DOI QR코드

DOI QR Code

Ranging Performance for Spoofer Localization using Receiver Clock Offset

  • Lee, Byung-Hyun (EW R&D Center, Hanwha Thales) ;
  • Seo, Seong-Hun (Department of Electronics Engineering, Konkuk University) ;
  • Jee, Gyu-In (Department of Electronics Engineering, Konkuk University) ;
  • Yeom, Dong-Jin (RF Systems Technology Directorate, Agency for Defense Development)
  • Received : 2016.07.25
  • Accepted : 2016.08.05
  • Published : 2016.09.15

Abstract

In this paper, the performance of ranging measurement, which is generated using two receiver clock offsets in one receiver, was analyzed. A spoofer transmits a counterfeited spoofing signal which is similar to the GPS signal with hostile purposes, so the same tracking technique can be applied to the spoofing signal. The multi-correlator can generate two receiver clock offsets in one receiver. The difference between these two clock offsets consists of the path length from the spoofer to the receiver and the delay of spoofer system. Thus, in this paper, the ranging measurement was evaluated by the spoofer localization performance based on the time-of-arrival (TOA) technique. The results of simulation and real-world experiments show that the position and the system clock offset of the spoofer could be estimated successfully.

Keywords

1. INTRODUCTION

Global Positioning System (GPS) (Kaplan & Hegarty 2006) is one of the Global Navigation Satellite Systems (GNSS) which has been most widely used in the world. GPS was originally invented and used for military purposes. Because the military GPS is encrypted and authenticated, civilians could not use GPS. However, GPS was opened up for civilian use after the KAL007 accident in 1983, and since then civilian GPS has been used in various business and social contexts. The initial civilian GPS had Selective Availability and was vulnerable to positioning and navigational errors but since these errors have been removed, the accuracy and precision of civilian GPS has improved.

These days interest in autonomous systems like drones and autonomous vehicles has increased, and an absolute positioning system is vital for trustworthy navigation performances. However radio navigation like GPS is vulnerable to high-level environmental noise or intentional signal interference such as jamming and spoofing. In particular, jamming or spoofing is a serious threat to positioning and navigation performance. Jamming is where a jammer transmits a stronger signal than the GPS signal to interrupt successful navigation and decrease the positioning performance. However, spoofing is a more serious problem than jamming. In the case of military GPS, as the P-code is encrypted, the code could not be generated. So, the main form of spoofing is where a spoofer receives the authentic GPS signal and re-radiates the signal to the target receiver with a time delay. In the case of civilian GPS, as the C/A code is open to the public, an intentional spoofing signal could be generated by a spoofer to guide the target receiver to calculate its position in a way different from its true position based on the authentic GPS signal (Seo et al. 2015). Also, the re-radiate spoofing form can be executed in the civilian GPS spoofing environment. The point of this spoofing issue is that when the target receiver receives both of the spoofing signals, it is successfully deceived. For this reason, spoofing is the most serious problem with regard to GPS positioning and navigation.

Anti-spoofing techniques can be categorized into detection, mitigation, and spoofer localization. Spoofing detection and mitigation prevent the receiver from calculating an erroneous position. Humphreys et al. (2008) have presented an analysis about the effect of spoofing on GPS receiver channels and anti-spoofing methods. Others have suggested a spoofing detection method that takes advantage of spatial information using a single difference in the carrier phase between two antennas (Montgomery et al. 2009, Psiaki et al. 2014). Additionally, various detection methods are researched (Konovaltsev et al. 2013, Jafarnia-Jahromi et al. 2015, Lim et al. 2015, Radin et al. 2015). However, detection and mitigation are passive methods to deal with spoofing attacks. So, a more active solution such as spoofer localization is required. Until now, some jammer localization methods have used time-difference-of-arrival (TDOA) and hybrid TDOA/angle-of-arrival (Lindström et al. 2007, Bhatti et al. 2012, Cetin et al. 2014, Lim et al. 2014). In these cases, array processing has been used for localizing the jamming signal source.

In this paper, the spoof signal is detected and identified by using multi-correlators and multi-receivers. After that, both authentic and spoofing signal is tracked respectively. Through the authentic and the spoofing signal information, the range measurements for spoofer localization are calculated. Using these range measurements, time-of-arrival (TOA) based spoofer localization becomes possible. Then, the performance of spoofer ranging measurements (SPR) is analyzed and verified in simulation and real-world experiments.

