Keywords

1 Introduction

GPS system and its vast application have achieved such a great success that almost every sector of today’s society relies on its functionality. Therefore, criminals would be more motivated to sabotage it. Recent years have witnessed a rapid rise of incidents caused by GPS interference both unintentionally and intentionally. Amongst these interferences, a method named spoofing has drawn large attention because of stealth and dangerous potential. Spoofing is able to covertly coerce a GPS receiver to output incorrect timing and positioning solution. Spoofing device transmits signals that resemble true GPS signal in vicinity of intended victim, in order to disturb victim’s tracking of authentic signal, finally capture its tracking loop.

No concern on GPS security was spent during construction, especially the C/A signal on GPS L1 frequency. Most civilian receivers have no precautions against spoofing. They would utilize any signal available to estimate observables in purpose of positioning. This straightforward but fragile logic leaves a backdoor to various spoofing and interference.

Many methods have been proposed to tackle with malicious interference and spoofing against GPS. Some of them need modification to hardware of existing receivers, such as adding AGC monitor [2] (to monitor signal power), or adding more antenna or cooperation between receiver [3] (to estimate direction of arrival). However, the expense makes updating hardware of existing receivers impossible. Some papers propose single-antenna receiver defence method based on baseband signal processing, requiring no modification to hardware of receivers and signal regime.

Reference [4] proposes that, anomaly occurred during the capture of tracking loop can be detected by monitoring the symmetry of triangular-shaped correlation function of ranging code. This method has high false alarm rate in strong multipath environment, and its transient nature easily confuses with false alarm. Reference [6] points out that monitoring abnormal changes in carrier to noise ratio (C/N0) has potential to detect spoofing. Meanwhile, reference [6] also points out this method is limited without hardware modification. Reference [7] uses cross-correlation of in-phase component of correlation value to discriminate whether the received signals are transmitted from one antenna. But this requires receiver moving in a shading-variation scenario. Reference [1] intensively reviews this type of defence methods.

In summary, methods based on signal feature are somewhat flawed, leading to limited effectiveness in actual use. Considering these facts, this paper proposes a fundamental framework supported by a novel running logic. This framework converts extra computation capability in a receiver into the ability of anti-spoofing. By acquiring and tracking all signals regardless of authenticity, this framework enables defence against various spoofing methods (including simulator attack, meaconing attack and intermediate spoofing attack) after knowing signal characteristics.

This rest part is arranged as follow. The second section characterizes the assumptions and features of spoofing signal, and roughly analyses viable defence. The third and fourth sections introduce the proposed mechanism for the acquisition and tracking of spoofing signal. The fifth section shows experimental results on over-the-air GPS signal. The sixth section comprises conclusion and discussion.

2 Analysis of Spoofing Attack

2.1 Assumptions and Premises

According to their nature, attacks on GPS receivers can be roughly categorized into two types, i.e., jamming and spoofing. Jamming refers to attack in which transmission of interference signal disrupts tracking or acquisition of satellite signal. Some jamming signal suppresses the amplifier of victim receiver into non-linear state, blocking receiver baseband processing away from true signal. Some jamming triggers loss of lock in tracking loop. Nonetheless, this type of attack will raise alarm by disrupting normal working of receiver, thus preventing further damage. On the contrary, spoofing signal needs infiltration into baseband and capture of tracking loop. This precludes extremely large signal power. Spoofing signal with power larger than true signal can be detected by power monitoring [2].

All spoofing methods mentioned above are coarse and primitive, especially compared to the novel and inexpensive spoofing method proposed by [5]. The most advantage of this method is stealth. It does not cause any loss of lock and cannot be detected by power monitoring. Concerning its characteristic, we make several assumptions as follow:

  1. 1.

    The low noise amplifier (LNA) of receiver still works in linear state;

  2. 2.

    Spoofing signal has similar power with authentic signal;

  3. 3.

    No nulling or shading of true signal transmitted from GPS satellites.

The assumptions of spoofing signal are reasonable. We only focus on advanced and cost-limited spoofing approaches, not those can be defeated by simple defense methods such as power monitoring. Therefore, these assumptions agree with the capability of existing spoofing techniques, and suffice to circumvent simple anti-spoofing methods.

2.2 Characteristics of Spoofing Signals

Several premises about spoofing and authentic signal have been previously assumed. In this section, characteristics of the signal under assumptions above will be analyzed:

Assumption 1 guarantees that the receiver still is able to receive and acquire GPS signal (no matter of the authenticity);

Assumption 2 ensures that spoofing signal neither does not simply suppress true signal under noise floor, nor the inter-address interference is large enough to prevent acquiring the true ones;

Assumption 3 guarantees the availability of true signal, which means true signal still can be acquired.

