Keywords

1 Introduction

With the development of GNSS, the position, navigation and time (PNT) services, provided by GNSS, have a large influence in our daily life. Nowadays, various applications such as aircraft navigation and landing systems, electrical power distribution grids, digital communication networks, stock exchange transactions, police and rescue services and many more are relying on GNSS signals. With the increased use of GNSS, the security of these services is becoming more and more important. However, as the signals become extremely weak when they reach the earth, they are vulnerable to interference. In addition, because the working frequency band, the modulation type, the civilian pseudo-random noise (PRN) codes and data information are public, GNSS signals can be easily faked.

These counterfeit signals are termed spoofing interference. Among all the types of interference, spoofing is most harmful, because it can fool the target receiver into reporting wrong position or time results without perception, which may lead to serious consequences, for example, leading an unmanned aerial vehicle (UAV) off course [1], blocking digital communication networks [2], creating power grid equipment failure [3] and so on.

Therefore, there are many anti-spoofing techniques that have been proposed in recent years. This paper first investigates the vulnerability of GNSS receivers to spoofing attacks around the signal processing and information processing layers. Then, a brief summary of current anti-spoofing techniques in the above two layers will be provided. Finally, the trend of future research within this topic will be analyzed.

This paper is organized as follows: GNSS vulnerability against spoofing attacks is studied in Sect. 2. Anti-spoofing techniques will be discussed in Sect. 3. In Sect. 4, the study trends of anti-spoofing methods will be analyzed. Finally, the conclusion is drawn in Sect. 5.

2 GNSS Vulnerability Against Spoofing Attacks

As shown in Fig. 1, a GNSS receiver mainly has three functional modules: the radio frequency (RF) front end module, the base band signal processing module and the navigation generating module, which is also termed the information processing module. The tasks of the RF front end module are signal amplifying, frequency down-conversion and signal filtering; the incident signal almost hasn’t been changed in this module. Thus, this module is vulnerable to all kinds of interferences that fall in its processing band. Spoofing signals are aimed to attack the last two modules and control the receiver to report false position or time. We will investigate the receiver vulnerability to spoofing at the two modules in the following.

Fig. 1
figure 1

The three function modules of a classical GNSS receiver

2.1 GNSS Receiver Vulnerability in Signal Processing Module

The main tasks of the signal processing module are signal acquiring and tracking. In the signal acquiring phase, the spoofer can transmit counterfeit signals that are much more powerful than authentic ones (as shown in Fig. 2), which can cause the receiver to acquire the counterfeit signal. In the signal tracking phase, a more covert spoofing attack can take place, which transmits a counterfeit signal that slowly approaches the authentic one, and then drags the tracking loop away (as shown in Fig. 3). Once the receiver is working on the fake signals, the receiver is controlled by the spoofer.

Fig. 2
figure 2

The scenario of spoofing attack during signal acquiring phase

Fig. 3
figure 3

The scenario of a spoofing attack during the signal tracking phase (the three dots denote signal tracking points)

2.2 GNSS Receiver Vulnerability in Information Processing Module

In the information processing module, the information is extracted from the data messages, and the PNT are solved using the measurement quantities provided by the signal processing module. As the framing structure of the data message is publicly known and the information does not change rapidly during some time intervals, the data message can be easily faked, which makes the receiver trust the faked message casually. During the PVT (Position, Velocity and Time) solving phase, the receiver autonomous integrity monitoring (RAIM) procedure can detect abnormal events based on range residuals. However, when the receiver is fully controlled, the range residuals are too small to trig alarms. Also, a well-designed spoofer can change the PVT results gradually and make the receiver not notice the danger.

3 GNSS Receiver Anti-spoofing Techniques

Anti-spoofing techniques can be classified into two major categories: the GNSS side and the receiver side. The GNSS side anti-spoofing techniques always need modifications of the GNSS structure, which can’t be implemented promptly. This paper will discuss receiver side anti-spoofing techniques. In the following, anti-spoofing methods that take place in the signal processing module and information processing module are discussed respectively.

