiveness of the proposed spoofing interference extraction and confirmation method is examined in Experiment 1. The effectiveness of the suggested method for locating deception interference is assessed in Experiments 2 through 4. Experiment 2 compares and tests the localization effects of spoofing interference using the proposed approach and the two-step methods under different carrier phase measurement errors along five typical monitoring paths. Experiment 3 compares and tests the spoofing interference localization effects of our method and the better two-step method under different antenna positioning errors as well as varying carrier phase measurement errors. The spoofing interference localization effect is examined in Experiment 4, considering a varying number of observation points. The aforementioned simulation experiments examine the key factors that influence the effectiveness of the proposed method, and the results substantiate the effectiveness of the proposed method while providing guidance for its practical application.

4.1. Simulation Scenario

In this section, we describe a simulation scenario where four real satellites and one spoofing jamming source are set up. The coordinates of the real satellites are set to [ 0   0   20,200,000 ] , [ 4,430,168   18,898,507   20,200,000 ] , [ 7,920,758 1,265,592   20,200,000 ] , and [ 15,905,180   5,155,887   20,000,000 ] , respectively, with the coordinate units being meters. The subsequent coordinates in the article are also in meters. The simulation experiments employ the GPS L1 C/A signal (with a carrier frequency of 1575.42 MHz), while the four satellite transmission signals are denoted as Sta1–Sta4, respectively. The satellite signals emitted by the spoofing interference source are consistent with the real signals. The receiving antenna array adopts the 6 + 1 array antenna model in Section 2.1, and the spacing between array elements, denoted as R , is set to λ / 2 , where λ represents the wavelength corresponding to the carrier frequency.
The schematic diagram of the simulation scenario is presented in Figure 8, with the interference monitoring area set to 1   k m × 1   k m × 200   m . To evaluate the method’s location effectiveness under various monitoring paths, five typical array antenna-based signal monitoring paths are set in combination with practical application.
Path 1 moves in a straight line from the initial coordinate [ 0   0   50 ] , along the same height, to the final coordinate [ 1000   1000   50 ] , with no relative displacement on the z-axis of the coordinate system. Path 2 proceeds in a straight trajectory from the initial coordinate [ 0   0   0 ] , following the diagonal direction within the monitoring region, to the termination coordinate [ 1000   1000   200 ] . Path 3 is a circular trajectory of radius 500 2 , centered at [ 500   500   50 ] , which exhibits no displacement along the z-axis. Path 4 is an elliptical trajectory that covers the entire surveillance area. The center of the ellipse is [ 500   500   100 ] , and the normal of the plane of the ellipse is perpendicular to Path 2. Path 5 moves in a straight line from coordinate [ 0   0   0 ] to coordinate [ 1000   1000   0 ] and then from coordinate [ 1000   1000   0 ] to coordinate [ 1000   1000   200 ] . The five paths are each divided into 41 evenly spaced observation points to collect data, resulting in a total of 205 observation points.
In practice, we find that the monitoring path has a larger impact on the signal location and search effect, but the relevant study content is smaller. Thus, typical monitoring paths are established in this paper to test the performance of the algorithm under different paths and, thus, guide the practical application of the method. The set of five paths are common paths in engineering practice that have relatively acceptable monitoring performance under the conditions of a given monitoring area. The characteristics of each path are described as follows:
  • Path 1 corresponds to the setting of covering the monitoring area with the shortest path at a fixed monitoring height under the condition that the monitoring platform height cannot be raised (such as limited airspace height or ground monitoring equipment scenarios).
  • Path 2 corresponds to the setting of covering the monitoring area with the shortest path under the condition that the height of the monitoring platform can rise.
  • Path 3 corresponds to the setting of covering the monitoring area with the maximum circular area under the condition that the monitoring platform height cannot be raised.
  • Path 4 corresponds to the setting of covering the monitoring area with the maximum elliptical area under the condition that the height of the monitoring platform can rise.
  • Path 5 corresponds to only supplementing the displacement setting in the z-direction on the basis of Path 1 under the condition that the height of the monitoring platform can rise.
To comprehensively evaluate the performance of the method, we localize the interference sources at different locations. The red squares in Figure 8 show the locations of spoofing interference sources, where the interference path is set to be a straight path. The starting and ending points are [ 100   500   100 ] and [ 100   500   1000 ] , respectively. Equidistant sampling is conducted between them, and a total of 10 points are taken as interference source localization test points.

