The present disclosure relates to the field of Global Navigation Satellite Systems (GNSS) such as Global Positioning System (GPS), and techniques to ensure accuracy of signals using that system, to address efforts to disrupt those signals using misleading (“spoofed”) or altered (“jammed”) signals.
GNSS is a general nomenclature for several different systems used in geolocation, which were initially developed for military use, but have now found their way in many civilian applications. GNSS relies on signals transmitted from orbiting satellites which a receiver receives, and uses to trilaterate (or otherwise mathematically determine) the specific location of a user of the GNSS, based on information extracted from the satellite signals.
The ubiquity of the use of GNSS systems in mobile phones, watches, car, aircraft, and maritime navigation systems and many other devices where relatively precise location information is needed has led to the efforts to create false signals which attempt to inaccurately replicate (or “spoof”) true signals from a GNSS to give a receiving device incorrect location information, or alternatively to jam or otherwise impede—whether intentionally or not—true GNSS signals in order to prevent a receiving device from accurately determining its location.
Spoofing has been used as a technique to facilitate piracy or other illegal activities around commercial maritime vessels, by driving those vessels off course using spoofed GNSS signals. The result is that the vessel's GNSS system makes use of incorrect location information, causing it to steer into an area away from its desired navigational course, allowing it to founder or to be steered to a location where piracy activities are easier to commit without interdiction. This problem has become particularly prevalent in the East China, Black and Baltic seas, as well as the Strait of Hormuz.
A jammer is a simple device that injects (“blasts”) noise onto a particular radio frequency, which frequency is used by, or adjacent to, those frequencies used by a GNSS system. As a result, the user attempting to monitor its own location using GNSS signals is prevented from extracting the individual satellite signals and their resulting data used for location calculations. The user thus may have to rely upon other, less accurate, navigational techniques and as a result may steer into areas that are dangerous or which may subject them to illegal actions.
A relatively inexpensive set of equipment, a “spoofer,” can be programmed to send out radio signals that are nearly identical to the GNSS signals upon which the on-board navigation system relies; the spoofed signals deviate from the actual GNSS signals just enough to misdirect the vessel to an undesired course, without the navigation system understanding that false signals are resulting in false navigational calculations. Because GNSS signals from GNSS satellites are of relatively low power, a spoofer (or a jammer) does not need to be of relatively high-power output to disrupt a GNSS-based navigational system.
Spoofing can be more insidious than jamming in GNSS navigational systems because in the case of jamming, the user knows the signal is bad or cannot be received, and therefore the navigational system will simply be incapable of making location calculations—thereby allowing the user to turn to less accurate backup systems for navigation. In the case of spoofing, the user can be misled and misdirected along an incorrect course because the location and navigation system operates as if the spoofed signal is a correct signal and may not have the capacity to alert a pilot or navigator that the vessel is being misdirected.
GNSS systems make it possible for users of that system to extract and calculate Position, Navigation and Timing (PNT) information. This information can be used both for surveying, as well as for navigating maritime vessels and aircraft, as well as cars, trucks and buses. GNSS systems also have become useful in synchronizing networks, including financial services, stock exchanges, and wireless (cellular) telecommunication systems. All these users can be adversely affected by spoofing or jamming of the GNSS signals.
The problem is most prevalent with certain implementations of a GNSS system—such as the GPS system used in the United States—in that L1C/A (Legacy Band L1, Coarse Acquisition) is the most widely used signal. However, as there are multiple GNSS systems in place worldwide, different constellations use different signals, and satellite constellation may use multiple signals in multiple bands.
The L1 legacy signal band is centred on the 1575.42 MHz radio frequency. The public (or open) GPS signal in the L1 band uses the C/A code, which has been substantially unchanged since 1980. The coarse acquisition (C/A) code is the signal made available to the public, in contrast to the precision (P) code which is only available to military users. Both L1C/A and the military precision P code use BPSK modulation. The newest GPS III satellites add a more modern signal called L1c, also centred on 1575.42 MHz. as is L1C/A. The “c” in L1c designates that it is a “civilian” signal. It uses time-multiplexed binary offset carrier (TMBOC) modulation. TM BOC has advantages over BPSK such as better multipath and other interference mitigation.
