CN107505635B - Method for detecting satellite positioning spoofing attack - Google Patents

Method for detecting satellite positioning spoofing attack Download PDF

Info

Publication number
CN107505635B
CN107505635B CN201710561257.8A CN201710561257A CN107505635B CN 107505635 B CN107505635 B CN 107505635B CN 201710561257 A CN201710561257 A CN 201710561257A CN 107505635 B CN107505635 B CN 107505635B
Authority
CN
China
Prior art keywords
satellite
receiver
frequency shift
shift data
gnss
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710561257.8A
Other languages
Chinese (zh)
Other versions
CN107505635A (en
Inventor
何道敬
杜晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Normal University
Original Assignee
East China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Normal University filed Critical East China Normal University
Priority to CN201710561257.8A priority Critical patent/CN107505635B/en
Publication of CN107505635A publication Critical patent/CN107505635A/en
Application granted granted Critical
Publication of CN107505635B publication Critical patent/CN107505635B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service
    • G01S19/215Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service issues related to spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

The invention discloses a method for detecting satellite positioning spoofing attack, which comprises the following steps: receiving satellite signals of a GNSS satellite by adjusting the frequency or phase of a replica carrier signal of a receiver, and acquiring actual frequency shift data of the satellite signals; establishing communication with a GNSS satellite by using a receiver, directly acquiring parameter data of the GNSS satellite, and calculating theoretical frequency shift data of the GNSS satellite according to the parameter data; the parameter data includes: ephemeris data of the GNSS satellite, a unit observation vector between the GNSS satellite and the receiver, a moving speed of the receiver, a transmitting frequency and a signal wavelength; and comparing the actual frequency shift data with the theoretical frequency shift data, and determining that the satellite positioning spoofing attack exists if the difference value of the actual frequency shift data and the theoretical frequency shift data exceeds a preset threshold value.