4.2. Experiment 1: Spoofing Extraction Effects Based on the Double-Difference Carrier Phase

Considering that spoofing interference extraction has no restriction on the observation paths, this experiment uses 205 observation points from all five paths to test the effectiveness of the deception interference extraction method proposed in this paper. The location of the spoofing interference source is set to [ 500   500   100 ] , which is the center position of the interference monitoring region. The mean value of the carrier phase measurement error is set to 0, and the standard deviation is set to 0.005 × 2 π rad.
Prior to simulation testing, distinguishing between spoofing interference signals and genuine satellite signals is unattainable. The spoofing interference extraction methodology in this paper necessitates the concurrent utilization of eight signal tracking channels to monitor both the authentic satellite signal and the spoofed interference signal, thus enabling carrier phase measurements on all eight satellite signals. We numbered the 8 tracking channels as 1–8, with channels 1 and 2 receiving the Sta1 signal, channels 3 and 4 receiving the Sta2 signal, channels 5 and 6 receiving the Sta3 signal, and channels 7 and 8 receiving the Sta4 signal.
The carrier phase measurements between antenna elements 1 and 0 are utilized for the carrier phase single-difference calculation in the experiment. Subsequently, the single-difference measurement values of signal channels 1 and 2 are subtracted from those of signal channels 3–8, respectively, to compute the double-differenced carrier phase.
The comparison between the double-differenced carrier phase observation values and the set threshold is depicted in Figure 9. Figure 9a presents the double-differenced carrier phase results for channels 3–8 and channel 1, while Figure 9b displays the results for channels 3–8 and channel 2. The horizontal axis in Figure 9 represents the sequential numbering of the observed points, while the vertical axis corresponds to the double-difference carrier phase measurements at these points, denoted in units of 2 π   r a d . We set the double-difference carrier phase threshold T h for spoofing interference extraction as 0.04 × 2 π   r a d .
Although there is a situation in Figure 9a where sporadic double-difference measurement results are below the threshold, it lacks continuity. In Section 3.1, the method stipulates that there must be five consecutive observation points with double-difference carrier phase measurements smaller than the set threshold in order to determine that the two satellite signals are from the same spoofing interference source, thus avoiding such false alarms. The double-difference measurement values of 4–2, 6–2, and 7–2 in Figure 9b fall below the threshold, indicating that the satellite signals tracked by channels 2, 4, 6, and 7 originate from the same deceptive interference signal. The effectiveness of the spoofing interference extraction method in this paper is tested using 205 observations from the five paths. Every five observation points is a test, making a total of 41 tests. The results are statistically analyzed, and the probability of successful extraction of spoofing interference signals is 100 % , and the missing alarm rate is 0 % . The experimental results demonstrate that the extraction of spoofing interference based on the method double-differenced carrier phase can effectively separate the spoofing signals from the authentic signals.
It is worth mentioning here that multi-path can affect the effectiveness of the method in this paper and generate false positives in real-world applications, and we would like to reduce the effect of multi-path on the effectiveness of the method by improving the application details in this paper. Multi-path may affect the effectiveness of the proposed method in a certain multi-path region for a short period of time, but as the monitoring platform moves over a large area, it can avoid or reduce the effect of multi-path on the effectiveness of the proposed method. In order to achieve effective deception, the spoofing interference source needs to transmit deception signals for a long time so it can appropriately increase the number requirement of observation points that meet the above conditions (for example, the double-differenced carrier phase observations of 10 consecutive observation points are less than the set threshold), or meet the continuous observation distance requirement while meeting the continuous observation points requirement (for example, the double-differenced carrier phase observations of 100 m consecutive observation distance are less than the set threshold), enabling the method to achieve deception interference confirmation over a large observation range, so as to eliminate or weaken the influence of multi-path on the effectiveness of the proposed method to a certain extent.

