IL266933B2 - Method and system of gnss spoofing detection - Google Patents

Method and system of gnss spoofing detection

Info

Publication number
IL266933B2
IL266933B2 IL266933A IL26693319A IL266933B2 IL 266933 B2 IL266933 B2 IL 266933B2 IL 266933 A IL266933 A IL 266933A IL 26693319 A IL26693319 A IL 26693319A IL 266933 B2 IL266933 B2 IL 266933B2
Authority
IL
Israel
Prior art keywords
gnss
gnss satellite
readings
reading
reception intensity
Prior art date
Application number
IL266933A
Other languages
Hebrew (he)
Other versions
IL266933B1 (en
IL266933A (en
Inventor
Sharom Erez
Original Assignee
Israel Aerospace Ind Ltd
Elta Systems Ltd
Sharom Erez
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Israel Aerospace Ind Ltd, Elta Systems Ltd, Sharom Erez filed Critical Israel Aerospace Ind Ltd
Priority to IL266933A priority Critical patent/IL266933B2/en
Priority to PCT/IL2020/050604 priority patent/WO2020240571A1/en
Publication of IL266933A publication Critical patent/IL266933A/en
Publication of IL266933B1 publication Critical patent/IL266933B1/en
Publication of IL266933B2 publication Critical patent/IL266933B2/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service
    • G01S19/215Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service issues related to spoofing
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/35Constructional details or hardware or software details of the signal processing chain
    • G01S19/36Constructional details or hardware or software details of the signal processing chain relating to the receiver frond end
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/38Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system
    • G01S19/39Determining a navigation solution using signals transmitted by a satellite radio beacon positioning system the satellite radio beacon positioning system transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Control Of Steam Boilers And Waste-Gas Boilers (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Description