Description

Method for detecting satellite positioning spoofing attack
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a method for detecting satellite positioning spoofing attack.
Background
A satellite navigation system is an autonomously utilized space-based satellite system covering the world, allowing a small electronic receiver to determine its location (longitude, latitude, and altitude) and broadcast a time signal transmitted along a line-of-sight direction via a satellite to within a range of precisely 10 meters. The current satellite navigation system which can provide positioning and time service for global scope is mainly: the Global Positioning System (GPS) in the united states and the global navigation satellite system (GLONASS) in russia. The Beidou satellite navigation System (BDS) of China can provide high-precision positioning navigation and time service functions in Asia-Pacific areas.
The emergence of various satellite navigation systems brings great convenience to our productive life, and the satellite navigation systems have greater and greater roles in our productive life. Such as vehicle navigation, unmanned planes, unmanned vehicles, and smart phones that we use daily, etc. As is well known, relevant parameters of a satellite navigation system related to civil use have been published for a long time, and counterfeiting location information and time information according to a published message format also gradually forms a potential threat, and an generative satellite positioning spoofing technology is increasingly developed and matured at present, which is well known to the public.
At present, a GNSS receiver performs positioning through GNSS signals, and if the GNSS receiver receives fake GNSS signals, positioning or time service errors may occur, which may cause serious consequences. Based on the principle that the Doppler frequency shift values of satellites generated by deception signals of GNSS deception attacks of a single signal source are the same and the GNSS attacks of a plurality of signal sources are difficult to accurately control the generated Doppler frequency shift values, whether the GNSS deception attacks exist or not is detected by comparing the actually detected Doppler frequency shifts with the calculated Doppler frequency shift difference.
Disclosure of Invention
The invention provides a method for detecting satellite positioning spoofing attack, which comprises the following steps:
receiving satellite signals of a GNSS satellite by adjusting the frequency or phase of a receiver replica carrier signal, and acquiring actual frequency shift data of the satellite signals;
receiving a signal transmitted by the GNSS satellite by using a receiver, directly acquiring parameter data of the GNSS satellite, and calculating theoretical frequency shift data of the GNSS satellite according to the parameter data;
and comparing the actual frequency shift data with the theoretical frequency shift data, and determining that the satellite positioning spoofing attack exists if the difference value of the actual frequency shift data and the theoretical frequency shift data exceeds a preset threshold value.
In the detection method of the satellite positioning spoofing attack, the actual frequency shift data is Doppler frequency shift data; the step of obtaining the Doppler frequency shift data comprises the following steps: using a carrier tracking loop of the receiver to maintain coincidence with the frequency or phase of the received carrier signal by adjusting the frequency or phase of its replica carrier signal, and obtaining doppler shift data for the GNSS satellite when coincidence is maintained, the doppler shift data being represented by the following equation:
Figure GDA0002547027290000021
wherein the content of the first and second substances,
Figure GDA0002547027290000022
is the value of the doppler shift of the GNSS satellite,
Figure GDA0002547027290000023
f is the frequency of the GNSS satellite signals received by the receiver, and f is the frequency of the GNSS satellite signal transmissions f.
In the method for detecting the satellite positioning spoofing attack, a receiver is used for receiving signals transmitted by the GNSS satellite, and parameter data of the GNSS satellite are directly obtained, wherein the parameter data comprise: ephemeris data of the GNSS satellite, a unit observation vector between the GNSS satellite and the receiver, a moving speed of the receiver, a transmission frequency, and a signal wavelength.
In the method for detecting the satellite positioning spoofing attack, the theoretical frequency shift data comprises Doppler frequency theoretical frequency shift data of the current GNSS satellite calculated according to the data of the receiver, and the specific steps are as follows: the obtained doppler frequency theoretical frequency shift data of the GNSS satellite is expressed by the following formula (2) according to a unit observation vector of the satellite and the receiver, a satellite operating speed calculated by a satellite ephemeris, a moving speed of the receiver, and a signal wavelength corresponding to a transmitting frequency:
Figure GDA0002547027290000024
wherein, I(s)Representing unit observation vector, v, of GNSS satellite and receiver(s)Denotes the satellite velocity calculated from the satellite ephemeris, v denotes the moving velocity of the receiver, f denotes the transmission frequency, and λ denotes the signal wavelength corresponding to the transmission frequency f.
In the method for detecting the satellite positioning spoofing attack, the preset threshold is determined based on the error of the actual frequency shift data and the theoretical frequency shift data.