4.3. Experiment 2: Spoofing Localization Effects at Different Carrier Phase Measurement Errors

This experiment tests the effectiveness of different GNSS spoofing interference source localization methods under different carrier phase measurement errors along the above five paths. The experimental comparison methods include the method proposed in this article, the global search method for the cost function of Equation (16), and two typical two-step methods. In the two-step comparison methods, the measurements of the arrival angle of deceptive interference signal by array antennas are both implemented using the approach described in reference [38]. Two-step Method 1 employs the Beamsum Criterion principle from reference [39] to locate the spoofing interference source, while Two-step Method 2 utilizes the least squares principle from reference [39] for locating the deceptive source.
To comprehensively evaluate the performance of the proposed method, Experiment 2 tests the effects of the proposed method under different spoofing interference source location settings and performs statistics on the location results. The spoofing source locations setup are shown in Figure 8. According to references [40,41], while ensuring effective tracking, the setting range for the standard deviation of carrier phase measurements in this experiment is 0.005 × 2 π   r a d 20 × 0.005 × 2 π   r a d , with a mean value set at 0 and measured in radians. The standard deviation of the self-positioning error of the array antennas is set to 1 with a mean value of 0 and units are meters.
The second experiment involves conducting 100 tests for each carrier measurement error setting, wherein all 10 interference sampling points in the interference path shown in Figure 8 are located for each test. Subsequently, the root mean square errors (RMSEs) of the aforementioned 1000 location results are calculated. In each test, we conducted 10 carrier phase single-difference observations and constructed matrix W using Equations (20) and (22). The experimental results are presented in Figure 10, where Figure 10a–e illustrates the comparative outcomes among different methodologies across five paths. The horizontal axis of the figure represents the standard deviation of the carrier phase measurement error, measured in 0.005 π   r a d , while the vertical axis represents the localization RMSE, measured in meters. Simulation results demonstrate that as the carrier phase measurement error increases, the proposed method exhibits significantly superior location accuracy compared to the two-step methods, and it closely approximates the CRB and the global search method. This demonstrates that the proposed method is more adaptable to carrier measurement errors and is more suitable for spoofing interference monitoring applications in the dynamic scenario of this paper. Figure 10f compares the location performance of our method under five monitoring paths, among which straight paths 1, 2, and 5 are better than circular paths 3 and 4. Path 5 has the best performance among the straight paths due to its displacement in both horizontal and vertical directions. Therefore, we choose path 5 as the recommended path for our method.
In this experiment, we recorded the number of iterations of the method and the normalized value of the cost function Equation (16) while the method was running and statistically analyzed the mean value of the normalized cost function for 1000 experiments. Figure 11 shows the relationship between the number of iterations and the mean value of the normalized cost function under the five test paths of this experiment. The results show that the five test paths can converge after six iterations. To ensure the effectiveness of the algorithm, the number of iterations in this paper is set to eight.

4.4. Experiment 3: Spoofing Localization Effects under Different Antenna Positioning Errors

This experiment tests the spoofing interference localization effects of our method under different antenna localization errors and carrier phase measurement errors and selects the Two-step Method 1 with better localization effect as the comparison method. The spoofing interference source setup, carrier phase measurement error setup, and localization accuracy statistics for the spoofing interference source in the experiment are consistent with those in Section 4.2.
The mean values of the antenna positioning errors in Experiment 3 are all set to 0, and the standard deviation values are set to 1, 5, 15, 20, 30, and 50, respectively, in meters. Here, the standard deviation settings of 1 and 5 correspond to the positioning accuracy that can be achieved by a typical 7-element null antenna under static and low-speed motion, the settings of 15 and 20 correspond to the positioning accuracy of the array antenna under conventional motion, and the settings of 30 and 50 correspond to the positioning accuracy of the array antenna under high-speed motion.
The experimental results are shown in Figure 12, where Figure 12a,b shows the spoofing interference localization effects of the proposed method and the Two-step Method 1 under different antenna positioning error settings, respectively. The horizontal and vertical coordinate settings in Figure 12 are consistent with those in Figure 10. The simulation results show that the proposed method has stronger adaptability to antenna positioning errors compared to the two-step method, making it more suitable for deception interference monitoring applications in dynamic scenarios in this paper. As the antenna array positioning error increases, the main factor affecting the spoofing location effect of the method in this paper changes from carrier phase measurement error to antenna positioning error.