 

2. RANGING MEASUREMENTS

For the TOA based spoofer localization, range measurements should be generated. This section describes the spoofing environment in which the received RF signal contains an authentic GPS and counterfeit spoofing signal as shown in Fig. 1. Also, this section describes the receiver clock offsets that can generate the range measurements for spoofer localization.

Fig. 1. Spoofing environment.

2.1 Spoofing Environment

It is hard to operate a spoofed receiver (Im et al. 2013). A jamming attack, such as a continuous wave and wideband noise jamming attack, causes the receiver to lose the tracking signals, and the receiver then engages in a reacquisition process. If the spoofer transmits the spoofing signal at this moment, then a receiver without anti-spoofing defense can be easily spoofed. So, we have assumed that every channel of the receiver is spoofed under these circumstances.

As shown in Fig. 2, a spoofer receives the authentic GPS signal and synchronizes its clock with GPS time. Then, the spoofer acquires the navigation data and generates the spoofing signal which deceives the target receiver into calculating the spoofer intended position. After this process has been completed, the generated signal is transmitted to the target receiver and the target receiver receives both the authentic GPS and spoofing signal.

Fig. 2. Pseudo-ranges of spoofing environment.

The transmitted spoofing signal has an offset to the authentic GPS time. This offset, which is defined in this paper as a spoofer clock offset \((\Delta t_{spoofer})\), can be modeled as the sum of the spoofer system delay and an unknown delay. The spoofer system delay indicates the clock error of the signal generator from the GPS satellite clock and the internal delay up to the signal transmission.

Fig. 2 shows the environment of the spoofer. The spoofer has a GPS receiver and a signal generator, so it can be synchronized with GPS time and can generate a spoofing signal with a live navigation message that is equivalent to an authentic GPS signal. The results of the spoofing signal processing before transmission consist of the pseudo-range,

\(\rho_i=r_i+c\left(dT_i-dt\right)+\varepsilon\)                                                                                              (1)

where \(\rho_i\) is pseudo-range of the satellite \(i, r_i\) is the virtual geometric range from the satellite to the spoofed position, \(dT_i\) is the satellite clock error, \(dt\) is the receiver clock offset.

The pseudo-ranges of the received spoofing signal at the GPS receiver are shown in Eq. (2).

\(\rho_i=r_i+c\left(dT_i-dt\right)+l+\varepsilon\)                                                                                            (2)

where \(l\) is propagation path length from spoofer to receiver. If the navigation filter uses these pseudo-ranges, the path length \(l\) would be estimated as the receiver clock offset because \(l\) is common to every pseudo-range. The receiver will be spoofed because the navigation solution will be the position intended by the spoofer (Kaplan & Hegarty 2006). In addition, the receiver calculates the clock offset of the spoofing signal that has a path length delay. Thus, if it is possible to simultaneously track the spoofing and the authentic GPS signal, the ranges between the spoofer and the receiver can be measured using the results of the navigation filter of the spoofing and authentic GPS signals.

2.2 Ranging Measurement Modeling

Simultaneous tracking of the authentic and spoofing signal in one channel and signal identification are essential functions to generate ranging measurements. An authentic and a spoofing signal can be simultaneously tracked using the multi-correlator (Broumandan et al. 2012, Moon et al. 2013). Since there are two signals in one channel, the next step is signal identification which can be performed by applying a spoofing detection technique to each of the signals (Swaszek & Hartnett 2013, Psiaki et al. 2014). Thus, in this paper, it is assumed that simultaneous signal tracking and signal identification using multi-correlators and multi-antennas are possible in order to easily evaluate the performance of the ranging measurements. Fig. 3 shows the signal processing flowchart at one node.

Fig. 3. Pseudo-ranges of spoofing environment.

After the identification step, the navigation filter calculates the position and the receiver clock offset using grouped authentic and spoofing signals. The pseudo-range of the spoofing signal is shown in Eq. (3).