METHOD AND SYSTEM OF GNSS SPOOFING DETECTION TECHNICAL FIELD The presently disclosed subject matter relates to clock synchronization.
BACKGROUND The term Global Navigation Satellite Systems (GNSS) refers in general to satellite navigation systems such as, for examples, GPS, GLONASS and Galileo. GNSS systems comprise a plurality of satellites and of GNSS receivers. The GNSS receivers are typically configured for receiving incoming satellite signals broadcast by the satellites, and for calculating the position and velocity of a respective GNSS receiver, based on the received signals.Satellites broadcast a signal that contains, inter alia, orbital data (ephemeris and almanac), which include information with regard to the precise time the signal was transmitted and from which the position and velocity of the satellites can be calculated. Each satellites uses an atomic clock to maintain synchronization of all the satellites in the constellation. The GNSS receiver calculates a pseudo-range to the satellites , ultimately enabling generation of a continual fix of its position and velocity, in real time.In general a GNSS receiver is associated with a moving body (e.g. aircraft, ground vehicles, vessel, missile etc.) and is configured for determining navigation data (such as for example position and velocity) in respect of the moving body. Satellite navigation systems have become a major factor of transportation system worldwide, provide navigation for aviation, ground and marine operations, among other uses.Notwithstanding their many advantages and uses, GNSS receivers are vulnerable to spoofing. Spoofing is a process which is aimed to feed a GNSS receiver false information, so that the receiver computes an erroneous time and/or location. As a result, the moving body or object which is associated with the GNSS receiver may deviate away from its intended course or destination.
GENERAL DESCRIPTION According to one aspect of the presently disclosed subject matter there is presented a method of GNSS-spoof detection, the method being performed by a processing circuitry and comprising: a) receiving data indicative of at least one candidate GNSS signal, broadcast by a respective GNSS satellite, the data constituting a reading; b) determining a view direction [line of sight?] of at least one antenna array that received the at least one candidate GNSS signal; c) determining a viewed angular sector of space associated with the at least one antenna array, based at least on the view direction and on antenna array parameters; d) determining an expected angular position of the at least one GNSS satellite; e) determining a deviation of the expected angular position from the viewed angular sector of space; f) comparing the deviation to a defined deviation threshold; and g) in response to the deviation exceeding the defined deviation threshold, determining that the reading is a suspicious reading,thereby enabling determination of at least one of time and object location without use of the suspicious reading.In addition to the above features, the method according to this aspect of the presently disclosed subject matter can include one or more of features (i) to (xxxvii) listed below, in any desired combination or permutation which is technically possible: (i) the at least one antenna array attached to an object (ii) the step (b) further comprising obtaining an attitude of the object and an antenna array attitude with respect to the object, wherein the determining the view direction of each antenna array is based on at least the attitude of the object and the antenna array attitude with respect to the object. (iii) the object is a vehicle, wherein the attitude of the object comprises at least one at least one of vehicle pitch, vehicle yaw, and vehicle roll.(iv) the step (c) further comprises obtaining a position of the object, wherein the determining of the viewed angular sector of space is based on the position of the object.(v) step (d) further comprises obtaining an almanac, wherein the determining of the expected angular position of the each GNSS satellite is based on the almanac.(vi) step (g) further comprising sending to at least one GNSS receiver an instruction to ignore the suspicious reading.(vii) the expected angular position and the viewed angular sector of space are expressed in a common reference frame.(viii) each antenna array of the at least one antenna array comprises at least one antenna.(ix) the at least one antenna array being directional,wherein said step (f) further comprising obtaining a reception intensity of the at least one signal,wherein the deviation threshold is based at least on a relationship between an expected reception intensity of the at least one signal and on the reception intensity of the at least one signal.(x) the expected reception intensity being based on an antenna radiation pattern associated with the at least one antenna array.(xi) the method further comprising: h) in response to the deviation not exceeding the defined deviation threshold, determining that the reading is a likely-valid reading.(xii) the at least one antenna array comprises a plurality of antenna arrays, wherein each antenna array of the plurality of antenna arrays operatively coupled to a unique GNSS receiver of a plurality of GNSS receivers, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein the data constituting a plurality of readings, each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers, the method further comprising: i) classifying the at least one GNSS satellite, the classifying comprising: 1. in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, performing the following:A. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity;B. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity;C. calculating a difference between the first reception intensity and the second reception intensity;D. comparing the difference to a defined intensity difference threshold; andE. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof- victim GNSS satellite,thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite.(xiii) the defined intensity difference threshold being at least 10 dB.(xiv) the step (1) further comprising:F. in response to the difference not being greater than the defined intensity difference threshold, classify the at least one GNSS satellite as a suspect-spoof-victim GNSS satellite.(xv) the step (i) further comprising:2. in response to all of the readings associated with the each GNSS satellite are suspect readings, classify the at least one GNSS satellite as a spoof-victim GNSS satellite.(xvi) the step (i) further comprising: 3. in response to all readings associated with the at least one GNSS satellite are likely-valid readings, classify the at least one GNSS satellite as a verified-valid GNSS satellite. (xvii) the receiving of the data being from the at least one GNSS receiver. (xviii) further comprising taking an action associated with the spoof detection.(xix) the action comprises sending to the at least one GNSS receiver the instruction to ignore the suspicious readings.(xx) the action comprises sending to the at least one GNSS receiver an instruction to ignore readings associated with the each spoof-victim GNSS satellite.(xxi) the action comprises sending to the at least one GNSS receiver an instruction to utilize readings associated with the each verified-valid GNSS satellite.(xxii) the action further comprising determining, based at least on the verified- valid GNSS satellite, at least one of: the position of the object and an indication of time.(xxiii) the action comprising reporting to at least one other system reported information indicative of at least one of: the at least one suspect reading, the each spoof-victim GNSS satellite, the each suspect-spoof-victim GNSS satellite.(xxiv) the action further comprising reporting to the at least one other system viewed angular sectors of space associated with the each spoof-victim GNSS satellite.(xxv), the action further comprising reporting, to the at least one other system, at least one set of object false position coordinates associated with the each spoof-victim GNSS satellite.(xxvi) the action further comprising reporting, to the at least one other system, at least one object false time measurement associated with the each spoof-victim GNSS satellite.(xxvii) the first reception intensity and the second reception intensity being provided by the at least one GNSS receiver.(xxviii) the first reception intensity and the second reception intensity comprise a Signal to Noise Ratio (SNR).(xxix) the Signal to Noise Ratio (SNR) range from 0 to 99.(xxx) the defined intensity difference threshold being at least 15 dB.(xxxi) the defined intensity difference threshold being at least 30 dB. (xxxii) at least a part of the viewed angular sectors of space overlap. (xxxiii) at least a part of the viewed angular sectors of space do not overlap.(xxxiv) the viewed angular sectors of space differ by at least 20 degrees.(xxxv) the viewed angular sectors of space differ by at least 30 degrees,(xxxvi) the viewed angular sectors of space differ by at least 45 degrees.