3.1 Anti-spoofing Methods in the Signal Processing Layer

In-band Power Monitoring

The existence of spoofing signals will increase the in-band power, which will change the receiver’s auto gain control (AGC) level. The spoofing interference can be alarmed by monitoring the abnormal variance of the AGC gain level [4]. This method needs the information of AGC gain, so when the receiver only deals with digital intermediate frequency signals, the method can’t be implemented. To make up for this limitation, Jafarnia-Jahromi et al. [5] have proposed a pre-despreading authenticity verification method. The delay and multiply (DAM) property of Gold codes is used in this method to generate a new Gold code that carries all the incident signals’ power. Then, the in-band power component is filtered by a comb filter. The filter output is used to detect spoofing interference. This algorithm can sense the spoofing signal effectively, but it can’t discriminate between spoofing interference and spectrum matched interference.

CNR (Carrier Noise Ratio) Monitoring

Most GNSS receivers employ CNR measurements as a parameter that characterizes the received signal quality. Under normal conditions, the received signal power changes smoothly with the satellite movement and surroundings change. However, when a higher power spoofing signal controls the receiver tracking loop, the received CNR may experience a sudden change that can indicate the presence of spoofing interference [6, 7]. Wen et al. [8] shows that when the distance between the spoofer antenna and the receiver changes from 8 to 100 m, the received CNR reduces by 22 dB. Thus for a moving receiver, if its CNR measurements change considerably, there may be spoofing interference.

Multi-antenna Methods

Montgomery et al. [9] have proposed a spoofing detection technique that compares the calculated phase difference of two fixed GNSS antennas to the theoretical one. This technique requires a calibrated antenna array, and it takes about one hour to do the detection. Borio [10] designed a double antenna receiver and developed a phase only analysis of variance (PANOVA) method in order to detect the phase difference coherency of spoofed PRN signals. This method can effectively recognize spoofing signals when the SNR (signal noise ratio) is larger than 10 dB, otherwise the detection performance is poor. Psiaki et al. [11] have proposed a method using a dual-antenna differential carrier phase. This method detects spoofing based on the fact that the quantities of authentic signals’ carrier-phase single-differences are multiplicity, while the spoofing ones are identical.

Synthetic Array Methods

Nielsen et al. [12] has proposed a spoofing detection algorithm that employs the synthetic antenna array technique. This algorithm detects spoofing signals by computing the correlation coefficient of the channel gain. The satellite signals arrive by passing different transmitting channels, so the channel gains are uncorrelated. However, as all the spoofing signals pass through the same channel, the channel gains for these signals are identical. This method works effectively even in multipath environments because all the spoofing signals experience the same fading path. The drawback is that it is only applicable to moving receivers.

Signal Quality Monitoring (SQM) Methods

SQM techniques are widely used to monitor GNSS correlation peak quality in multipath fading environments. The signal in the process of a spoofing attack on a receiver tracking loop is similar to the multipath component. Thus, the SQM techniques have been extended to detect spoofing attacks [1315]. The ratio and delta SQM tests are employed to detect any abnormal asymmetry or flatness of GNSS correlation peaks. These techniques can only be used in line-of-sight propagation environments to detect spoof interference. In multipath environments, SQM methods might not be able to distinguish the spoofing signals or multipath reflections.

Code and Phase Rates Consistency Check

For authentic signals, the Doppler frequency and the code rate are consistent, as they are both affected by the relative movement between GNSS satellite and the receiver. The relationship of these parameters is \( f^{a} = - f_{RF} \dot{\tau }^{a} \), where \( f^{a} \) and \( \dot{\tau }^{a} \) denote the Doppler frequency and code rate respectively, and f RF is the radio frequency of the GNSS signal. Thus, this relationship can be used to detect spoofing [8]. This method is simple to implement. However, the spoofer can keep this relationship easily.

3.2 Anti-spoofing Methods in the Information Processing Layer

Received Navigation Data Check

Ephemeris Consistency Check. The ephemeris information, including eccentricity, orbital inclination, rate of right ascen and so on, will not change for about 2 h. Thus, we can compare the current received ephemeris with the save ones. If there are many differences, there may be a spoofing attack.

