This invention relates generally to Global Navigation Satellite System (GNSS) security and more specifically the detection, characterization and alerting of unintentional or intentional attacks on GNSS receivers using radio frequency interference (i.e., RFI, jamming) and spoofing.
GNSS signals are vulnerable to RFI and spoofing. There are several documented GNSS RFI and spoofing detection methods [1]. RFI detection has become trivial with many detection algorithms available and built into GNSS receivers. This is not the case with spoofing. GNSS spoofing involves altering one of more components of the GNSS satellite transmissions: RF carrier, pseudorandom noise direct sequence spread spectrum code, and/or broadcast navigation message. Like jamming, generating spoofed GNSS signals is becoming easier and can have disastrous effects on people and systems, such as critical infrastructure, which rely on GNSS for positioning, navigation and timing (PNT).
U.S. Pat. No. 10,024,975 to Dougan discloses analyzing a GNSS receiver. The method includes receiving electronic diagnostic information from the GNSS receiver, the diagnostic information including observations at different times of signal strength of one or more satellites at each point in a visible sky. The method includes building a flat map of the visible sky including a track of the one or more satellites. The method includes calculating, for each point in the visible sky of the flat map, an aggregated signal strength of the one or more satellites over a predetermined interval. The method includes generating a heat map over the flat map of the visible sky and displaying a visualization of a flat heat map.
The description of the illustrative embodiments can be read in conjunction with the accompanying figures. It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements. Embodiments incorporating teachings of the present disclosure are shown and described with respect to the figures presented herein, in which:
According to aspects of the present innovation, a method is disclosed for authenticating radio frequency (RF) broadcasts, such as a global navigation satellite system (GNSS) signal. In one or more embodiments, the method includes receiving, by a receiver at a location, a first broadcast from a particular GNSS satellite during a particular earth orbit. The method includes determining identifying information for the particular GNSS satellite according to GNSS satellite communication protocols. The method includes measuring the combined direct and reflected signal strengths of the first broadcast of the particular GNSS satellite, during a portion of the particular earth orbit to characterize and record combined signal variations that are characteristic for the signal angle-of-arrival and distance between transmitter and receiver. The method includes creating a GNSS interferometric reflectometry (IR) signature associated with the particular GNSS satellite based on the measured signal power and geometric relationship. The method includes during subsequent equivalent geometric relationships, such as a subsequent earth orbit, determining whether a second broadcast self-identified as being from the particular GNSS satellite matches the GNSS IR signature associated with the particular GNSS satellite. In response to determining that the second broadcast matches the GNSS IR signature, the method includes updating the GNSS IR signature at least in part using the second broadcast. In response to determining that the second broadcast does not match the GNSS IR signature, the method includes generating an alert indicating spoofing of the particular GNSS satellite.
The present innovation is different from conventional approaches such as U.S. Pat. No. 10,024,975 to Dougan (“Dougan”). Dougan does not teach generating signatures for each GPS satellite but rather calculates “an aggregated signal strength of 1 or more satellites” based on a point in the “visible sky.” By contrast, the present disclosure involves generating individual signatures for each GPS satellite, which enhances the sensitivity to jamming and spoofing. Dougan is intended for satellites in the “visible sky” only. The present disclosure specifically teaches the inclusion of reflected signals which may come from other surfaces and not include direct-line-of-sight signals from the “visible sky.” Dougan's method is an average of the direct signal strengths of multiple satellites. The present disclosure provides an approach that subtracts the reflected signal strength from the direct signal to increase the sensitivity. Dougan's method does not teach installation requirements to make it work in several conditions. The present disclosure teaches installation requirements that make it perform correctly and includes a dual antenna methodology with different mast heights above the reflectors, which is a novel implementation. Dougan's method relies upon a cloud-based implementation. The present disclosure is implemented via edge computing—a specialized, new GPS receiver that calculates signatures and generates alerts.