(xxxvii) the at least one antenna array comprises a plurality of antennaarrays, wherein the plurality of antenna arrays operatively coupled to at least one GNSS receiver, wherein the at least one GNSS receiver receives antenna signals from each antenna array of the plurality of antenna arrays based on a duty cycle, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein the data constituting a plurality of readings, each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers, the method further comprising:j) classifying the at least one GNSS satellite, the classifying comprising:1. in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, performing the following:G. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity;H. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity;I. calculating a difference between the first reception intensity and the second reception intensity;J. comparing the difference to a defined intensity difference threshold; andK. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof״ victim GNSS satellite,thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite.According to another aspect of the presently disclosed subject matter there is presented a method of GNSS-spoof detection, the method being performed by a processing circuitry and comprising:i. receiving data indicative of at least one candidate GNSS signal, broadcast by a respective GNSS satellite, the data constituting a plurality of readings;ii. determining a view direction of at least one antenna array that received the at least one candidate GNSS signal,wherein the at least one antenna array comprises a plurality of antenna arrays, wherein each antenna array of the plurality of antenna arrays operatively coupled to a unique GNSS receiver of a plurality of GNSS receivers, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers;iii. determining a viewed angular sector of space associated with the at least one antenna array, based at least on the view direction and on antenna array parameters;iv. determining an expected angular position of the at least one GNSS satellite;v. determining a deviation of the expected angular position from the viewed angular sector of space;vi. comparing the deviation to a defined deviation threshold; andvii. in response to the deviation exceeding the defined deviation threshold, determining that the reading is a suspicious reading;viii. in response to the deviation not exceeding the defined deviation threshold, determining that the reading is a likely-valid reading;ix. classifying the at least one GNSS satellite, the classifying comprising: 1. in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, performing the following:A. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity;B. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity;C. calculating a difference between the first reception intensity and the second reception intensity;D. comparing the difference to a defined intensity difference threshold; andE. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof- victim GNSS satellite,thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite.
This aspect of the disclosed subject matter can optionally include one or more of features (i) to (xxxvii) listed above, mutatis mutandis, in any desired combination or permutation which is technically possible. (xxxviii) the object is stationary.(xxxix) the object is a vehicle. (xl) the vehicle is least one of an airborne vehicle, a balloon, a ground vehicle, and a water-borne vehicle.(xli) the at least one antenna comprises one antenna.(xlii) the at least one antenna comprises a plurality of antennas.(xliii) further comprising repeating the method at least once.(xliv) wherein an interval between the repetitions is less than or equal to 1/second.(xlv) wherein an interval between the repetitions is less than or equal to second.(xlvi) the at least one antenna array being in a fixed spatial attitude with respect to the object.(xlvii)the at least one antenna array being capable of changing a spatial antenna array orientation with respect to the(xlviii) the determining of the expected angular position of the each GNSSsatellite is based at least on satellite identification information associated with the at least one signal.(xlix)the satellite identification information comprises a satellite Pseudo Random Number (PRN) code.
According to another aspect of the presently disclosed subject matter there is provided a non-transitory program storage device readable by machine, tangibly embodying a program of instructions executable by the machine to perform any of the above methods of GNSS spoof detection.
According to another aspect of the presently disclosed subject matter there is provided a non GNSS-spoof detection system, a processing circuitry of the GNSS-spoof detection system configured to perform any of the above methods of GNSS spoof detection.
The systems, and the non-transitory computer readable storage media disclosed herein according to various aspects, can optionally further comprise one or more of features (i) to (xlix) listed above, mutatis mutandis, in any technically possible combination or permutation.
BRIEF DESCRIPTION OF THE DRAWINGS In order to understand the invention and to see how it can be carried out in practice, embodiments will be described, by way of non-limiting examples, with reference to the accompanying drawings, in which: Figs. 1Aand IBschematically illustrate an example generalized view of an object with antenna arrays, in accordance to some embodiments of the presently disclosed subject matter; Fig. 1Cschematically illustrates an example generalized view of a viewed angular sector of space, in accordance to some embodiments of the presently disclosed subject matter; Fig. IDschematically illustrates an example generalized view of an antenna array, in accordance to some embodiments of the presently disclosed subject matter.
Fig. IEschematically illustrates an example generalized view of antenna arrays, in accordance to some embodiments of the presently disclosed subject matter; Fig. 2schematically illustrates an example of certain features of the presently disclosed subject matter Fig. 3Aschematically illustrates an example generalized view of spoofing, in accordance to some embodiments of the presently disclosed subject matter; Fig. 3Bschematically illustrates an example generalized view of spoofing, in accordance to some embodiments of the presently disclosed subject matter; Fig.3C and 3D schematically illustrate an example generalized view of antenna array directionality, in accordance to some embodiments of the presently disclosed subject matter; Fig. 4schematically illustrates an example generalized view of a schematic diagram of a spoof detection system, in accordance to some embodiments of the presently disclosed subject matter; Fig. 5schematically illustrates an example generalized view of a schematic diagram of a processor, in accordance to some embodiments of the presently disclosed subject matter; Fig. 6Aand 6Bschematically illustrate an example example generalized view of a flow for spoof detection, in accordance to some embodiments of the presently disclosed subject matter; Fig. 7 schematically illustrates a method for classifying readings, in accordance to some embodiments of the presently disclosed subject matter; Fig. 8schematically illustrates a method for classifying satellites, in accordance to some embodiments of the presently disclosed subject matter.
DETAILED DESCRIPTION In the drawings and descriptions set forth, identical reference numerals indicate those components that are common to different embodiments or configurations.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the presently disclosed subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the presently disclosed subject matter.
It is to be understood that the invention is not limited in its application to the details set forth in the description contained herein or illustrated in the drawings. The invention is capable of other embodiments and of being practiced and carried out in various ways. Hence, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting. As such, those skilled in the art will appreciate that the conception upon which this disclosure is based may readily be utilized as a basis for designing other structures, methods, and systems for carrying out the several purposes of the presently disclosed subject matter.
It will also be understood that the system according to the invention may be, at least partly, implemented on a suitably programmed computer. Likewise, the invention contemplates a computer program being readable by a computer for executing the method of the invention. The invention further contemplates a non-transitory computer-readable memory tangibly embodying a program of instructions executable by the computer for executing the method of the invention.
Those skilled in the art will readily appreciate that various modifications and changes can be applied to the embodiments of the invention as hereinbefore described without departing from its scope, defined in and by the appended claims.
Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as "receiving", "identifying", "generating", "associating" or the like, refer to the action(s) and/or process(es) of a computer that manipulate and/or transform data into other data, said data represented as physical, e.g. such as electronic or mechanical quantities, and/or said data representing the physical objects.. The term "computer" should be expansively construed to cover any kind of hardware-based electronic device with data processing capabilities including a personal computer, a server, a computing system, a communication device, a processor or processing unit (e.g. digital signal processor (DSP), a microcontroller, a microprocessor, a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), etc.), and any other electronic computing device, including, by way of non-limiting example, clock synchronization system 6and processing circuitry 430 disclosed in the present application.
The operations in accordance with the teachings herein may be performed by a computer specially constructed for the desired purposes, or by a general-purpose computer specially configured for the desired purpose by a computer program stored in a non-transitory computer-readable storage medium.
Embodiments of the presently disclosed subject matter are not described with reference to any particular programming language. It will be appreciated that a variety of programming languages may be used to implement the teachings of the presently disclosed subject matter as described herein.
The terms "non-transitory memory" and "non-transitory storage medium" used herein should be expansively construed to cover any volatile or non-volatile computer memory suitable to the presently disclosed subject matter.
The operations in accordance with the teachings herein may be performed by a computer specially constructed for the desired purposes or by a general-purpose computer specially configured for the desired purpose by a computer program stored in a non- transitory computer-readable storage medium.
As used herein, the phrase "for example," "such as", "for instance" and variants thereof describe non-limiting embodiments of the presently disclosed subject matter. Reference in the specification to "one case", "some cases", "other cases", "one example", "some examples", "other examples" or variants thereof means that a particular described method, procedure, component, structure, feature or characteristic described in connection with the embodiment(s) is included in at least one embodiment of the presently disclosed subject matter, but not necessarily in all embodiments. The appearance of the same term does not necessarily refer to the same embodiment(s) or example(s).
Usage of conditional language, such as "may", "might", or variants thereof should be construed as conveying that one or more examples of the subject matter may include, while one or more other examples of the subject matter may not necessarily include, certain methods, procedures, components and features. Thus such conditional language is not generally intended to imply that a particular described method, procedure, component or circuit is necessarily included in all examples of the subject matter. Moreover, the usage of non-conditional language does not necessarily imply that a particular described method, procedure, component or circuit is necessarily included in all examples of the subject matter.
It is appreciated that certain embodiments, methods, procedures, components or features of the presently disclosed subject matter, which are, for clarity, described in the context of separate embodiments or examples, may also be provided in combination in a single embodiment or examples. Conversely, various embodiments, methods, procedures, components or features of the presently disclosed subject matter, which are, for brevity, described in the context of a single embodiment, may also be provided separately or in any suitable sub-combination.
It should also be noted that each of the figures herein, and the text discussion of each figure, describe one aspect of the presently disclosed subject matter in an informative manner only, by way of non-limiting example, for clarity of explanation only. It will be understood that that the teachings of the presently disclosed subject matter are not bound by what is described with reference to any of the figures or described in other documents referenced in this application.
Bearing this in mind, attention is drawn to Figs. 1Aand IB,schematically illustrating an example generalized view of an object with antenna arrays, in accordance to some embodiments of the presently disclosed subject matter. In the figure, the object 110is the non-limiting example of a vehicle, specifically an aircraft 110.In the example, the object has mounted on it, or otherwise attached to it, four arrays of GNSS antennas - 120 on the top, 130 on the bottom, 125 on the left side and 135 on the right side. These antenna arrays serve as the examples in the following figures. In general, one or more antenna arrays may be attached to the object. Note that in the example, they do not all point in the same view direction.
In some examples, the object is stationary, e.g. a building. In such a case, GNSS might be used for time determination only, since the building position does not change. Examples of a vehicle include an airborne vehicle, a balloon, a ground vehicle, and a water-borne vehicle.
Attention is drawn to Fig. 1C,schematically illustrating an example generalized view of a viewed angular sector of space, in accordance to some embodiments of the presently disclosed subject matter. Object (aircraft) 110 has antenna array 120 with a view direction 170. The GNSS satellites sit in space, surrounding the earth, and they sit in a portion of space having roughly a globe shape, denoted schematically by 160. The array receives GNSS signals not only from direction 170, but also from satellites located at certain angles off of 170. This is denoted in the example by an ellipsoid 180, referred to herein also as a viewed angular sector of space.
Attention is drawn to Fig. ID,schematically illustrating an example generalized view of an antenna array, in accordance to some embodiments of the presently disclosed subject matter. An antenna can comprise one or more antennas. In the example are shown three antennas, each pointed in a different direction. All the antennas of the array are connected to one GNSS receiver, not shown. In the example, each antenna has a viewed angular sector of space 30 degrees, and the array as a whole has a viewed angular sector of space of 90 degrees.Attention is drawn to Fig. IE,schematically illustrating an example generalized view of antenna arrays, in accordance to some embodiments of the presently disclosed subject matter. In the example, two antenna arrays 120 and 122 have overlapping viewed angular sector of space, where the overlap is the angle E. Satellite 5 is located in the overlapping portion. If E > 0 , there is overlap. If E=0, there is no overlap. If E < 0, there is no overlap, and there is a gap in the view of space, e.g. neither antenna array will see satellite 5. In some examples, the viewed angular sectors of space differ by at least degrees. In some examples, the viewed angular sectors of space differ by at least degrees. In some examples, the viewed angular sectors of space differ by at least degrees.Attention is drawn to Fig. 2,schematically illustrating an example generalized view of spoofing, in accordance to some embodiments of the presently disclosed subject matter. The example shows an aerial view 200 of object 110, with a heading phi shown relative to North. This is a yaw angle, in some examples. Real GNSS satellites SI, S2, S3, S5 are shown. Antenna array 135 has a viewed angular sector of space of Eta. SI is located at an expected angular position alpha from North. Since it falls within the viewed angular sector associated with 135, it is expected that 135 will receive GNSS signals from SI, as well as from S2. If 135 receives signals from S3 and S5, not located within its viewed angular sector of space, it might be that the S3 and S5 signals are in fact sent by spoofers, indicated in the figure by Fake S3 and Fake S5.Attention is drawn to Fig. 3A,schematically illustrating an example generalized view of spoofing, in accordance to some embodiments of the presently disclosed subject matter. The example shows a side view 300 of object 310, a ground vehicle. Real GNSS satellite S5 are shown. Antenna array 320 has a viewed angular sector of space of Rho. S5 is located at an expected angular position beta from the horizontal. Since it falls within the viewed angular sector associated with 320, it is expected that 320 will receive GNSS signals from S5, as well as from S2. Note that in general, the expected angular position can be expressed in terms of Azimuth and Elevation.Attention is drawn to Fig. 3B,schematically illustrating an example generalized view of spoofing, in accordance to some embodiments of the presently disclosed subject matter. The example shows a side view 350 of object 110, an aircraft. Unlike the ground vehicle 310, aircraft 110 is also capable of