Document Type
Conference Proceeding
Date of Original Version
1-2014
Abstract
Spoofing refers to the intentional (and considered malicious) interference to a GNSS user's inputs so as to distort the derived position information. A variety of approaches to detect spoofing have been proposed in the literature. Much of this prior work has focused on the conceptual level with limited analysis of the resulting detection performance, and/or has proposed fundamental redesign of the receiver itself. Little eort has been directed towards using existing, commercial-off-the-shelf (COTS) stand-alone receiver technology to perform spoof detection.
At ION ITM 2013 these authors proposed a simple spoof detection concept based on the use of multiple COTS receivers and analyzed the performance of several ad hoc detection algorithms from a Neyman-Pearson perspective assuming Gaussian statistics. At ION GNSS+ 2013, by restricting attention to a horizontal platform and assuming an independent measurement error model, we were able to develop the optimum Neyman-Pearson hypothesis test. That paper also included an analysis of performance, yielding closed form expressions for the false alarm and detection probabilities and an optimization of the performance over the locations of the receivers' antennae.
This current works extends the earlier results by considering more realistic statistical models, considers the processing of several sequential outputs from the receivers and addresses 3-D receiver antennae patterns.
Citation/Publisher Attribution
Swaszek, P.F., Hartnett, R.J., "Spoof Detection Using Multiple COTS Receivers in Safety Critical Applications," Proceedings of the 26th International Technical Meeting of The Satellite Division of the Institute of Navigation (ION GNSS+ 2013), Nashville, TN, September 2013, pp. 2921-2930.
Available at: https://www.ion.org/publications/abstract.cfm?articleID=11221
Author Manuscript
This is a pre-publication author manuscript of the final, published article.
Terms of Use
This article is made available under the terms and conditions applicable
towards Open Access Policy Articles, as set forth in our Terms of Use.