In general, a “heat map” as taught by Dougan is very different from signatures as taught by the present disclosure. Dougan's heatmap will not address spatial, temporal, and RF hardware differences between individual satellites; there will be false alarms when Satellite A doesn't match Satellite B or the aggregate signal strength. By contrast, signatures provide a method to more accurately characterize an individual RF link between a specific transmitter and receiver—IR signatures further extends this to accurately characterize the direct and reflected RF links between a specific transmitter (satellite) and receiver. Adding a second antenna extends this further enhancing performance. Teaching the need for a stable, controlled reflection zone is also important; Dougan's heat map does not teach that his devices signatures will not function in dynamic environments or when the receiver is moving it will fail whenever the Fresnel reflection zone changes; Dougan only focuses on direct signal in the “visible sky.” In the field, it is known that Dougan's method will not perform reliably due to satellite signal variations, ionospheric contributions, and other environmental and equipment artifacts that are not adequately addressed by his approach. The individual satellite signatures must be individually modeled and not aggregated, and the antenna installation approach must be well-defined.
In particular, Dougan makes “flat heat maps” and uses it to attempt detection of spoofing; his method does not work in practice due to the combined effects of direct and reflected signals and GNSS transmitter variations. SNR measurements of GNSS satellites cannot be combined to determine the expected SNR for a given azimuth/elevation of a receiver—the range of values and variance will be too high as to provide practical bounds for subsequent validation of observations. The present innovation addresses distance or range between receiver and transmitter, providing three-dimensional information which is not taught by the prior art such as Dougan. In one or more embodiments, the present innovation contemplates making inertial corrections for receiver attitude changes, enabling the receiver to be mobile. As a particular point of departure from conventional approaches, Dougan requires an elevation mask angle of 30 degrees because the conventional method does not validate any GNSS below 30 degrees. By contrast, the present innovation does not require an elevation mask but rather provides input validation of all received signals, regardless of being direct or reflected.
According to aspects of the present innovation, a GNSS IR signature-based defense system includes a first GNSS antenna mounted on a first antenna mast at a location. The GNSS IR signature-based defense system includes a first GNSS receiver that is communicatively coupled to the at least one GNSS antenna. The GNSS IR signature-based defense system includes a memory containing: (i) a positioning, navigation, and timing (PNT) module; and (ii) a GNSS-IR signature-based defense module. The GNSS IR signature-based defense system includes a controller that is communicatively coupled to the first receiver and the memory. The controller executes the PNT module and the GNSS-IR signature-based defense module to enable the GNSS-IR signature based defense system to have the following functionality:
(i) receive, by the GNSS receiver, a first broadcast from a particular GNSS satellite during a particular earth orbit;
(ii) determine identifying information for the particular GNSS satellite according to GNSS satellite communication protocols;
(iii) measure line of sight and reflected signal strengths of the first broadcast of the particular GNSS satellite during a portion of the particular earth orbit to detect multipath variations that are characteristic for the geographic location;
(iv) create a GNSS IR signature associated with the particular GNSS satellite based on the measured broadcast;
(v) store the GNSS-IR signature in the memory;
(vi) during a subsequent earth orbit, determine whether a second broadcast self-identified as being from the particular GNSS satellite matches the GNSS IR signature associated with the particular GNSS satellite;
(vii) in response to determining that the second broadcast matches the GNSS IR signature, update the GNSS IR signature in the memory at least in part using the second broadcast; and
(viii) in response to determining that the second broadcast does not match the GNSS IR signature, generate an alert indicating spoofing of the particular GNSS satellite.
The goal is to make an attack impossible or impractical, while characterizing and/or localizing the source of an attack. GNSS spoofing detection using GNSS-IR signatures improves upon existing GNSS receiver/antenna hardware, software and infrastructure (to include processing of real-time data streams) without requiring additional or new hardware. There is significant literature on the analysis and derivation of global navigation satellite system (GNSS) interferometric reflectometry (GNSS-IR) in remote sensing applications and multipath environment mapping [2]-[5]. GNSS-IR leverages time variant signal-to-noise ratio (SNR) measurements from GNSS receivers to derive estimates of ocean wave height, soil moisture content, snow depth, etc. These calculations involve the analysis of multipath propagation and direct line-of-sight (LOS) radio frequency (RF) transmissions from GNSS satellites.