4.5. Experiment 4: Spoofing Localization Effects Considering Varying Numbers of Observation Points

Experiment 4 tests the effectiveness of the proposed method in spoofing interference localization under different numbers of observation points. The spoofing interference source settings, carrier phase measurement error settings, antenna positioning error settings, and the positioning accuracy statistical methods for deception interference sources in the experiment are consistent with Section 4.2. The experimental path used in the experiment is recommended Path 5, with the number of observation points set to 11, 21, 41, 61, and 81, respectively, and each observation point number setting is uniformly sampled of Path 5. The experimental results are shown in Figure 13, where the horizontal and vertical coordinate settings are consistent with those of Figure 10.
Simulation results show that the spoofing interference localization effect of the proposed method improves as the number of observation points increases. However, as the number of observation points increases, the improvement of the spoofing interference localization effect decreases, and the increase in the number of observation points leads to a significant increase in computational complexity. Considering the cost of the implementation of the method, the recommended number of observation points for the monitoring region set in the experimental scenario in this paper is 21 or 41.

4.6. Experiment 5: Spoofing Localization Effects Considering Compatibility at Different Frequency Points

The GNSS navigation band is not a continuous broadband but consists of multiple narrow bands with fixed carrier frequencies, so we typically use a 6 + 1 model to cover a narrow GNSS band and a dual 7-element design to cover a dual GNSS band in practice. For example, an antenna array commonly used in our practical applications that covers the navigation frequency bands of GPS L1 (1575.42 MHz), BDS B1 (1561.098 MHz), and BDS B3 (1268.52) generally consists of two circles of array elements. The antenna elements in the outer circle are arranged with the 1/2 wavelength of the BDS B3 frequency point as the baseline, while the antenna elements in the inner circle need to consider both GPS L1 and BDS B1. To avoid the occurrence of integer ambiguity, we choose half of the shorter wavelength GPS L1 wavelength as the baseline for layout, so we should consider the compatibility of the above layout method at the BDS B1 frequency point.
Experiment 5 tests the effectiveness of the proposed method for the localization effect of deception interference sources at GPS L1 frequency point and BDS B1 frequency point under the above antenna setting. The spoofing interference source settings, carrier phase measurement error settings, antenna positioning error settings, and the positioning accuracy statistical methods for deception interference sources in the experiment are consistent with Section 4.5. The numbers of observation points are set to 21 and 41, respectively. The experimental results are shown in Figure 14, where the horizontal and vertical coordinate settings are consistent with those of Figure 10.
Simulation results show that under the proposed GPS L1 antenna design, the localization effect of the proposed method is essentially the same for both BDS B1 and GPS L1 frequency point spoofing interference sources, while the BDS B1 effect is slightly reduced. The proposed method is compatible with GPS L1 and BDS B1 frequency points, which enables efficient localization of spoofing interference at the aforementioned frequency points.