\(\rho_{spoof,i}=\sqrt{\left(x_{spoofed}-{x_i}^s\right)^2+\left(y_{spoofed}-{y_i}^s\right)^2+\left(z_{spoofed}-{z_i}^s\right)^2}+c\cdot dt_{spoof}\)                                                           (3)

where, \(\rho_{spoof,i}\) is the pseudo-range of the spoofing signal of the satellite \(i, x_{spoofed}, y_{spoofed}\) and \(z_{spoofed}\) are the intended position of the spoofer, \(dt_{spoof}\) is the receiver clock offset of the spoofing signal which is a state of navigation filter, c is the speed of light. The \(dt_{spoof}\) contains the propagation path length and the spoofer delay, so it can be modeled as shown in Eq. (4).

\(GPST_{spoof}(t)=GPST_{GPS}(t)+\frac{l(t)}{c}+\Delta t_{spoofer}(t)\)                                                                       (4)

where \(GPST_{spoof}\) is the receiver time of the spoofing signal in GPS time coordinates, and \(GPST_{GPS}\) is the receiver time of the authentic GPS signal, \(\Delta t_{spoofer}(t)\) is the spoofer clock offset described in 2.1. It is important to consider not the receiver clock offset but the GPS time coordinate because of the localization problem of a meaconing that differs from authentic GPS time.

Using Eq. (4), the ranging measurements \((R_j(t))\) at node \(j\) can be expressed as Eq. (5).

\(R_j(t)=\sqrt {(x_{GPS,j} (t) - x_{spoofer} (t))^2 + (y_{GPS,j} (t) - y_{spoofer} (t))^2 + (z_{GPS,j}(t-z_{spoofer} (t))^2}+c\cdot\Delta t_{spoof}\left(t\right)\)                                     (5)

where \(x_{GPS,j}, y_{GPS,j}, z_{GPS,j}\) are the position at node \(j\) which is the result of the grouped authentic GPS signal, \(x_{spoofer}, y_{spoofer}, z_{spoofer}\) are the spoofer position which is the result of spoofer localization. In Eq. (5), the receiver clock offset is eliminated, and this means that the grade of the receiver clock does not affect the ranging performance of the spoofer localization.

2.3 Spoofer Localization

To estimate the position of the spoofer in the previously defined spoofing environment, it is necessary that the target receiver has the function to track both the authentic GPS and the spoofing signal simultaneously. From Eq. (5), there are four unknowns for the spoofer localization \((x_{spoofer}, y_{spoofer}, z_{spoofer}, \Delta t_{spoof})\), so four nodes are required to solve the problem. The spoofer delay\( (\Delta t_{spoofer}(t))\) is unknown but is common to every node. Thus, the position and spoofer delay could be estimated by TOA using the ranging measurements \((R_j(t))\) (Fig. 4).

Fig. 4. Spoofer localization by using TOA (identical with GPS positioning).

 

3. EXPERIMENTAL RESULTS

To analyze and verify the presented ranging measurements for spoofer localization, a simulation and real-world test were conducted. The results are based on the GPS L1 C/A signal processing.

3.1 Simulation Results

A simulation was performed using a software-based GNSS signal generator that generates signals at the intermediate frequency (IF) level (Im & Jee 2014). For convenience, the following are assumed:

1) Every node can receive a spoofing signal.

2) Every node can track and identify both the authentic and the spoofing signal.

3) There are no other error components (multipath, signal block, etc.).

In this simulation, Fig. 5 shows that all the nodes and spoofer are static. Additionally, Fig. 6 presents that the positioning results of the nodes can be estimated by the generated GPS signal from the software-based GNSS signal generator.

Fig. 5. Simulation environment.

Fig. 6. Positioning result of the generated GPS signal in ENU frame.

Fig. 7 presents the simulation result of the generated ranging measurements, and Figs. 8 and 9 show the results of the spoofer localization. As the root-mean-square-error (RMSE) of the spoofer positioning is 1.575 m, the performance of the ranging measurements is relatively reasonable and accurate when considering the spoofing environment as shown in Table 1.

Fig. 7. Accuracy of the generated ranging measurements (R).

Fig. 8. Result of the spoofer localization.

Fig. 9. Accuracy of the estimated spoofer clock offset (Δtspoofer).

Table 1. Accuracy of ranging measurements and localization.