As an example, a single L1 C/A code only multipathed signal (MP) and direct LOS signal (LOS) from the kth Global Positioning Satellite (GPS) can be represented by the following equation:
S
L1
(k)(t)=√{square root over (2PLOS)}·x(k)(t)·D(k)(t)·cos(2πfL1t+θLOS)+√{square root over (2PMP)}·y(k)(t)·D(k)(t)·cos(2πfL1t+θMP)
Assuming a local level, planar reflective surface, the GNSS receiver signal-to-noise ratio (SNR) measurements of a multipathed GNSS satellite signal can be represented by the following equation [4]:
The reflected signals that are received by the GNSS antenna experience phase delay and attenuation. The multipathed signals and LOS signals from each tracked GNSS satellite impact the resultant SNR measurements post-autocorrelation function resulting in semi-sinusoidal oscillations with varying frequency and dampening rate of the SNR measurements. The resultant SNR measurements from the reflected signals are unique to both the relative position of each transmitting satellite and each receiving fixed GNSS reference station over time. In addition, the SNR is uniquely impacted in frequency, phase and signal power level by the local environment (see
5B are a graphical plots of two-hour, truncated GNSS-IR Signatures at a fixed reference station (SC01) in 2018 on J-Day 170 and J-Day 171 respectively showing strong cross-correlation between 3 GPS satellite SNR measurements across two days.
TEST RESULTS: On 20180625, demonstrated that GNSS-IR signatures are uniquely impacted by features within Fresnel zones, antenna height and receiver noise. Each signature is unique to each GNSS satellite-fixed reference station receiver/antenna pair further demonstrating the increased complexity of the attack surface and provides a novel method by which an authenticate GNSS signal can be distinguished from a false GNSS signal.
Detailed Description of an Illustrative Embodiment: First, collect measurements from GNSS receiver. For example, The Global Positioning System (GPS) satellites each have an orbital period of approximately 11 hours 58 minutes, which causes each GPS satellite to repeat its ground trace approximately every 23 hours 56 minutes [8]. Therefore, since the azimuth and elevation of each GPS satellite local to the fixed receiver repeats, the multipathed signals will exhibited similar variations. The magnitude of these oscillation is greater at elevations of approximately <30 degrees. Therefore, GNSS-IR signatures used for initial calibration for GPS satellites should contain the following data during the rising and setting elevation (approximately <30°-400: SNR measurements and trusted broadcast satellite ephemeris or almanac from a trusted, authenticated source [these can be from the broadcast navigation message or another secure source such as Assisted GPS (A-GPS), Differential GPS (DGPS) or Real-time Kinematic (RTK) base stations]. GNSS-IR signature measurement can be collected for all GNSS signals and available codes (i.e., GPS L1 1575.42 MHz, L2C 1227.6 MHz, etc.).
In one or more embodiments, collect/apply in situ environmental monitoring data such as meteorological data to received measurements to improve signal and noise modeling. Collect/apply physical environment sensor data such as motion detectors, cameras to assess physical environment dynamics in the First Fresnel Zone (FFZ).
Second, calculate GNSS-IR signature (repeat for each tracked GNSS satellite) by: (i) deriving local Azimuth and Elevation from almanac or ephemerides; and (ii) reducing or normalizing SNR measurements. An example of reduction is as follows:
i. Convert to standard units and linear scale
1. Example: dB-Hz converted to volts/volts (See
ii. Remove dominant direct signal contributions
1. Example: Subtract a low-order polynomial fit curve of the binned azimuths of SNR measurements as a function of elevation angle from the measurements. (See
Third, store as GNSS-IR signature for satellite as azimuth, elevation, calibration fit curve and SNR measurements.
Fourth, collect/monitor new measurements for spoofing detection (See
a. Convert to standard units and linear scale
b. Remove direct line of sight GNSS measurements
i. Subtract low-order polynomial fit curve derived from 2b (truth source estimate)
c. Calculate correlation between truth GNSS-IR signature and new GNSS-IR signature (derived from new measurements)
d. Optional: implement multi-state Extended Kalman Filter and monitor residuals or use extended signal and noise models for receiver, antenna, ray tracing, physical optics.
Fifth, determine if new GNSS-IR signature is outside acceptable covariance bounds:
a. Yes: Alert
i. When alert cleared, retain starting GNSS-IR signature and open covariance bounds until new signature obtained, return to step 4
b. No: Store new GNSS-IR signature, return to step 4
The proposed method involves the following considerations:
a. The area within the first Fresnel (reflection) Zone with respect to physical structures, reflective and dispersive surfaces should be relatively stable or properly modeled. The area of the first Fresnel Zone changes with the satellite elevation and antenna height. For a 2-meter height antenna and only using satellite elevation angles less than 30 degrees the first Fresnel Zone is less than 50 meters.
b. In order to account or more accurately model significant changes in water levels (vapor, snow or ice, rain, etc.) in the local environment, it is highly desired to use in situ metrological data (meteorological or met data such as provided by RINEX and other GNSS data types).