5. Conclusions

In this paper, we propose a GNSS spoofing interference source localization method based on a moving array antenna. The method has strong usability and is suitable for navigation nulling antenna hardware platforms, enabling it to have both anti-interference and deceptive interference detection and localization capabilities. This paper elaborates on the antenna model and navigation signal acquisition and tracking methods used in the implementation of the proposed method. Based on this, GNSS spoofing interference source localization is proposed in this paper. The proposed method first uses a spoofing interference extraction method based on a double-differenced carrier phase to effectively separate the deceptive and real signals. After the spoofing interference is extracted, the original carrier phase single-difference data of the spoofing signal from multiple observation points is fused through a moving antenna array to directly localize the spoofing interference. The procedure for calculating the CRB of the proposed method is also provided.
Simulations are used to test the effectiveness of this approach. Simulation results show that this approach effectively solves the spoofing interference extraction and location problems. Simulation results also show that the proposed method is nicely adapted to carrier phase measurement errors and antenna positioning errors and that the proposed method is close to CRB. Based on the test results, the recommended monitoring path and the number of observation points for the proposed method are given. Subsequent work will test the method in combination with a physical platform to test the detection and location effects of spoofing interference in real-world scenarios. At the same time, the effectiveness of the method in the multi-path scenario will be the focus of our physical platform tests. The effectiveness of multi-path weakening means, and the effects of the parameter settings (such as the number requirement of observation points) will be explained in combination with the physical platform test effect of this method.