pitch theta. Real GNSS satellites SI, S2, S3, S4, S5 are shown. Antenna array 120 has a viewed angular sector of space of gamma. SI, S4 and S5 all fall within the viewed angular sector associated with 120, so it is expected that 135 will receive GNSS signals from them. If 135 receives signals from S3 and S2, not located within its viewed angular sector of space, it might be that the S3 and S2 signals are in fact sent by spoofers, indicated in the figure by Fake S3 and Fake S2. Similarly, if antenna array 13 0 receives signals from S1, it might be that the S1 signals are in fact sent by spoofers, indicated in the figure by Fake SI.Note that aircraft 110 is capable also of roll, but this angle is not shown for simplicity of exposition. The view direction of the antenna arrays, and thus the viewed angular sector of space, would in such a case take into account the roll as well.Note that there are advantages to detecting those signals that are likely spoofed, and those satellites which are being spoofed. This knowledge can, for example, be used to ensure that GNSS-based location and/or time calculations make use of only known- valid readings and/or verified-valid satellites. In other examples, this knowledge can be used to ensure that GNSS-based location and/or time calculations do not make use of suspicious readings and/or verified-spoofed satellites.In some examples, a first method of spoof detection is to determine the view direction 170 of the antenna array 120, and based on that and on antenna parameters (e.g. as disclosed with reference to Figs. 3C and 3D), determine a viewed angular sector of space (e.g. start-rho to end-rho, and start-gamma to end-gamma, in the figures) associated with the antenna array 320, 120. An expected angular position (e.g. alpha, beta) of each relevant GNSS satellite is determined, using for example almanac and ephemeris data. This data can be received from external systems, e.g. the Internet, or can be received as part of the candidate GNSS signals.The detection system will then determine whether the expected angular position is within the viewed angular sector of space. For example, it will determine a deviation of the expected angular position from the viewed angular sector of space, and then compare the deviation to a defined deviation threshold. If the deviation exceeds the defined deviation threshold, the system determines that the reading is a suspicious reading. Else it determines that the reading is a likely-valid reading. More detail is disclosed with reference to Figs. 6A, 6B and 7.In an second example method, the detection system looks at different readings, from different antenna arrays, associated with the same satellite, and looks at their intensities. More detail is disclosed with reference to Figs. 6A, 6B and 8.Attention is drawn to Fig. 3Cand 3D,schematically illustrating an example generalized view of antenna array directionality, in accordance to some embodiments of the presently disclosed subject matter. Graph 370 represents gain of signals received by an omni antenna array. The intensity of the received GNSS signals will be the same from all angles. Graph 380 represents gain of signals received by a directional antenna array. The intensity of the received GNSS signals vary based on the angle. In the example of 380, a signal received from angle 270, relative to the view direction of the antenna array 120, will be received with a gain of approximately -4.5 dB, compared to a signal received from angle 0. In some examples, the expected reception intensity of the signal is associated with the directionality of the antenna, and this expected intensity may be utilized to detect spoofing, as disclosed further herein.Attention is drawn to Fig. 4,schematically illustrating an example generalized view of a schematic diagram of a spoof detection system, in accordance to some embodiments of the presently disclosed subject matter. The spoof detection system 4comprises a processing circuitry 430, which may be, in non-limiting examples, general- purpose computers specially configured for the desired purpose by a computer program stored in a non-transitory computer-readable storage medium. They may be configured to execute several functional modules in accordance with computer-readable instructions. In other non-limiting examples, the processing circuitry may be computers specially constructed for the desired purposes. The processing circuitry may comprise a processor 432, also referred to herein as a central processing unit, and a memory 434.The processor 432 may be operatively coupled 447 to one or more GNSS receivers. Each GNSS receiver is operatively coupled 437 to antenna arrays 120, 125, 130, 135, shown here as each comprising one antenna. The antenna arrays receive 1candidate GNSS signal(s). Each candidate GNSS signal is broadcast 115 by a real GNSS satellite, or broadcast 112 by a fake (spoofed) GNSS satellite. The processor receives 447 from each GNSS receiver data indicative of one or more candidate GNSS signals - this data is referred to herein also as a reading. Each GNSS receiver has its respective readings, per respective candidate GNSS signal.The processor 432 also receives information from other systems about the attitude 480 of the object, e.g. yaw, roll and pitch of a vehicle. It also is operatively coupled to external systems 490, which in some examples send it the GNSS almanac. It can also send alerts and other information to these external systems 490. The almanac may be stored 445 in a storage 440 of the spoof detection system 420.The Memory 434 may in some examples store data derived during the processing of received data, and used by the various processing stages.Attention is drawn to Fig. 5,schematically illustrating an example generalized view of a schematic diagram of a processor 432, in accordance to some embodiments of the presently disclosed subject matter. The processor may comprise at least one or more function modules. In some examples it may perform at least functions, such as those disclosed further herein. Example modules are shown in the figure. Note that the modules can be implemented in hardware, software and/or firmware. Figs. 4and 5illustrate only a general schematic of the system architecture, describing, by way of non-limiting example, certain aspect of the presently disclosed subject matter in an informative manner only, for clarity of explanation only. It will be understood that that the teachings of the presently disclosed subject matter are not bound by what is described with reference to Figs. 4and 5. Only certain components are shown, as needed to exemplify the presently disclosed subject matter. Other components and sub-components, not shown, may exist.
Systems such as those described with respect to the non-limiting examples of Figs. 4and 5,may be capable of performing all, some, or parts of the methods disclosed herein.Each system component and module in Figs. Figs. 4and 5can be made up of any combination of software, hardware and/or firmware, as relevant, executed on a suitable device or devices, which perform the functions as defined and explained herein. The hardware can be digital and/or analog. Equivalent and/or modified functionality, as described with respect to each system component and module, can be consolidated or divided in another manner. Thus, in some embodiments of the presently disclosed subject matter, the system may include fewer, more, modified and/or different components, modules and functions than those shown in Figs. 4and 5. One or more of these components and modules can be centralized in one location or dispersed and distributed over more than one location.Each component in Figs. 4and 5may represent a plurality of the particular component, possibly in a distributed architecture, which are adapted to independently and/or cooperatively operate to process various data and electrical inputs, and for enabling operations related to damage detection and verification. In some cases multiple instances of a component, may be utilized for reasons of performance, redundancy and/or availability. Similarly, in some cases, multiple instances of a component may be utilized for reasons of functionality or application. For example, different portions of the particular functionality may be placed in different instances of the component. Those skilled in the art will readily appreciate that the components of the system can be consolidated or divided in a manner other than that disclosed herein.
The communication between the various components of the systems of Figs. 4 and 5, in cases where they are not located entirely in one location or in one physical component, can be realized by any signaling system or communication components, modules, protocols, software languages and drive signals, and can be wired and/or wireless, as appropriate.
Attention is drawn to Figs. 6Aand 6B,schematically illustrating an example generalized view of a flow for spoof detection, in accordance to some embodiments of the presently disclosed subject matter. This process may be performed by the processing circuitry of Fig. 4. In some examples, the process includes:

Claims (9)

Ver. 3 / Amended 2 June 20 CLAIMS: 1. A method of GNSS-spoof detection, the method being performed by a processing circuitry and comprising: a) receiving data indicative of at least one candidate GNSS signal, broadcast by a respective GNSS satellite, the data constituting a reading; b) determining a view direction of at least one antenna array that received the at least one candidate GNSS signal, wherein the at least one antenna array comprises a plurality of antenna arrays, wherein each antenna array of the plurality of antenna arrays operatively coupled to a unique GNSS receiver of a plurality of GNSS receivers, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein the data constituting a plurality of readings, each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers; c) determining a viewed angular sector of space associated with the at least one antenna array, based at least on the view direction and on antenna array parameters; d) determining an expected angular position of the at least one GNSS satellite; e) determining a deviation of the expected angular position from the viewed angular sector of space; f) comparing the deviation to a defined deviation threshold; g) in response to the deviation exceeding the defined deviation threshold, determining that the reading is a suspicious reading; h) in response to the deviation not exceeding the defined deviation threshold, determining that the reading is a likely-valid reading; and i) classifying the at least one GNSS satellite, the classifying comprising: Ver. 3 / Amended 2 June 20
1.) in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, performing the following: A. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity; B. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity; C. calculating a difference between the first reception intensity and the second reception intensity; D. comparing the difference to a defined intensity difference threshold; and E. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof-victim GNSS satellite, thereby enabling determination of at least one of time and object location without use of the suspicious reading, thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite. 2. The method of claim 1 , wherein the defined intensity difference threshold being at least 10 dB. 3. The method of any one of claims 1 to 2 , wherein the step (1) further comprising: Ver. 3 / Amended 2 June 20 F. in response to the difference not being greater than the defined intensity difference threshold, classify the at least one GNSS satellite as a suspect-spoof-victim GNSS satellite. 4. The method of any one of claims 1 to 3 , wherein the step (i) further comprising:
2.) in response to all of the readings associated with the each GNSS satellite are suspect readings, classify the at least one GNSS satellite as a spoof-victim GNSS satellite. 5. The method of any one of claims 1 to 4 , wherein the step (i) further comprising:
3.) in response to all readings associated with the at least one GNSS satellite are likely-valid readings, classify the at least one GNSS satellite as a verified-valid GNSS satellite. 6. The method of any one of claims 1to 5 , wherein the receiving of the data being from the at least one GNSS receiver. 7. The method of any one of claims 1to 6 , further comprising taking an action associated with the spoof detection. 8. The method of the claim 7 , wherein the action comprises sending to the at least one GNSS receiver the instruction to ignore the suspicious readings. 9. The method of any one of claims 7to 8 , wherein the action comprises sending to the at least one GNSS receiver an instruction to ignore readings associated with the each spoof-victim GNSS satellite. 10. The method of any one of claims 7to 9 , wherein the action comprises sending to the at least one GNSS receiver an instruction to utilize readings associated with the each verified-valid GNSS satellite. 11. The method of any one of claims 7 to 10 , the action further comprising determining, based at least on the verified-valid GNSS satellite, at least one of: the position of the object and an indication of time. 12. The method of any one of claims 7 to 11 , the action comprising reporting to at least one other system reported information indicative of at least one of: the at least one suspect reading, the each spoof-victim GNSS satellite, the each suspect-spoof-victim GNSS satellite. Ver. 3 / Amended 2 June 20 13. The method of claim 12 , the action further comprising reporting to the at least one other system viewed angular sectors of space associated with the each spoof-victim GNSS satellite. 1
4. The method of any one of claims 12 to 13 , the action further comprising reporting, to the at least one other system, at least one set of object false position coordinates associated with the each spoof-victim GNSS satellite. 1
5. The method of any one of claims 12 to 14 , the action further comprising reporting, to the at least one other system, at least one object false time measurement associated with the each spoof-victim GNSS satellite. 1
6. The method of any one of claims 1 to 15 , wherein the first reception intensity and the second reception intensity being provided by the at least one GNSS receiver. 1
7. The method of claim 16 , wherein the first reception intensity and the second reception intensity comprise a Signal to Noise Ratio (SNR). 1
8. The method of claim 17 , wherein values of the Signal to Noise Ratio (SNR) range from 0 to 9
9. 19. The method of any one of claims 1 to 18 , wherein the defined intensity difference threshold being at least 15 dB. 20. The method of any one of claims 1 to 19 , wherein the defined intensity difference threshold being at least 30 dB. 21. The method of any one of claims 1to 20 , wherein at least a part of the viewed angular sectors of space overlap. 22. The method of any one of claims 1to 21 , wherein the viewed angular sectors of space differ by at least 20 degrees. 23. The method of any one of claims 1 to 22 , wherein the object is stationary. 24. The method of any one of claims 1to 23 , wherein the object is a vehicle. 25. The method of claim 24 , wherein the vehicle is least one of an airborne vehicle, a balloon, a ground vehicle, and a water-borne vehicle. 26. The method of any one of claims 1to 25 , wherein the at least one antenna comprises one antenna. Ver. 3 / Amended 2 June 20 27. The method of any one of claims 1to 2 6, wherein the at least one antenna comprises a plurality of antennas. 28. The method of any one of claims 1 to 27 , further comprising repeating the method at least once. 29. The method of claim 28 , wherein an interval between the repetitions is less than or equal to 1/10 second. 30. The method of any one of claims 28 to 29 , wherein an interval between the repetitions is less than or equal to 1 second. 31. The method of any one of claims 1to 30 , wherein the at least one antenna array being in a fixed spatial attitude with respect to the object. 32. The method of any one of claims 1to 31 , wherein the at least one antenna array being capable of changing a spatial antenna array orientation with respect to the object. 33. The method of any one of claims 1 to 32 , wherein the determining of the expected angular position of the each GNSS satellite is based at least on satellite identification information associated with the at least one signal. 34. The method of claim 33 , wherein the satellite identification information comprises a satellite Pseudo Random Number (PRN) code. 35. The method of one of claims 1to 34 , wherein the at least one antenna array attached to an object, wherein the step (b) further comprising obtaining an attitude of the object and an antenna array attitude with respect to the object, wherein the determining the view direction of each antenna array is based on at least the attitude of the object and the antenna array attitude with respect to the object. 36. The method of claim 35 , wherein the object is a vehicle, wherein the attitude of the object comprises at least one at least one of vehicle pitch, vehicle yaw, and vehicle roll. 37. The method of any one of claims 1to 36 , wherein the step (c) further comprises obtaining a position of the object, wherein the determining of the viewed angular sector of space is based on the position of the object. 