a. In order to provide the maximum multipath-based mapping for GNSS-IR signatures, the GNSS receiver should be configured to track at a minimum all healthy GPS satellites with no elevation mask angle
b. The GNSS reference station should have a stable hardware configuration, to include antenna, cabling, receiver and, if used, metrological sensors.
a. For GPS-IR signature-based spoofing defense, must use GPS measurement to detect GPS spoofing, GLONASS/GLONASS, Galileo/Galileo, etc.
b. Must not include unhealthy satellites; satellites that have been turned off to users based on the broadcast navigation message health bits
a. Each Fixed Reference station requires as initial calibration/normalization to establish initial mapping of GNSS-IR signatures
b. A re-calibration may be necessary for any configuration or other changes such as the following: (i) Environment: heavy construction, unusually significant activity; (ii) Fixed GNSS Reference Station maintenance; (iii) GNSS Satellites (orbital maneuver, maintenance, new satellite); (iv) Alarm condition from detected attack event (RFI, spoofing, etc.).
c. Each 24-hour period, a new calibration signature should be derived and should significantly reduce or eliminate slow-dynamic environmental changes such as vegetation.
Overview of Claims:
1. A method to detect GNSS Spoofing:
a. Using measurements of multipath propagation reflections from GNSS satellites to generate unique GNSS-IR signatures.
2. An algorithm to generate a GNSS-IR Signature:
a. Collect GNSS SNR and phase measurements;
b. Convert to standard scale and units;
c. Remove direct line of sight GNSS measurements;
d. Collect multipathed GNSS signal measurements from previous; and
e. Store resultant GNSS-IR signature.
3. An algorithm to detect GNSS Spoofing from GNSS-IR Signature variance:
a. Collect GNSS SNR and phase measurements;
b. Covert to standard scale and units;
c. Remove dominant direct line of sight GNSS measurements using truth-source estimates and/or measurements;
d. Collect multipathed GNSS signal measurements from previous;
e. Correlate truth GNSS-IR signature from new GNSS-IR signature;
f. Determine if outside established covariance limits; and
g. Alert as required.
4. A method of operating a GNSS receiver:
a. Fixed receiver with physical environment within Fresnel Zone 1 with short-term stability;
b. Dual-antenna configuration with adequate separation and/or orientation to yield unique GNSS-IR signatures for each satellite-to-receiver pair; and
c. Dual receiver configuration with adequate separation and/or orientation to yield unique GNSS-IR signatures for each satellite-to-receiver pair.
5. A method in claim 3 further comprising:
a. Calibration/Recalibration methods
Works Cited above and hereby incorporated by reference in their entirety:
[1] M. L. Psiaki and T. E. Humphreys, “GNSS Spoofing and Detection,” Proc. IEEE, vol. 104, no. 6, pp. 1258-1270, June 2016.
[2] A. Bilich and K. M. Larson, “Mapping the GPS multipath environment using the signal-to-noise ratio (SNR),” Radio Sci., vol. 42, no. 6, pp. 1-16, 2007.
[3] P. Axelrad, K. M. Larson, and B. Jones, “Use of the correct satellite repeat period to characterize and reduce site-specific multipath errors,” ION GNSS 18th Int. Tech. Meet. Satell. Div., no. September, pp. 2638-2648, 2005.
[4] C. Roesler and K. M. Larson, “Software tools for GNSS interferometric reflectometry (GNSS-IR),” GPS Solut., vol. 0, no. 0, p. 0, 2018.
[5] K. M. Larson and E. E. Small, “Estimation of Snow Depth Using L1 GPS Signal-to-Noise Ratio Data,” IEEE J. Sel. Top. Appl. Earth Obs. Remote Sens., vol. 9, no. 10, pp. 4802-4808, 2016.
[8] P. Axelrad and K. Larson, “GNSS Solutions: Orbital precession, optimal dual-frequency techniques, and Galileo receivers,” Insid. GNSS, no. July/August 2006, pp. 16-17, 2006.
Use of innovation: a single test case using a representative, fixed attacker (WAAS satellite) broadcasting on GPS 11 1575.42 MHz was conducted on 13 Jan. 2019.
