As Global Navigation Satellite System (GNSS) spoofing techniques are highly stealthy and pose a tremendous risk to targets using GNSS technology, studies on GNSS spoofing techniques have been in the spotlight. If the accurate position and velocity of the target receiver can be obtained, the target receiver can be covertly spoofed during the signal tracking stage using synchronous lift-off spoofing. However, it is often difficult to accurately obtain the position and velocity of a target in real GNSS spoofing scenarios. To address this problem, To study the effects of spoofing signals' power (relative to the real signal), code pulling rate, carrier Doppler shift, initial code phase difference, and carrier phase difference on the efficacy of spoofing, the intrusion of receiver's signal tracking loop by spoofing signals is mathematically modeled. Based on the model, an asynchronous lift-off spoofing for GNSS receivers in the signal tracking stage is proposed. Theoretical analysis and experimental results show that the new method resulted in stable Doppler frequency variations, short fluctuations in carrier-to-noise ratio (C/N) and signal lock time, and gentle changes to the receiver's 3D Earth-Centered Earth Fixed (ECEF) coordinates, when the target's position and velocity were approximately known during the intrusion period. The proposed spoofing method is highly feasible and could expand the scope of applicability of lift-off spoofing.
Satellite navigation spoofing has become a central issue of jamming technology research because of its serious threat and ability to conceal itself. Increasingly, targets are equipped with more robust GNSS/IMU systems and normalized innovation squared (NIS) is used to detect interference. Therefore, it is harder to implement covert trajectory spoofing on a GNSS/IMU system than a GNSS-only target. In practice, spoofing is needed to control unknown targets. Therefore, covert trajectory spoofing for GNSS/IMU targets is an important issue. Hence, using the information fusion of a GNSS/IMU system, the influence of spoofing on loosely coupled GNSS/IMU positioning is derived. To avoid ill-posed equations when introducing a measurement deviation, a Kalman gain matrix local regularization method is proposed to accurately determine the measurement deviation. To avoid triggering the NIS detection alarm, the range that enables the introduced measurement deviation to remain concealed is calculated. Then, a two-step trajectory guidance algorithm is proposed to quickly guide the target onto the spoofing trajectory. The simulation results show that the proposed trajectory spoofing algorithm can guide a loosely coupled GNSS/IMU target along a spoofing trajectory without triggering the NIS detection alarm. The proposed method can remain concealed and has good theoretical and practical application value. INDEX TERMS Spoofing interference, trajectory spoofing, local regularization method, two-step trajectory guidance algorithm, concealment, GNSS/IMU, NIS.
Vehicle and airborne navigation users are facing more and more complex signal interference and even spoofing. If vehicles and aircraft do not strengthen their anti-spoofing ability, their navigation performance is bound to be adversely affected. global navigation satellite system (GNSS) spoofing technology has gradually become a preferred interference method for spoofer because of its high concealment and great harm. For spoofer, user terminal increasingly adopts GNSS with inertial measurement unit (IMU): tightly-coupled GNSS/IMU, on this basis, user also configures a variety of anti-spoofing techniques to effectively deal with spoofing. Even if spoofer slowly changes user's positioning, if spoofing strategy is unreasonable, it will lead to the violation of parameter rationality of coupled filter output parameters and spoofing observation, which greatly increases the difficulty of spoofing. In view of the above problems, from the perspective of spoofer, in order to effectively counter the non cooperative target of assembling tightly-coupled GNSS/IMU by using GNSS spoofing, this paper establishes GNSS spoofing mathematical model, and proposes a slowly varying spoofing algorithm to avoid tightlycoupled GNSS/IMU with multiple anti-spoofing techniques based on the analysis of the influence mechanism of spoofing on the positioning of tightly-coupled GNSS/IMU, the algorithm proposes a measurement deviation determination method to avoid a variety of anti-spoofing techniques, which can gradually pull the positioning results of coupled system, and successfully avoid anti-spoofing techniques detection of least squares residual receiver autonomous integrity monitoring (RAIM) and parameter rationality check. The experimental results show that the algorithm can gradually change positioning of tightly-coupled GNSS/IMU within 30 s, and the north, east and down displacements basically achieve the spoofing effect, the errors with the expected offset are −0.5 m, 1.9 m and 12.7 m respectively. At the same time, the detection of the above anti-spoofing techniques is avoided. The mean value of test statistics for tightly-coupled system is reduced by 75.4% and does not exceed the alarm threshold, so as to achieve the purpose of spoofing, the effectiveness and high concealment of the spoofing algorithm are proved.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.