Author Contributions

Conceptualization, Z.Y. and G.L.; Methodology, R.L. and Q.C.; Resources, Q.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Program of China under Project 2018YFB0505100.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lorraine, K.; Ramarakula, M. A Comprehensive Survey on GNSS Interferences and the Application of Neural Networks for Anti-jamming. IETE J. Res. 2021, 69, 4286–4305. [Google Scholar] [CrossRef]
  2. Pavlovčič-Prešeren, P.; Dimc, F.; Bažec, M. A Comparative Analysis of the Response of GNSS Receivers under Vertical and Horizontal L1/E1 Chirp Jamming. Sensors 2021, 21, 1446. [Google Scholar] [CrossRef] [PubMed]
  3. Liu, R.; Yang, Z.; Chen, Q.; Liao, G.; Zhen, W. GNSS multi-interference source centroid location based on clustering centroid convergence. IEEE Access 2021, 9, 108452–108465. [Google Scholar] [CrossRef]
  4. Truong, V.; Vervisch-Picois, A.; Rubio Hernan, J.; Samama, N. Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias. Sensors 2023, 23, 2735. [Google Scholar] [CrossRef] [PubMed]
  5. Yang, Q.; Zhang, Y.; Tang, C.K. A combined antijamming and antispoofing algorithm for GPS Arrays. Int. J. Antennas Propag. 2019, 2019, 8012569. [Google Scholar] [CrossRef]
  6. Wang, Y.; Hao, J.M.; Liu, W.P.; Wang, X. Dynamic evaluation of GNSS spoofing and jamming efficacy based on game theory. IEEE Access 2020, 8, 13845–13857. [Google Scholar] [CrossRef]
  7. Jeong, S.; Lee, J. Synthesis algorithm for effective detection of GNSS spoofing attacks. Int. J. Aeronaut. Space Sci. 2020, 21, 251–264. [Google Scholar] [CrossRef]
  8. Meng, L.; Yang, L.; Yang, W.; Zhang, L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022, 14, 4826. [Google Scholar] [CrossRef]
  9. Wesson, K.D.; Gross, J.N.; Humphreys, T.E.; Evans, B.L. GNSS signal authentication via power and distortion monitoring. IEEE Trans. Aerosp. Electron. Syst. 2017, 54, 739–754. [Google Scholar] [CrossRef]
  10. Miralles, D.; Bornot, A.; Rouquette, P.; Levigne, N.; Walter, T. Assessment of GPS Spoofing Detection via Radio Power and Signal Quality Monitoring for Aviation Safety Operations. IEEE Intell. Transp. Syst. Mag. 2020, 12, 136–146. [Google Scholar] [CrossRef]
  11. Laverty, D.M.; Kelsey, C.; O’ Raw, J.B. GNSS time signal spoofing detector for electrical substations. IEEE Trans. Smart Grid 2021, 13, 1468–1477. [Google Scholar] [CrossRef]
  12. Wesson, K.D.; Rothlisberger, M.P.; Humphreys, T.E. A Proposed Navigation Message Authentication Implementation for Civil GPS Anti-Spoofing. In Proceedings of the 24th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, OR, USA, 20–23 September 2011. [Google Scholar]
  13. Chen, J.; Xu, Y.; Yuan, H.; Yuan, Y. A new GNSS spoofing detection method using two antennas. IEEE Access 2020, 8, 110738–110747. [Google Scholar] [CrossRef]
  14. Kalantari, A.; Larsson, E.G. Statistical test for GNSS spoofing attack detection by using multiple receivers on a rigid body. EURASIP J. Adv. Signal Process. 2020, 2020, 8. [Google Scholar] [CrossRef]
  15. Amin, M.G.; Wang, X.; Zhang, Y.D.; Ahmad, F.; Aboutanios, E. Sparse arrays and sampling for interference mitigation and DOA estimation in GNSS. Proc. IEEE 2016, 104, 1302–1317. [Google Scholar] [CrossRef]
  16. Mills, K.; Ahmad, F.; Amin, M.G.; Himed, B. Fast Iterative Interpolated Beamforming for Interference DOA Estimation in GNSS Receivers Using Fully Augmentable Arrays. In Proceedings of the 2019 IEEE Radar Conference (RadarConf), Boston, MA, USA, 22–26 April 2019. [Google Scholar] [CrossRef]
  17. Fresno, J.M.; Robles, G.; Martínez-Tarifa, J.M.; Stewart, B.G. Survey on the Performance of Source Localization Algorithms. Sensors 2017, 17, 2666. [Google Scholar] [CrossRef] [PubMed]
  18. Chen, Q.D.; Tao, H.H.; Liu, R.; Zhen, W.M. Time difference estimation method for TDOA location of GNSS weak interference. J. China Acad. Electron. Inf. Technol. 2020, 15, 135–140. [Google Scholar] [CrossRef]
  19. Liu, R.; Yang, Z.; Chen, Q.; Liao, G.; Zhen, W. Centroid localization method of GNSS jamming source based on signal propagation correction. Syst. Eng. Electron. 2021, 43, 2083–2089. [Google Scholar] [CrossRef]
  20. Pavlovčič-Prešeren, P.; Dimc, F.; Bažec, M. Exploiting the Sensitivity of Dual-Frequency Smartphones and GNSS Geodetic Receivers for Jammer Localization. Remote Sens. 2023, 15, 1157. [Google Scholar] [CrossRef]