Summary: GNSS spoofing detection using GNSS-IR signatures can utilize all fixed GNSS receivers that are capable of providing SNR measurements. This method can also use each satellites' time-dependent azimuth and elevation to the receiver to generate GNSS-IR signatures (i.e., calculated from precise ephemerides, A-GPS, broadcast almanac/navigation message, etc.) A GNSS-IR signature consists of the complete or equivalent removal of the dominant direct LOS GNSS signal SNR (or phase measurements) from the GNSS receiver SNR (or phase) measurements. Each signature is specific in time to the measurement made between a distinct, single GNSS receiver/antenna and GNSS satellite pair.
To improve detection capability, GNSS receivers with dual-antenna capability, or an additional GNSS receiver and antenna can be used. Each antenna should be installed in a stable, but unique environment, especially within the first Fresnel (reflection) Zone. Since a Fresnel Zone is described by a three-dimensional, cylindrical ellipse between a transmitter (GNSS satellite) and the receiver, it will change where it intersects the local environment (i.e., ground, objects, etc.) over time as the satellite changes local elevation and azimuth as it orbits Earth [4]. A good example would be to install one antenna on one edge of a building and a second antenna installed on the same building, but on the opposite edge (See
The SNR measurements used for GNSS-IR signatures can also be used for RFI detection. Additional measurements from a GNSS receiver's automatic gain control (AGC) component, also readily available from existing GNSS receivers, can be leveraged to distinguish between RFI sources and GNSS satellite signal losses or attenuation caused by physical occlusions such as a bird landing on the antenna [6], [7].
Additional information is provided in an article by the inventor that is incorporated by reference in its entirety and previously published not earlier than 21 Aug. 2018 as: “Secure GPS Data for Critical Infrastructure and Key Resources: Cross-Layered Integrity Processing and Alerting Service”, Navigation, Ion Institute of Navigation, Volume 65, Issue 3, Autumn (Fall) 2018, pp. 389-403.
Additional information is provided in a 2019 dissertation by the inventor and entitled “Defending Against Radio Frequency Spoofing Attacks on Fixed Global Navigation Satellite System Receivers Using Interferometric Reflectometry Signatures”, that is incorporated by reference in its entirety.
Additional information is provided in Appendix 3 to the above referenced most recent priority document, which is a 2019 article submitted for publication by the inventor and entitled “GNSS Interferometric Reflectometry Signature-based Defense”, that is incorporated by reference in its entirety. In particular, the following aspects of the present disclosure are described:
GNSS signals are vulnerable to RFI and spoofing. There are several documented GNSS RFI and spoofing detection methods. RFI detection has become trivial with many detection algorithms available and built into GNSS receivers. This is not the case with spoofing. GNSS spoofing can involve generating false GNSS signal with one of more altered components of GNSS satellite transmissions: RF carrier, pseudorandom noise codes, and/or the broadcast navigation messages. Like jamming, generating spoofed GNSS signals is becoming easier and can have disastrous effects on people and systems, such as critical infrastructure and key resources (CIKR), which rely on GNSS for positioning, navigation and timing (PNT).
GNSS interferometric reflectometry (GNSS-IR) signature-based defense is a new methodology to defend wireless space-based PNT transmissions against spoofing by leveraging existing, fixed GNSS receivers used in GNSS-dependent critical infrastructure and key resource sectors. GNSS-IR signature-enabled defense provides spoofing and RFI detection without any changes to existing architecture by conducting input validation of standard GNSS receiver observables against a generated GNSS-IR truth calibration signature. This paper includes an overview of the theory, methodology and results of live-sky signature variability experiments.
In one or more embodiments, method 1600 further includes determining whether the residuals of the input validation detector are above a threshold due to substantially different GNSS signal strength measurements.
In one or more embodiments, method 1600 further includes that calibration signatures are generated for a single-antenna configuration using 5-day moving-windowed signatures comprised of GNSS signal strength measurements from rise to set above the local horizon of the antenna in which there is a unique, repeating ground trace. Using a 5-day moving-widow of signatures provides calibration signature smoothing for changes on the contributing reflective surfaces from rain or snow to avoid false alarms. Using a roof installation with water mitigation, such as gutters or drains, avoids pooling water on contributing reflective surfaces.
In one or more embodiments, method 1600 further includes generating calibration signatures for a dual-antenna configuration using smoothed GNSS signal strength measurements from the first full pass, rise to set above the local horizon of the antennas.