38. The method of any one of claims 1to 37 , wherein the step (d) further comprises obtaining an almanac, wherein the determining of the expected angular position of the each GNSS satellite is based on the almanac. Ver. 3 / Amended 2 June 20 39. The method of any one of claims 1 to 38 , wherein said step (g) further comprising sending to at least one GNSS receiver an instruction to ignore the suspicious reading. 40. The method of any one of claims 1 to 39 , wherein the expected angular position and the viewed angular sector of space are expressed in a common reference frame. 41. The method of any one of claims 1 to 40 , wherein each antenna array of the at least one antenna array comprises at least one antenna. 42. The method of any one of claims 1to 41 , wherein the at least one antenna array being directional, wherein said step (f) further comprising obtaining a reception intensity of the at least one signal, wherein the deviation threshold is based at least on a relationship between an expected reception intensity of the at least one signal and on the reception intensity of the at least one signal. 43. The method of claim 42 , wherein the expected reception intensity being based on an antenna radiation pattern associated with the at least one antenna array 44. A GNSS-spoof detection system, a processing circuitry of the GNSS-spoof detection system configured to perform a method, the method comprising: a) receiving data indicative of at least one candidate GNSS signal, broadcast by a respective GNSS satellite, the data constituting a reading; b) determining a view direction of at least one antenna array that received the at least one candidate GNSS signal, wherein the at least one antenna array comprises a plurality of antenna arrays, wherein each antenna array of the plurality of antenna arrays operatively coupled to a unique GNSS receiver of a plurality of GNSS receivers, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein the data constituting a plurality of readings, each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers; Ver. 3 / Amended 2 June 20 c) determining a viewed angular sector of space associated with the at least one antenna array, based at least on the view direction and on antenna array parameters; d) determining an expected angular position of the at least one GNSS satellite; e) determining a deviation of the expected angular position from the viewed angular sector of space; f) comparing the deviation to a defined deviation threshold; and g) in response to the deviation exceeding the defined deviation threshold, determining that the reading is a suspicious reading, h) in response to the deviation not exceeding the defined deviation threshold, determining that the reading is a likely-valid reading; and i) classifying the at least one GNSS satellite, the classifying comprising: 1) in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, performing the following: A. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity; B. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity; C. calculating a difference between the first reception intensity and the second reception intensity; D. comparing the difference to a defined intensity difference threshold; and E. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the Ver. 3 / Amended 2 June 20 first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof-victim GNSS satellite, thereby enabling determination of at least one of time and object location without use of the suspicious reading, thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite. 45. The GNSS-spoof detection system of claim 44 , wherein the GNSS-spoof detection system is comprised in a GNSS receiver. 46. The method of one of claims 44 to 45 , wherein the step (1) further comprising: F. in response to the difference not being greater than the defined intensity difference threshold, classify the at least one GNSS satellite as a suspect-spoof-victim GNSS satellite. 47. The method of any one of claims 44 to 46 , wherein the step (i) further comprising: 2) in response to all of the readings associated with the each GNSS satellite are suspect readings, classify the at least one GNSS satellite as a spoof-victim GNSS satellite. 48. The method of any one of claims 44 to 47 , wherein the step (i) further comprising: 3) in response to all readings associated with the at least one GNSS satellite are likely-valid readings, classify the at least one GNSS satellite as a verified-valid GNSS satellite. 49. The method of any one of claims 44to 48 , further comprising taking an action associated with the spoof detection. 50. A non-transitory computer readable storage medium tangibly embodying a program of instructions that, when executed by a computer, causing the computer to perform a method of GNSS-spoof detection, the method being performed by a processing circuitry and comprising: Ver. 3 / Amended 2 June 20 a) receiving data indicative of at least one candidate GNSS signal, broadcast by a respective GNSS satellite, the data constituting a reading; b) determining a view direction of at least one antenna array that received the at least one candidate GNSS signal, wherein the at least one antenna array comprises a plurality of antenna arrays, wherein each antenna array of the plurality of antenna arrays operatively coupled to a unique GNSS receiver of a plurality of GNSS receivers, wherein viewed angular sectors of space associated with each antenna array of the plurality of antenna arrays are not identical, wherein the data constituting a plurality of readings, each reading of the plurality of readings associated with a respective GNSS receiver of the plurality of GNSS receivers; c) determining a viewed angular sector of space associated with the at least one antenna array, based at least on the view direction and on antenna array parameters; d) determining an expected angular position of the at least one GNSS satellite; e) determining a deviation of the expected angular position from the viewed angular sector of space; f) comparing the deviation to a defined deviation threshold; and g) in response to the deviation exceeding the defined deviation threshold, determining that the reading is a suspicious reading, h) in response to the deviation not exceeding the defined deviation threshold, determining that the reading is a likely-valid reading; and i) classifying the at least one GNSS satellite, the classifying comprising: 1) in response to a first part of the readings associated with the at least one GNSS satellite are likely-valid readings, associated with a first part of the plurality of antenna arrays, and a second part of the readings associated with the at least one GNSS satellite are suspect readings, associated with a second part of the plurality of antenna arrays, Ver. 3 / Amended 2 June 20 performing the following: A. obtaining a reception intensity of at least one suspect reading of the some suspect readings, constituting a first reception intensity; B. obtaining a reception intensity of at least one likely-valid reading of the some likely-valid readings, constituting a second reception intensity; C. calculating a difference between the first reception intensity and the second reception intensity; D. comparing the difference to a defined intensity difference threshold; and E. in response to the difference being greater than the defined intensity difference threshold, the difference indicative of the first reception intensity being larger than the second reception intensity, classify the at least one GNSS satellite as a spoof-victim GNSS satellite, thereby enabling determination of at least one of time and object location without use of the suspicious reading, thereby enabling calculation of at least one of time and object location without use of the spoof-victim GNSS satellite.
IL266933A 2019-05-27 2019-05-27 Method and system of gnss spoofing detection IL266933B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
IL266933A IL266933B2 (en) 2019-05-27 2019-05-27 Method and system of gnss spoofing detection
PCT/IL2020/050604 WO2020240571A1 (en) 2019-05-27 2020-05-26 Method and system of gnss spoofing detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IL266933A IL266933B2 (en) 2019-05-27 2019-05-27 Method and system of gnss spoofing detection

Publications (3)

Publication Number Publication Date
IL266933A IL266933A (en) 2020-11-30
IL266933B1 IL266933B1 (en) 2023-01-01
IL266933B2 true IL266933B2 (en) 2023-05-01

Family

ID=73553628

Family Applications (1)

Application Number Title Priority Date Filing Date
IL266933A IL266933B2 (en) 2019-05-27 2019-05-27 Method and system of gnss spoofing detection

Country Status (2)

Country Link
IL (1) IL266933B2 (en)
WO (1) WO2020240571A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114924294B (en) * 2022-07-18 2022-12-06 湖南卫导信息科技有限公司 Transponding satellite navigation deception jamming system and method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6594582B1 (en) * 1999-05-14 2003-07-15 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration GPS compound eye attitude and navigation sensor and method
US7952519B1 (en) * 2010-04-16 2011-05-31 John Nielsen Method and system for detecting GNSS spoofing signals
US20140035783A1 (en) * 2012-07-31 2014-02-06 Vincent M. Contarino Multi-beam antenna array for protecting GPS receivers from jamming and spoofing signals
US10908293B2 (en) * 2013-08-14 2021-02-02 Hemisphere GNSS, Inc. System and method for detecting false global navigation satellite system satellite signals
US9927526B2 (en) * 2013-09-24 2018-03-27 Elbit Systems Of America, Llc Systems and methods for position determination in GPS-denied situations

Also Published As

Publication number Publication date
IL266933B1 (en) 2023-01-01
WO2020240571A1 (en) 2020-12-03
IL266933A (en) 2020-11-30

Similar Documents

Publication Publication Date Title
US11693122B1 (en) Global navigation satellite system spoofer identification technique
US11409003B1 (en) Global navigation satellite system beam based attitude determination
US11194053B1 (en) Global navigation satellite system spoofer identification technique based on carrier to noise ratio signatures
EP2801838B1 (en) Evaluating the position of an aerial vehicle
US6016120A (en) Method and apparatus for automatically aiming an antenna to a distant location
US7840075B2 (en) Marine radar system with three-dimensional memory
JP6691096B2 (en) Deception signal detection system and deception signal detection method
US20150226857A1 (en) Detection of spoofed satellite signals
WO2019168571A3 (en) Spoofing detection and rejection
US20160047883A1 (en) Systems and methods for determining a position of a transmitter of a bistatic radar system
US11926345B2 (en) Autonomous vehicles supporting global navigation satellite system (GNSS) anti-spoofing
CN111505669A (en) GNSS deception detection method and system using double antennas
US8487812B1 (en) Method for self-aligning a beamforming sensor to simplify vehicle installation
EP2329291B1 (en) Sensors in concert for maritime surveillance
IL266933B2 (en) Method and system of gnss spoofing detection
US20230314621A1 (en) Global navigation satellite system spoofer identification technique based on carrier to noise ratio signatures
US7088641B2 (en) Bistatic azimuth detection system and detection method
US10976447B2 (en) Azimuth angle calculating device, and method of calculating azimuth angle
US11561307B2 (en) Global navigation satellite system (GNSS) anti-spoofing techniques
RU2497079C1 (en) Method for photonic location of aerial object
IL286034B2 (en) Vehicle navigation combining transmitted object location information and sensor-based relative object location information
OT et al. Design considerations for selecting GNSS antenna mounting location in launch vehicles
CN112882068A (en) GNSS anti-deception jamming method based on multiple receivers
JP2024004033A (en) Determination device, determination method, and determination program
GB2618395A (en) Autonomous vehicles supporting global navigation satellite system (GNSS) anti-spoofing