With these assumptions, the received signal is the mixture of spoofing signals and authentic ones, and both can be acquired and tracked steadily. As we can see from Sect. 1, most spoofing techniques (ranging from simplest simulator attack to sophisticated spoofing) aiming at civilian receivers need “drag” the timing and positioning solution of a victim from its real time-space point, while a GPS receiver resolves by measuring the transmit time of present signal. Consequently, most spoofing attempts necessarily deviate from true signal in transmit time observables.

This mixed signal appears more than one recognizable peak in the correlation domain used in acquisition. This phenomenon differentiates itself from the single peak scene under normal circumstance. Therefore, this mixed signal could be named as “multi-peak signal”. In next section we propose an acquisition algorithm in purpose of acquiring multi-peak signal.

3 Multi-peak Acquisition

From the analysis of the characteristic in previous section, it could be seen that the multi-peak signal can be discriminated by the multiple peaks in the correlation domain.

3.1 Recognition and Acquisition of Multi-peak Signal

In the discrete code phase-Doppler frequency domain used in acquisition stage, a correlation peak comprises several relatively large values on adjacent grids. True signal only contains one correlation peak, if no strong multipath or spoofing signal imposed. Whereas the mixed signal shows multiple correlation peaks (when transmit time or Doppler frequency differs from each other), meaning that there would be several areas containing relatively large correlation values in the mentioned domain.

The acquisition algorithm of a normal receiver often searches for the maximum of correlation values and corresponding code phase and Doppler frequency, or find the correlation value larger than a preset threshold in a sequential search. The naivety of this strategy incapacitates acquiring all correlation peaks stemming from mixed signal. Thus, some modifications to the traditional acquisition strategy are necessary. Existing acquisition algorithm can be modified to output information about multiple correlation peaks rather than only one peak. Maximum search method should be changed into multiple maxima search method; threshold method should find all correlation points exceeding the threshold as output. Thus, multi-peak acquisition algorithm outputs several code phase and Doppler frequency pairs that can initialize tracking channels.

However, one correlation peak always causes several relatively large correlation values (or larger than preset threshold) on code phase-Doppler frequency grids. Hence, if these acquisition results are directly utilized to initialize tracking channels, there would be a great waste in computation resources. By analyzing the structure of correlation peak, we could cluster these raw results to reduce computing consumption.

Correlation peak clustering exploits the structure of correlation peak, and these raw results originated from a single correlation peak are contiguous. This fact facilitates the clustering and recognition algorithm based on comparing the code phases and Doppler frequencies of raw results. The procedure can be listed as:

  1. (1)

    Clustering the raw results according to their code phases and Doppler frequencies. Ensures that within same correlation peak set the range of code phase does not exceed one code chip, and the range of Doppler frequency does not exceed coherence bandwidth;

  2. (2)

    The number of points accumulated in a correlation peak set is marked as “support” of the correlation peak set;

  3. (3)

    In high C/N0 scenario, delete all the correlation peak set with support of 1, and the rest is remained as initial values for tracking channels, which would reduce computation burden largely. In low C/N0 scenario, all the raw results are needed to prevent missing any potential signal (Fig. 1).

    Fig. 1
    figure 1

    Acquisition of multi-peak signal

3.2 Parameters and Performance

For multi-maxima method, the only configurable parameter is the number of multi-maximum. Since one correlation peak causes several maxima according to the configuration of acquisition, and the number of correlation peaks have linear impact on the multiplicity of maxima as long as the overlapping of different correlation peak is limited. Therefore, to set the number of maxima, parameters of acquisition and the expected number of correlation peaks have to be taken into consideration. If the parameter N is set too low, there probably would be miss detection of possible correlation peaks; if too large, it would aggravate computation burden.

The threshold decision method only relies on the threshold itself. If the threshold is set too low, there would more false alarm due to the increased noise; if too high, there would be more miss detection.

Usually, in complex signal environment, any fixed parameter has its failure area. In fact, the optimal parameter setting is to change it dynamically considering signal environment fluctuation. Unlike normal acquisition, the mathematics behind multi-peak acquisition is a ternary hypothesis test, which requires further analysis. Further mathematical derivation is omitted for the brevity of this paper.

4 Multiple Tracking Strategy

Multi-peak signal acquisition can only detect the presence of spoofing signals, but what is more desirable is the ability to distinguish the authenticity of the signal. The foundation of further discrimination and mitigation of spoofing signal is the tracking of all possible signals.

4.1 Logic and Procedure of Tracking

The computation resource of civilian GNSS receiver is structured as channels, and the identification of a specific channel is the PRN code it tracks. In premise of multi-peak signal, however, PRN number does not suffice to identify different channels clearly. Consequently, the tracking logic and procedure of receiver call for modification.

First of all, how to uniquely identify different signals. As previously analysed, the transmit time of spoofing signal should deviate from the authentic ones, then the PRN and transmit time pair is sufficient to uniquely identify the signal being tracked. Therefore, the channel-based architecture still works, only with little change of identifying channels by the mentioned pair.