Satellites Clock Consistency Check. The data messages of every signal contain all the satellite’s clock information. The information coming from different signals should be the same. Any abnormality may indicate a spoofing attack.

PNT Solution Check

Receiver Clock Variance Check. In normal cases, the receiver clock bias changes smoothly, which depends on the quality of the used crystal oscillator. However, in the spoofed case, when the receiver moves with respect to the spoofer antenna, the clock bias will change rapidly [16]. This is because all the spoofing signals experience a common delay from the spoofer to the receiver. In the PVT solving process, the common delay is reflected on the clock bias.

Multi-Receiver Position Consistency Check. Literatures [1720] all proposed a multi-receiver system that detects spoofing by checking the position reported by the receivers. If the system is spoofed, all receivers will obtain the same position result. In order to detect spoofing successfully, it requires the distance between receivers to be at least as large as twice the position solution, and all the receivers to be spoofed.

Consistency Check with other Navigation System. Before the GNSS bearing, land radio navigation systems have been widely used, such as the Roland system and tactical air navigation system. Therefore, whether or not the receiver is attacked by spoofing can be checked by comparing the GNSS solution with another navigation system’s solution [21].

Consistency Check with Inertia Measurement Unit (IMU). Stand-alone inertia equipment can independently provide many high solution navigation parameters, such as position, velocity and attitude. These parameters can be used to detect spoofing by comparing with GNSS ones [22, 23].

3.3 Summary

The requirement, complexity, valid scope and performance of the above-discussed anti-spoofing methods are tabulated in Table 1.

Table 1 Summary of GNSS receiver anti-spoofing methods

The three performance levels are defined as: (1) alarming means that the method can’t discriminate spoofing interference or other type interference; (2) detecting means that the method can recognize spoofing, but can’t mitigate it; (3) suppressing means that the method can detect and mitigate spoofing.

4 Prospect of Future Research

According to the above discussions of anti-spoofing techniques, the current research findings are mainly focusing on alarming or detecting the spoofing interference, and some findings have applicability limitations. For example, some require extra equipment, and some are only effective in special scenarios. Therefore, techniques that can be generally used, and can mitigate or eliminate the interference rather than only detecting it, are required. We think the future researches of this scope will be expanded in the following aspects:

  1. 1.

    That research will occur on different anti-spoofing techniques fusion strategies. A stand-alone method may have limitations, while methods combining together can extend the sphere of application. For example, the power monitoring method combines the SQM method and can detect not only high power spoofing but also covert spoofing attacks, and the applicability is not only confined to line-of-sight scenarios. Thus, how to fuse anti-spoofing methods will be a trend to be researched.

  2. 2.

    That research will occur on multi-GNSS anti-spoofing techniques. With the development of GPS, GLONASS, Galileo and Compass, many receivers have the ability to deal with multi-GNSS signals, which can help to detect spoofing signals. Spoofing interferences’ detection and suppression can be realized by comparing and checking the characters of multi-signals (e.g., signal power) and processing results (e.g., the state of clock errors).

  3. 3.

    That anti-spoofing technique research by combining exterior assistants will occur. GNSS receivers are generally used on mobile phones, cars, airplanes, and steamships, on which there are other facilities to provide location, velocity and attitude information. How to use these messages to enhance the safety of the receivers’ services should be researched.

  4. 4.

    That research on interference source localization techniques will occur. Techniques, localizing and further destroying the interference source are the most effective methods to protect GNSS receivers. The CNR, pseudo-range and Doppler measurements from different receivers are candidates for source localization.

5 Conclusion

With the wide use of GNSS services all over the world, their security and robustness become more and more important. This paper summarizes the current anti-spoofing techniques around the signal processing layer and information processing layer. As discussed in Sect. 3, the methods, such as in-band power monitoring, CNR monitoring, PNT check and so on, that have low complexity can be used generally. However, most of these methods can’t tell whether there is a threat or just a receiver failure. The multi-antenna technique can detect and mitigate spoofing threats effectively, but it needs extra equipment and space. In conclusion, low-cost and universal applicable GNSS receiver anti-spoofing techniques will be a research point.