  21. Shang, S.; Li, H.; Peng, C.; Lu, M. A novel method for GNSS meaconer localization based on a space–time double-difference model. IEEE Trans. Aerosp. Electron. Syst. 2020, 56, 3432–3449. [Google Scholar] [CrossRef]
  22. Bhamidipati, S.; Gao, G.X. GPS multireceiver joint direct time estimation and spoofer localization. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 1907–1919. [Google Scholar] [CrossRef]
  23. Yin, J.; Wang, D.; Wu, Y. An Efficient Direct Position Determination Method for Multiple Strictly Noncircular Sources. Sensors 2018, 18, 324. [Google Scholar] [CrossRef] [PubMed]
  24. Weiss, A.J.; Amar, A. Direct position determination of multiple radio signals. EURASIP J. Appl. Signal Process. 2005, 1, 653549. [Google Scholar] [CrossRef]
  25. Li, J.; Yang, L.; Guo, F. Coherent summation of multiple short-time signals for direct positioning of a wideband source based on delay and Doppler. Digit. Signal Process. 2016, 48, 58–70. [Google Scholar] [CrossRef]
  26. Xu, H.; Cui, X.; Lu, M. An SDR-Based Real-Time Testbed for GNSS Adaptive Array Anti-Jamming Algorithms Accelerated by GPU. Sensors 2016, 16, 356. [Google Scholar] [CrossRef] [PubMed]
  27. Caizzone, S.; Elmarissi, W.; Buchner, G.; Sgammini, M. Compact 6+ 1 antenna array for robust GNSS applications. In Proceedings of the 2016 International Conference on Localization and GNSS (ICL-GNSS), Barcelona, Spain, 28–30 June 2016. [Google Scholar] [CrossRef]
  28. Zeng, Q.; Qiu, W.; Zhang, P.; Zhu, X.; Pei, L. A Fast acquisition algorithm based on division of GNSS signals. J. Navig. 2018, 71, 933–954. [Google Scholar] [CrossRef]
  29. Borio, D. GNSS Data/Pilot Combining with Extended Integrations for Carrier Tracking. Sensors 2023, 23, 3932. [Google Scholar] [CrossRef]
  30. Zhao, H.; Lian, B.; Feng, J. Adaptive beamforming and phase bias compensation for GNSS receiver. J. Syst. Eng. Electron. 2015, 26, 10–18. [Google Scholar] [CrossRef]
  31. Zhao, L.; Blunt, P.; Yang, L.; Ince, S. Performance Analysis of Real-Time GPS/Galileo Precise Point Positioning Integrated with Inertial Navigation System. Sensors 2023, 23, 2396. [Google Scholar] [CrossRef]
  32. Cui, J.H.; Cheng, N.P.; Ni, S.Y. Research on spoofing suppressing method using antenna array for navigation signal. ACTA Electonica Sin. 2018, 46, 365. [Google Scholar] [CrossRef]
  33. Roberts, G.W. Noise comparison of triple frequency GNSS carrier phase, doppler and pseudorange observables. Measurement 2019, 144, 328–344. [Google Scholar] [CrossRef]
  34. China Satellite Navigation Office (CSNO). Beidou/Global Navigation Satellite System (GNSS) Measurement Receiver Observation Data Quality Evaluation Method. Available online: http://www.beidou.gov.cn/yw/gfgg/201712/W020171225739347636713.pdf (accessed on 12 November 2023).
  35. Retscher, G.; Kiss, D.; Gabela, J. Fusion of GNSS Pseudoranges with UWB Ranges Based on Clustering and Weighted Least Squares. Sensors 2023, 23, 3303. [Google Scholar] [CrossRef] [PubMed]
  36. Liu, Z.; Hu, D.; Zhao, Y.; Zhao, Y. An algebraic method for moving source localization using TDOA, FDOA, and differential Doppler rate measurements with receiver location errors. EURASIP J. Adv. Signal Process. 2019, 2019, 25. [Google Scholar] [CrossRef]
  37. Li, J.; Lv, S.; Jin, Y.; Wang, C.; Liu, Y.; Liao, S. Geolocation and Tracking by TDOA Measurements Based on Space–Air–Ground Integrated Network. Remote Sens. 2023, 15, 44. [Google Scholar] [CrossRef]
  38. Magiera, J.; Katulski, R. Detection and mitigation of GPS spoofing based on antenna array processing. J. Appl. Res. Technol. 2015, 13, 45–57. [Google Scholar] [CrossRef]
  39. Mir, H.S.; Sahr, J.D.; Hatke, G.F.; Keller, C.M. Passive source localization using an airborne sensor array in the presence of manifold perturbations. IEEE Trans. Signal Process. 2007, 55, 2486–2496. [Google Scholar] [CrossRef]
  40. Kaplan, E.; Hegarty, C. Understanding GPS Principles and Applications, 2nd ed.; British Library Cataloguing in Publication Data; Artech House: Boston, MA, USA, 2006; pp. 1–723. [Google Scholar]
  41. Yang, R.; Ling, K.-V.; Poh, E.-K.; Morton, Y. Generalized GNSS Signal Carrier Tracking: Part I—Modeling and Analysis. IEEE Trans. Aerosp. Electron. Syst. 2017, 53, 1781–1797. [Google Scholar] [CrossRef]
Figure 1. Typical application scenarios for the method.
Figure 1. Typical application scenarios for the method.
Remotesensing 15 05497 g001
Figure 2. The 6 + 1 antenna model.