The most resource consumed in multi-peak tracking is computation capacity. So, a receiver with multi-peak tracking ability inevitably requires more computation capacity, leading to more power consumption. Thus receivers with configurable channels are more suitable for multi-peak signal tracking (Fig. 2).

Fig. 2
figure 2

Tracking of multi-peak signal

4.2 Repeating Acquisition and Duplicate Signal Cancellation

The acquisition strategy of normal civilian receiver only tries to acquire the PRN that is not under tracking, rather than those already under tracking. The reason behind is that receiver has no prior knowledge of emerging satellite (because of satellite position and signal fading environment), while those already in tracking require no more acquisition attempts.

Similarly, we possess no prior knowledge about when spoofing begins, when the spoofing signal captures tracking loop, or when the transmit time of spoofing signal deviates. In a word, we have no idea about when the normal signal becomes multi-peak signal. Consequently, existing acquisition strategy cannot timely counter spoofing signal in long-term operation.

Accordingly, to detect spoofing signal in time, multi-peak acquisition process needs to be repeated for all PRN codes (whether or not a channel is assigned for it). However, this repetition will certainly cause re-acquisition of same signal and its redundant tracking as a consequence. It is obviously not reasonable to assign two channel to track one replica of same signal, while missing an existing signal is more undesirable.

The “PRN-Transmit Time” pair can uniquely determine the signal represented by a single correlation peak in multi-peak signal. Therefore, by comparing the transmit times with same PRN, if the difference of transmit times is smaller than the error performance of tracking loop (typical tracking error performance is around 10 ns), they can be identified as signal represented by a single correlation peak; if the transmit time difference exceeds the error of tracking loop, then we believe that the signals compared originate from different correlation peaks.

But the repeating acquisition leads to re-entry of the signal from the same correlation peak, then there would certainly be two channels with transmit time difference less than tracking error. The extra channels tracking same correlation peak need to be cancelled in purpose of saving resources. To avoid the confusion about cancelling which channel, another feature is necessary for discriminating the channels. The duplicate channels tracking same correlation peak can only stem from successive multi-peak acquisitions, because of correlation peak clustering. Thus the channel of which the tracking duration is longer should outlive the others. Then through comparing PRN number, transmit time and tracking duration of channels, the repeating multi-peak acquisition can work along with the multi-peak tracking. This mechanism satisfies both the purpose of saving computation resource and missing no possible signal (Fig. 3).

Fig. 3
figure 3

Recursive acquisition and cancellation of multi-peak signal

5 Experimental Results

After establishing experimental platform, we have conducted experiments both on GPS simulator signal and receiver-spoofer meaconing live signal. The configuration of platform is depicted in Fig. 4. To test the function of the proposed architecture, we can send spoofing signal (at similar power as true signal) into the receiver by adjusting the attenuator.

Fig. 4
figure 4

Meaconing spoofing platform

Figures 5 and 6 shows actual results on the multi-peak signal formed by true signal and spoofing signal transmitted from simulator and receiver-spoofer, respectively.

Fig. 5
figure 5

Result on GPS simulator attack

Fig. 6
figure 6

Result on meaconing attack

In Fig. 5, the simulator-generated signal is readily separated by transmit time clustering algorithm (in the upper part). There are 8 replayed satellites in Fig. 6 that are discriminated from their authentic counterparts. In summary, the receiver equipped with the proposed architecture can readily defence the spoofing attacks with reasonable power that is launched by simulator and receiver-spoofer.

6 Conclusions

In this paper, we propose a fundamental receiver architecture and its supporting algorithms. This architecture can be utilized to acquire and track the multi-peak signal that is often encountered in spoofing scenario. The proposed architecture exploits the extra computation resource, and has no requirements of modifying existing RF frontend or IF device.

It is worth mentioning that the proposed architecture cannot discriminate and mitigate spoofing signal. However, the capability of acquiring and tracking multi-peak signal endowed by this architecture lays a cornerstone for further discrimination, mitigation and localization of spoofing signal.

The comparison of signal features enables discrimination of spoofing signal from the true one. For example, the transmit times of signal from GPS simulator always cluster in a small range, while separated from the transmit times of true signal. Meaconing signal does also show a strong pattern. The transmit time extracted from meaconing signal is earlier than true signal, and the differences equal over all satellites. On a receiver in motion, the time history of signal features (such as carrier Doppler frequency and carrier phase) can lend a hand in discrimination.

After distinguishing the spoofing signal, their observables will be excluded from position calculation. This mitigates the impact of spoofing signal, boosts the robustness of receiver. Conversely, the feature and observable of spoofing signal facilitate the localization of spoofer.

In summary, the architecture proposed in this paper exchange extra computation resource for capability of acquiring and tracking multi-peak signal. This architecture lays foundation for detection, discrimination, mitigation and localization of spoofing signal.