In the detection method of the satellite positioning spoofing attack, the default threshold value is 50 Hz. Because the value of the doppler frequency shift and the measurement error are related to the position of the GNSS satellite, generally, the smaller the satellite elevation angle is, the larger the doppler frequency shift value is, the smaller the measurement error thereof is, the larger the satellite elevation angle is, the smaller the doppler frequency shift value is, and the larger the error thereof is. The setting of the preset threshold value needs to be set according to a specific working environment.
The invention has the beneficial effects that: the GNSS spoofing detection technology with high reliability, low cost and low power consumption is provided for various GNSS spoofing attacks.
Drawings
FIG. 1 is a flowchart of a GNSS attack detection method.
Detailed Description
The invention discloses a method for detecting satellite positioning spoofing attack, relates to the technical field of information, and aims to solve the problem that a forged GNSS signal emitter interferes with a GNSS receiver and identify GNSS spoofing signals. The technical scheme of the invention comprises the following three steps: step one, acquiring Doppler actual frequency shift data of a current GNSS satellite signal. Step two, calculating Doppler theoretical frequency shift data of the current GNSS satellite according to ephemeris data of the GNSS satellite received by the receiver, the position relation between the GNSS satellite and the receiver and the current speed of the receiver; and step three, comparing the difference value of the actual frequency shift data and the theoretical frequency shift data, and if the difference value exceeds a preset threshold value, determining that the GNSS attack exists in the preset area. The method is mainly applied to the process of detecting the GNSS attack.
In the first step, the doppler shift value of the current signal receiver is obtained by a specific method that a carrier tracking loop of the receiver keeps consistent with the frequency or phase of the received carrier signal by continuously adjusting the frequency or phase of the duplicated carrier signal. Once consistent, the receiver may then formulate
Figure GDA0002547027290000031
Calculating the Doppler frequency shift value of the current GNSSGNSS satellite, wherein
Figure GDA0002547027290000032
Is the value of the doppler shift of the GNSS satellite,
Figure GDA0002547027290000033
to use for receivingAnd f is the emission frequency f of the GNSS satellite signals.
In the second step, the specific method for calculating the Doppler frequency shift value of the current satellite according to the current data is that the running speed v of the satellite calculated by the satellite ephemeris is calculated according to the unit observation vector I of the satellite and the receiver(s)Calculating the Doppler frequency shift value of the GNSS satellite according to the following formula
Figure GDA0002547027290000034
Figure GDA0002547027290000035
And in the third step, calculating the difference value between the Doppler frequency shift actually measured by the receiver and the calculated Doppler frequency shift, and if the difference value is greater than a preset threshold value, sending out a GNSS cheating warning. The preset threshold is determined based on measurements of actual frequency shift data and theoretical frequency shift data. The preset threshold value defaults to 50 Hz. Because the value of the doppler frequency shift and the measurement error are related to the position of the GNSS satellite, generally, the smaller the satellite elevation angle is, the larger the doppler frequency shift value is, the smaller the measurement error thereof is, the larger the satellite elevation angle is, the smaller the doppler frequency shift value is, and the larger the error thereof is. The threshold value needs to be set according to a specific working environment.
Example 1
When a simple single-antenna GNSS spoofing attack occurs, all GNSS signals are emitted by the same antenna, Doppler frequency shift rules of the GNSS signals are always the same, and the positions and the movement speeds of GPS satellites in space are always different, so that the difference value between theoretical Doppler frequency shift data calculated by the method and an actual Doppler frequency shift value obtained by a receiver exceeds a preset threshold value, the GNSS spoofing attack is considered to be suffered, and a GNSS spoofing attack alarm is sent out.
Example 2
When a GNSS spoofing attack using multiple antennas with positive alignment occurs, an attacker can control the Doppler frequency shift value of the GNSS spoofing signal to be similar to the real situation. Because the distance between the GNSS deception transmitter and the attacked GNSS receiver is far smaller than the distance between the receiver and the GNSS satellite, when the receiver moves, deception interference can bring higher Doppler frequency shift, and the difference value between theoretical Doppler frequency shift data calculated by the receiver and an actual Doppler frequency shift value obtained by the receiver exceeds a preset threshold value, the existence of the GNSS attack can be detected. Even if an attacker dynamically changes the transmitting frequency of the transmitted attack signal according to the motion direction of the receiver, the GNSS attack detection method can still detect the GNSS attack to a great extent as long as the attacker cannot correctly estimate the moving speed of the receiver.
The protection of the present invention is not limited to the above embodiments. Variations and advantages that may occur to those skilled in the art may be incorporated into the invention without departing from the spirit and scope of the inventive concept, and the scope of the appended claims is intended to be protected.