Figure 2. The 6 + 1 antenna model.
Remotesensing 15 05497 g002
Figure 3. Schematic diagram of signal reception and processing.
Figure 3. Schematic diagram of signal reception and processing.
Remotesensing 15 05497 g003
Figure 4. Structural diagram of the signal tracking loop.
Figure 4. Structural diagram of the signal tracking loop.
Remotesensing 15 05497 g004
Figure 5. Calibration diagram of multiple hardware channels.
Figure 5. Calibration diagram of multiple hardware channels.
Remotesensing 15 05497 g005
Figure 6. Scenario model of spoofing interference direct localization.
Figure 6. Scenario model of spoofing interference direct localization.
Remotesensing 15 05497 g006
Figure 7. Flow chart of the proposed method.
Figure 7. Flow chart of the proposed method.
Remotesensing 15 05497 g007
Figure 8. Schematic diagram of the simulation scenario.
Figure 8. Schematic diagram of the simulation scenario.
Remotesensing 15 05497 g008
Figure 9. Comparison of the double-difference carrier phase observables with the set threshold. (a) Double-difference results with channel 1; (b) Double-difference results with channel 2.
Figure 9. Comparison of the double-difference carrier phase observables with the set threshold. (a) Double-difference results with channel 1; (b) Double-difference results with channel 2.
Remotesensing 15 05497 g009
Figure 10. Test results from Experiment 2. (a) Comparison of localization effects of various methods under Path 1; (b) Comparison of localization effects of various methods under Path 2; (c) Comparison of localization effects of various methods under Path 3; (d) Comparison of localization effects of various methods under Path 4; (e) Comparison of localization effects of various methods under Path 5; (f) Comparison of our method under five monitoring paths.
Figure 10. Test results from Experiment 2. (a) Comparison of localization effects of various methods under Path 1; (b) Comparison of localization effects of various methods under Path 2; (c) Comparison of localization effects of various methods under Path 3; (d) Comparison of localization effects of various methods under Path 4; (e) Comparison of localization effects of various methods under Path 5; (f) Comparison of our method under five monitoring paths.
Remotesensing 15 05497 g010aRemotesensing 15 05497 g010b
Figure 11. Statistical results for the normalized cost function under different number of iterations.
Figure 11. Statistical results for the normalized cost function under different number of iterations.
Remotesensing 15 05497 g011
Figure 12. Test results from Experiment 3. (a) Comparison of localization effects under different antenna positioning error settings of the proposed method; (b) Comparison of localization effects under different antenna positioning error settings of the Two-step Method 1.
Figure 12. Test results from Experiment 3. (a) Comparison of localization effects under different antenna positioning error settings of the proposed method; (b) Comparison of localization effects under different antenna positioning error settings of the Two-step Method 1.
Remotesensing 15 05497 g012
Figure 13. Comparison of localization effects at varying numbers of observation points.
Figure 13. Comparison of localization effects at varying numbers of observation points.
Remotesensing 15 05497 g013
Figure 14. Comparison of localization effects at different frequency points.
Figure 14. Comparison of localization effects at different frequency points.
Remotesensing 15 05497 g014
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, R.; Yang, Z.; Chen, Q.; Liao, G.; Zhu, Q. Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna. Remote Sens. 2023, 15, 5497. https://doi.org/10.3390/rs15235497

AMA Style

Liu R, Yang Z, Chen Q, Liao G, Zhu Q. Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna. Remote Sensing. 2023; 15(23):5497. https://doi.org/10.3390/rs15235497

Chicago/Turabian Style

Liu, Rui, Zhiwei Yang, Qidong Chen, Guisheng Liao, and Qinglin Zhu. 2023. "Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna" Remote Sensing 15, no. 23: 5497. https://doi.org/10.3390/rs15235497

APA Style

Liu, R., Yang, Z., Chen, Q., Liao, G., & Zhu, Q. (2023). Localization of GNSS Spoofing Interference Source Based on a Moving Array Antenna. Remote Sensing, 15(23), 5497. https://doi.org/10.3390/rs15235497

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop