Chip-scale atomic clock aided INS/GNSS integrated navigation system spoofing detection method

被引:0
|
作者
Liu Y. [1 ]
Li S. [1 ]
Fu Q. [1 ]
Zhou Q. [2 ]
机构
[1] School of Automation, Northwestern Polytechnical University, Xi'an
[2] Flight Automatic Control Research Institute, Xi'an
来源
Zhongguo Guanxing Jishu Xuebao/Journal of Chinese Inertial Technology | 2019年 / 27卷 / 05期
关键词
Chip-scale atomic clock; Integrated navigation; Satellite navigation; Spoofing detection;
D O I
10.13695/j.cnki.12-1222/o3.2019.05.014
中图分类号
学科分类号
摘要
The advent of commercial chip-level atomic clocks (CSAC) makes it possible to apply them in inertial/satellite integrated navigation systems. Aiming at the detection of satellite navigation spoofing signals, a time-dimension method for detectingspoofing attacks is proposed based onCSAC's high-precision time retention ability. The basic characteristics and time retention ability of CSAC are introduced. By analyzing the influence of GNSS spoofing on receiver time and the error distribution of clock bias prediction under authentic and spoofed signals, a CSAC-assisted spoofing detection model is constructed to detect typical jam-and-spoof interference. The measured data shows that the clock bias prediction accuracy of CSAC is more thanone order of magnitude higher than that of the internal clock of the ordinary receiver. The detection probability analysis proves the excellent performance of CSAC in GNSS spoofing detection. © 2019, Editorial Department of Journal of Chinese Inertial Technology. All right reserved.
引用
收藏
页码:654 / 660
页数:6
相关论文
共 17 条
  • [1] Xu R., Ding M., Meng Q., Et al., Spoofing interference identification technique of MEDLL aided GNSS/INS system, Journal of Chinese Inertial Technology, 26, 2, pp. 223-230, (2018)
  • [2] Volpe J.A., Vulnerability assessment of the transportation infrastructure relying on the Global Positioning System, (2001)
  • [3] Liu Y., Li S., Fu Q., Et al., Impact assessment of GNSS spoofing attacks on INS/GNSS integrated navigation system, Sensors, 18, 5, (2018)
  • [4] Jafarnia-Jahromi A., Broumandan A., Nielsen J., Et al., GPS vulnerability to spoofing threats and a review of anti-spoofing techniques, International Journal of Naviga-tion and Observation, pp. 1-16, (2012)
  • [5] Psiaki M.L., Humphreys T.E., GNSS spoofing and detection, Proceedings of the IEEE, 104, 6, pp. 1258-1270, (2016)
  • [6] Yang Y., Li X., Micro-PNT and comprehensive PNT, Acta Geodaetica et Cartographica Sinica, 46, 10, pp. 1249-1254, (2017)
  • [7] You Z., Ma L., Construction of a micro positioning navi-gation and timing system: A change of the pattern of PNT service, Science & Technology Review, 12, pp. 116-119, (2015)
  • [8] Ma L., You Z., Li B., Et al., Deep coupled integration of CSAC and GNSS for robust PNT, Sensors, 15, 9, pp. 23050-23070, (2015)
  • [9] Gao G., Gu C., Zhang H., Deception jamming detecting technology based on high precision time and INS information, IEEE Chinese Guidance, Navigation and Control Conference, pp. 2877-2880, (2016)
  • [10] Zhu X., Wu Y., Gong H., Et al., GNSS timing receiver toughen technique in complicated jamming environments, Journal of National University of Defense Technology, 37, 3, (2015)