Claims (6)

1. A method for detecting a satellite positioning spoofing attack, comprising:
receiving satellite signals of a GNSS satellite by adjusting the frequency or phase of a receiver replica carrier signal, and acquiring actual frequency shift data of the satellite signals;
receiving a signal transmitted by the GNSS satellite by using a receiver, directly acquiring parameter data of the GNSS satellite, and calculating theoretical frequency shift data of the GNSS satellite according to the parameter data;
and comparing the actual frequency shift data with the theoretical frequency shift data, and determining that the satellite positioning spoofing attack exists if the difference value of the actual frequency shift data and the theoretical frequency shift data exceeds a preset threshold value.
2. The method of detecting a satellite positioning spoofing attack as recited in claim 1, wherein said actual frequency shift data is doppler frequency shift data; the step of obtaining the Doppler frequency shift data comprises the following steps: using a carrier tracking loop of the receiver to maintain coincidence with the frequency or phase of the received carrier signal by adjusting the frequency or phase of its replica carrier signal, and obtaining doppler shift data for the GNSS satellite when coincidence is maintained, the doppler shift data being represented by the following equation:
Figure FDA0002547027280000011
wherein the content of the first and second substances,
Figure FDA0002547027280000012
is the value of the doppler shift of the GNSS satellite,
Figure FDA0002547027280000013
f is the frequency of the GNSS satellite signals received by the receiver, and f is the frequency of the GNSS satellite signal transmissions f.
3. The method for detecting a satellite positioning spoofing attack as recited in claim 1, wherein a receiver is used to receive the signals transmitted by the GNSS satellites and directly obtain parameter data of the GNSS satellites, the parameter data comprising: ephemeris data of the GNSS satellite, a unit observation vector between the GNSS satellite and the receiver, a moving speed of the receiver, a transmission frequency, and a signal wavelength.
4. The method for detecting the satellite positioning spoofing attack as recited in claim 1, wherein the theoretical frequency shift data includes doppler frequency theoretical frequency shift data of the current GNSS satellite calculated according to the data of the receiver, and the specific steps are as follows: the obtained doppler frequency theoretical frequency shift data of the GNSS satellite is expressed by the following formula (2) according to a unit observation vector of the satellite and the receiver, a satellite operating speed calculated by a satellite ephemeris, a moving speed of the receiver, and a signal wavelength corresponding to a transmitting frequency:
Figure FDA0002547027280000014
wherein, I(s)Representing unit observation vector, v, of GNSS satellite and receiver(s)Denotes the satellite velocity calculated from the satellite ephemeris, v denotes the moving velocity of the receiver, f denotes the transmission frequency, and λ denotes the signal wavelength corresponding to the transmission frequency f.
5. The method of claim 1, wherein the predetermined threshold is determined based on an error between the actual frequency shift data and the theoretical frequency shift data.
6. The method of detecting a satellite positioning spoofing attack as recited in claim 5, wherein said predetermined threshold is 50 Hz.
CN201710561257.8A 2017-07-11 2017-07-11 Method for detecting satellite positioning spoofing attack Active CN107505635B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710561257.8A CN107505635B (en) 2017-07-11 2017-07-11 Method for detecting satellite positioning spoofing attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710561257.8A CN107505635B (en) 2017-07-11 2017-07-11 Method for detecting satellite positioning spoofing attack

Publications (2)

Publication Number Publication Date
CN107505635A CN107505635A (en) 2017-12-22
CN107505635B true CN107505635B (en) 2020-12-22

Family

ID=60678953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710561257.8A Active CN107505635B (en) 2017-07-11 2017-07-11 Method for detecting satellite positioning spoofing attack

Country Status (1)

Country Link
CN (1) CN107505635B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102018209162A1 (en) * 2018-06-08 2019-12-12 Continental Teves Ag & Co. Ohg Safe method for determining the position of a receiving device
CN109683178B (en) * 2019-01-14 2020-08-04 清华大学 Satellite navigation spoofing detection method and device
CN109884669B (en) * 2019-05-07 2020-04-10 湖南国科防务电子科技有限公司 Satellite navigation deception jamming detection method, system and equipment based on prior information
CN110082790A (en) * 2019-06-26 2019-08-02 深圳市西博泰科电子有限公司 A kind of satellite the deception recognition methods, apparatus and system of facing moving terminal
FR3098926B1 (en) * 2019-07-15 2021-07-16 Safran Electronics & Defense METHOD AND DEVICE FOR DETECTION OF A LURRING OPERATION OF A GNSS SYSTEM
CN111060935B (en) * 2020-01-17 2022-04-22 中山大学 GNSS deception jamming detection method
CN111954219B (en) * 2020-07-29 2022-04-05 北京邮电大学 Detection method, system and device for deception attack of unmanned aerial vehicle
CN113447972B (en) * 2021-06-07 2022-09-20 华东师范大学 Automatic driving GPS deception detection method and system based on vehicle-mounted IMU
CN113447959B (en) * 2021-06-25 2023-05-23 中山大学 GNSS deception jamming detection method and related device based on Doppler frequency

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105445761A (en) * 2015-11-23 2016-03-30 哈尔滨工业大学 Method for resisting deceptive jamming based on Doppler frequency shift
EP3109670A1 (en) * 2015-06-23 2016-12-28 Honeywell International Inc. Global navigation satellite system (gnss) spoofing detection with carrier phase and inertial sensors
CN106842238A (en) * 2017-01-19 2017-06-13 中国民航大学 Satellite navigation cheating interference suppressing method based on extension RAIM

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3109670A1 (en) * 2015-06-23 2016-12-28 Honeywell International Inc. Global navigation satellite system (gnss) spoofing detection with carrier phase and inertial sensors
CN105445761A (en) * 2015-11-23 2016-03-30 哈尔滨工业大学 Method for resisting deceptive jamming based on Doppler frequency shift
CN106842238A (en) * 2017-01-19 2017-06-13 中国民航大学 Satellite navigation cheating interference suppressing method based on extension RAIM

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GPS Spoofing Detection using Accelerometers and Performance Analysis with Probability of Detection;Jung-Hoon Lee et al.;《International Journal of Control,Automation,and Systems》;20151231;第13卷(第4期);第951-959页 *
基于轨迹欺骗的无人机GPS/INS复合导航系统干扰技术;李畅等;《南京航空航天大学学报》;20170630;第49卷(第3期);第420-427页 *

Also Published As

Publication number Publication date
CN107505635A (en) 2017-12-22

Similar Documents

Publication Publication Date Title
CN107505635B (en) Method for detecting satellite positioning spoofing attack
Zidan et al. GNSS vulnerabilities and existing solutions: A review of the literature
US7623068B2 (en) Detection of deception signal used to deceive geolocation receiver of a satellite navigation system
CN106605155B (en) Method for verifying the plausibility of a GNSS positioning signal
KR101555995B1 (en) Method and Apparatus for detecting Global Navigation Satellite System spoofing signal and estimating position of the signal based on multiple references stations
US20100164789A1 (en) Measurement Level Integration of GPS and Other Range and Bearing Measurement-Capable Sensors for Ubiquitous Positioning Capability
US20100045506A1 (en) Method And System For Locating Signal Jammers
KR20180050366A (en) Methods and systems for joint GNSS (GLOBAL NAVIGATION SATELLITE SYSTEM) diagnostics
CN113031022B (en) Multi-dimensional domain satellite navigation deception jamming detection method based on beam null pointing
CN109617645B (en) Unmanned aerial vehicle monitoring and control method and system based on traction type deception jamming
KR101594322B1 (en) Maritime PNT monitoring and the reliability provision system
CN104808226A (en) Cooperative localization-based terminal-to-terminal orientation method and device
CN111308514B (en) Satellite navigation spoofing detection method in wireless synchronous communication network
JP2021515246A (en) Spoofing detection in RTK positioning
JP2012203721A (en) Relative position estimation device and program
KR20160082726A (en) the methods of GNSS signal quality monitoring, estimation of navigation error, and the reliability determination using maritime PNT module
Tang et al. Improving performance of pedestrian positioning by using vehicular communication signals
US11531117B1 (en) Jitter tracking anti-spoofing algorithm
Hu et al. GNSS spoofing detection technique using fraction parts of double-difference carrier phases
Sahoo et al. Integrating GPS, GSM and cellular phone for location tracking and monitoring
CN112904390B (en) Positioning method, positioning device, computer equipment and storage medium
Xu et al. NLOS and multipath detection using Doppler shift measurements
US11412363B2 (en) Context-adaptive RSSI-based misbehavior detection
RU127944U1 (en) INTEGRATED ATMOSPHERIC RADIO sounding system
Rustamov et al. Gnss anti-spoofing defense based on cooperative positioning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 200241 No. 500, Dongchuan Road, Shanghai, Minhang District

Patentee after: EAST CHINA NORMAL University

Address before: 200062 No. 3663, Putuo District, Shanghai, Zhongshan North Road

Patentee before: EAST CHINA NORMAL University

CP02 Change in the address of a patent holder