  Node 1 Node 2 Node 3 Node 4 Localization
RMSE [m] 1.054 0.805 0.866 0.709 1.575

 

3.2 Real-world Experimental Results

To conduct a feasibility test in a real environment, we transmitted the generated spoofing signal by using a software-based signal generator using an IF to RF converter (Labsat3) and signal transmitter. The receivers (nodes) receive both the live GPS signal and the spoofing signal (Fig. 10). For the performance analysis of ranging measurements, three nodes are used for the spoofer localization in the real-world experiment (assuming that the height is known).

Fig. 10. Real experimental environment.

Unlike the simulation test, the nodes are not time-synchronized. Thus, spoofer clock drift was estimated for time-synchronized ranging measurements via interpolation (Eq. 6).

\(R_N\left(t_{R_1}\right)=l_N\left(t_{R_1}\right)+c\cdot\left(\Delta t_{spoof}+\Delta{\dot{t}}_{spoof}\cdot\delta t_N\right)\)                                                                       (6)

where, \(R_N\) is the SPR at node \(N, t_{R1}\) is the time of reference node (node 1 is the reference), \(\Delta{\dot{t}}_{spoof}\) is the spoofer clock drift, \(\delta t_N\) is time difference between node \(N\) and reference node \((\delta t_N=t_{R_1}-t_{R_N})\).

In order to easily evaluate the performance of the ranging measurements, we assumed that there is no common satellite between the spoofing signal and live GPS signal to carry out signal tracking and identification (Table 2).

Table 2. Tracked Satellite numbers (PRNs) of the live GPS and spoofing signal.

  PRN
Live GPS signal
Spoofing signal
7, 8, 11, 16, 21, 26, 27
10, 12, 13, 15, 17, 18, 19, 24

 

Figs. 11 and 12 show that the accuracy of the ranging measurements and the results of the spoofer localization in the real experiment. Table 3 presents that these results are similar to the results of the simulation and the possibility of spoofer localization using the TOA method is confirmed.

Fig. 11. Accuracy of generated ranging measurements (real-world test).

Fig. 12. Result of the spoofer localization (real-world test). In order to receive the spoofing signal at every node in a real test, the receivers are set in poor DOP conditions.

Table 3. Ranging measurements and localization results (real-world test).

  Node 1 Node 2 Node 3 Localization
RMSE [m] 0.882 0.751 0.601 1.101

 

4. CONCLUSIONS

In this paper, the performance of the ranging measurements was analyzed to determine anti-spoofing effectiveness. If a UAV or UGV is exposed to a spoofing attack, then the automatic pilot system malfunction and the vehicle can be plundered by the spoofer.

Using the receiver clock error between the authentic GPS and the spoofing signal, the ranging measurements for spoofer localization are generated. Then the TOA localization method is used and verified. To implement the TOA based localization, it is necessary that at least 4 receivers (nodes) are deployed to receive the same spoofing signal simultaneously. In addition, the spoofer clock drift should be estimated in order to achieve ranging measurement time synchronization at each node. In conclusion, the position and the system clock offset of the spoofer are estimated accurately, and spoofer localization using generated ranging measurements is possible without the hardware clock synchronizer of each node.

References

  1. Bhatti, J. A., Humphreys, T. E., & Ledvina, B. M. 2012, Development and demonstration of a TDOA-based GNSS interference signal localization system, in 2012 IEEE/ION PLANS, pp. 455-469. http://dx.doi.org/10.1109/PLANS.2012.6236915
  2. Broumandan, A., Jafarnia-Jahromi, A., Dehghanian, V., Nielsen, J., & Lachapelle, G. 2012, GNSS spoofing detection in handheld receivers based on signal spatial correlation, in 2012 IEEE/ION PLANS, pp.479-487. http://dx.doi.org/10.1109/PLANS.2012.6236917
  3. Cetin, E., Thompson, R. J. R., & Dempster, A. G. 2014, Passive interference localization within the GNSS environmental monitoring system (GEMS): TDOA aspects, GPS Solutions, 18, 483-495. http://dx.doi.org/10.1007/s10291-014-0393-5
  4. Humphreys, T. E., Ledvina, B. M., Psiaki, M. L., O’Hanlon, B. W., & Kintner, Jr., P. M. 2008, Assessing the spoofing threat: Development of a portable GPS civilian spoofer, in 2008 ION GNSS, Savannah, GA, 16-19 September 2008, pp.2314-2325
  5. Im, S.-H., Im, J.-H., Jee, G.-I., & Heo, M.-B. 2013, An analysis of spoofing effects on a GNSS receiver using real-time GNSS spoofing simulator, Journal of Institute of Control, Robotics and Systems, 19, 113-118. http://dx.doi.org/10.5302/J.ICROS.2013.19.2.113
  6. Im, S.-H. & Jee, G.-I. 2014, Software-based Real-time GNSS Signal Generation and Processing Using a Graphic Processing Unit (GPU), Journal of Positioning, Navigation, and Timing, 3, 99-105. http://dx.doi.org/10.11003/JPNT.2014.3.3.099
  7. Jafarnia-Jahromi, A., Broumandan, A., Daneshmand, S., & Lachapelle, G. 2015, Vulnerability Analysis of Civilian L1/E1 GNSS Signals against Different Types of Interference, in 2015 ION GNSS+, Tampa, FL, 14-18 September 2015, pp.3262-3271.
  8. Kaplan, E. D. & Hegarty, C. J. 2006, Understanding GPS: Principles and Applications (Norwood: Artech House).
  9. Konovaltsev, A., Cuntz, M., Haettich, C., & Meurer, M. 2013, Autonomous Spoofing Detection and Mitigation in a GNSS Receiver with an Adaptive Antenna Array, in 2013 ION GNSS+, Nashville, TN, 16-20 September 2013, pp.2937-2948. Available at: https://www.ion.org/publications/abstract.cfm?jp=p&articleID=11422
  10. Lim, D. W., Kang, J. M., & Heo, M. B. 2014, Hybrid TDOA/AOA localization algorithm for GPS jammers, Journal of Institute of Control, Robotics and Systems, 20, 101-105. http://dx.doi.org/10.5302/J.ICROS.2014.13.1943
  11. Lim, S., Lim, D. W., Chun, S., Heo, M. B., Choi, Y. S., et al. 2015, Design and Performance Evaluation of GPS Spoofing Signal Detection Algorithm at RF Spoofing Simulation Environment, JPNT, 4, 173-180. http://dx.doi.org/10.11003/JPNT.2015.4.4.173
  12. Lindström, J., Akos, D. M., Isoz, O., & Junered, M. 2007, GNSS interference detection and localization using a network of low cost front-end modules, in 2007 ION GNSS, Fort Worth, TX, 25-28 September 2007, pp.1165-1172.
  13. Montgomery, P. Y., Humphreys, T. E., & Ledvina, B. M. 2009, Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer, in 2009 ION ITM, Institute of Navigation, Anaheim, CA, 26-28 January 2009, pp.124-130.
  14. Moon, G. B., Im, S.-H., & Jee, G.-I. 2013, A Civil GPS Anti-Spoofing and Recovering Method Using Multiple Tracking Loops and an Adaptive Filter Technique, in 2013 ION GNSS+, Nashville, TN, 16-20 September 2013, pp.2916-2920.
  15. Psiaki, M. L., O'hanlon, B. W., Powell, S. P., Bhatti, J. A., Wesson, K. D., et al. 2014, GNSS spoofing detection using two-antenna differential carrier phase, in 2014 ION GNSS+, Tampa, FL, 8-12 September 2014, pp.2776-2800.
  16. Radin, D. S., Swaszek, P. F., Seals, K. C., & Hartnett, R. J. 2015, GNSS Spoof Detection Based on Pseudoranges from Multiple Receivers, in 2015 ION ITM, Dana Point, CA, 26-28 January 2015, pp.657-671. Available at: http://www.ion.org/publications/abstract.cfm?jp=p&articleID=12658
  17. Seo, S.-H., Lee, B.-H., Im, S.-H., & Jee, G.-I. 2015, Effect of Spoofing on Unmanned Aerial Vehicle using Counterfeited GPS Signal, JPNT, 4, 57-65. http://dx.doi.org/10.11003/JPNT.2015.4.2.057
  18. Swaszek, P. F. & Hartnett, R. J. 2013, Spoof detection using multiple COTS receivers in safety critical applications, in 2013 ION GNSS+, Nashville, TN, 16-20 September 2013, pp.2921-2930.