In one or more embodiments, method 1600 further includes using dual-antennas of differing heights above the local reflective surfaces within the contributing Fresnel zones that are used to detect a GNSS spoofer without concern for contributing reflective surface dielectric property changes such as rain or snow.
In one or more embodiments, the present disclosure provides a method for generating calibration signatures. First, Transmitter (Tn) is determined to be located in a coordinate reference frame at [Xn, Yn, Zn]: (a) This position is determined by a pre-defined, stored or calculated position; and (b) n is the identity of a specific transmitter. Second, Receiver Antenna (Am) is determined to be located in a coordinate reference frame at [Xm, Ym, Zm]: (a) This position is determined by a pre-defined, stored or calculated position; and (b) m is the identity of a specific receiver. Third, Tn transmits a radio frequency (RF) signal to Am. Fourth, Am acquires and tracks the RF signal from Tn and calculates and stores the following signature for each time epoch: (a) the received signal power (Pn) for Tn; (b) the angle of arrival, altitude (Φn) and azimuth (θn), to the local level plane of Am; and (c) the distance between Tn and Am, (Dn). Fifth, Step 4 is repeated for all acquired and tracked transmitters (T1 . . . n). Sixth, Steps 1-5 are repeated for each receiver antennas (A1 . . . m). Seventh, repeat all steps for a reconfigurable time period such that sufficient signatures have been recorded for all transmitters and receivers: (a) Collection of calibration signature can be expediting by manual or automated articulation of the receiver antennas. Input Validation: For a specific transmitter and specific receiver pair the combined, direct and reflected, RF signal strength for a specific transmitter calibration signature is compared to new RF signal strength observations for each given reconfigurable range of altitude (Φn), azimuth (θn), and distance (Dn).
In the preceding detailed description of exemplary embodiments of the disclosure, specific exemplary embodiments in which the disclosure may be practiced are described in sufficient detail to enable those skilled in the art to practice the disclosed embodiments. For example, specific details such as specific method orders, structures, elements, and connections have been presented herein. However, it is to be understood that the specific details presented need not be utilized to practice embodiments of the present disclosure. It is also to be understood that other embodiments may be utilized, and that logical, architectural, programmatic, mechanical, electrical and other changes may be made without departing from general scope of the disclosure. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present disclosure is defined by the appended claims and equivalents thereof.
References within the specification to “one embodiment,” “an embodiment,” “embodiments”, or “one or more embodiments” are intended to indicate that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. The appearance of such phrases in various places within the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Further, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not other embodiments.
It is understood that the use of specific component, device and/or parameter names and/or corresponding acronyms thereof, such as those of the executing utility, logic, and/or firmware described herein, are for example only and not meant to imply any limitations on the described embodiments. The embodiments may thus be described with different nomenclature and/or terminology utilized to describe the components, devices, parameters, methods and/or functions herein, without limitation. References to any specific protocol or proprietary name in describing one or more elements, features or concepts of the embodiments are provided solely as examples of one implementation, and such references do not limit the extension of the claimed embodiments to embodiments in which different element, feature, protocol, or concept names are utilized. Thus, each term utilized herein is to be given its broadest interpretation given the context in which that terms is utilized.
While the disclosure has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the disclosure. In addition, many modifications may be made to adapt a particular system, device or component thereof to the teachings of the disclosure without departing from the essential scope thereof. Therefore, it is intended that the disclosure not be limited to the particular embodiments disclosed for carrying out this disclosure, but that the disclosure will include all embodiments falling within the scope of the appended claims. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The description of the present disclosure has been presented for purposes of illustration and description but is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the disclosure. The described embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.
This application is a continuation in part under 35 U.S.C. § 1 to U.S. patent application Ser. No. 16/775,818 entitled “global navigation satellite system interferometric reflectometry signature-based defense” and filed on 29 Jan. 2020, which in turn claims the benefit of priority under 35 U.S.C. § 119(e) to U.S. Provisional Applications: (i) Ser. No. 62/802,366 filed 7 Feb. 2019; and (ii) Ser. No. 62/945,279 filed 9 Dec. 2019, both entitled “Global Navigation Satellite System Interferometric Reflectometry Signature-based Defense,” the contents of both of which are incorporated herein by reference in their entirety.
The invention described herein was made by employees of the United States Government and may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefore.
Number | Date | Country | |
---|---|---|---|
62802366 | Feb 2019 | US | |
62945279 | Dec 2019 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16775818 | Jan 2020 | US |
Child | 17679657 | US |