As these signals are Code-Division, Multiple Access (CDMA), and power is carefully managed with CDMA technology, they can co-exist in the same band; a receiver of a satellite signal uses the Pseudo Random Noise (PRN) code to decode the signal from a particular satellite. Having all satellites broadcasting on a single frequency has advantages for receiver design, but also makes it easier to implement a jammer as just that one frequency needs to be blocked.
The issue of spoofing or jamming is not limited to the NAVSTAR GPS system which is used in North America; it can happen with other GNSS constellations and signals, such as China's BeiDou, Russia's GLONASS, and Europe's Galileo. Other regional systems like Japan's QZSS and India's NavIC (aka IRNSS) are theoretically vulnerable as well. Although encrypted and/or authenticated signals such as the GPS military signal M1 in North America and the Galileo OSNMA signal in Europe are much less vulnerable to spoofing, but these signals are not generally available to civilian users, who are the vast bulk of current users of GNSS navigation and location services.
Interference with GNSS signals can occur because GNSS signals, which are inherently low-powered, become overpowered by other signals on the same or adjacent frequencies. This can happen when a GNSS receiver is near other electronic devices designed to overwhelm GNSS signals (such as drones or stationary transmitters), or other devices that unintentionally interfere with GNSS signals, such as radio transmitting antennas or modems. Such interference can reduce positioning accuracy by “disabling” signals from satellites needed for trilateration, or causing the receiver to lose positional information altogether.
Spoofing is the intentional sending of incorrect or misleading GNSS signals to a receiver, so that the receiver reports incorrect location information. Such spoofing devices can be used to hijack autonomous vehicles by misdirecting their route programming, or to misdirect aircraft or maritime vessels to send them on alternate routes. As an example, in 2017, several ships in the Black Sea had their GPS receiver reporting a position at a faraway airport as the result of a spoofing attack.
There have been various efforts made in the past to provide alternate and complementary methods of detection and mitigation of GNSS spoofing and jamming, such as:
However, building signal integrity within the satellite signal can require many years to design, build and launch new satellites with improved signal integrity, and may require that the receivers all include specialized improvements and signal processing features in order to process the enhanced satellite signals. By way of example, the newest iteration of GPS, “GPS III,” only has three currently launched satellites with enhanced signal capacity, but a minimum of 24 satellites are needed to be launched into space in order for that system to provide effective coverage and for all users to be able to access enhanced GPS III signals with anti-spoofing and anti-jamming signal integrity.
At present, instances of GNSS spoofing and jamming are published in, among other locations, the Notice to Airmen (NOTAM) and US Coast Guard Navigation Center (NAVCEN) Notice
Advisory to Naystar Users (NANUs) and GPS reports. Due to the dynamic nature of entities or persons attempting to spoof or jam signals, and the ability of those entities or persons to vary the location, signal features, or areas covered by their efforts to disrupt true location signals, these alerts are often out-of-date and don't provide an effective way to mitigate the effects of spoofing or jamming.
The present invention includes both a system, a method, and a receiver for determining if GNSS location information received by a navigating vessel are compromised. The system ensures accurate location information in a device designed to receive satellite location signals, which system includes a plurality of earth-based receivers having previously-determined known locations, wherein the plurality of earth-based receivers are designed to receive location calculation signals from a constellation of satellites. A processing hub in signal connection with the plurality of earth-based receivers receives relayed location calculation signals from the plurality of earth-based receivers and the relayed location calculation signals are compared against known good signal data to identify signals that may not be correct.
The method of the present invention ensures accurate location information in a device designed to receive satellite location signals, by providing a plurality of earth-based receivers, receiving location calculation signals at the plurality of earth-based receivers from a constellation of satellites, providing a processing hub in signal connection with the plurality of earth-based receivers, relaying location calculation signals from the plurality of earth-based receivers to the processing hub, and comparing the location calculation signals against known good signal data to identify signals that may not be accurate.
The receiving unit of the present invention is in a vessel, to ensuring accurate navigation when using satellite location signals, and comprises an antenna for receiving location calculation signals from a constellation of satellites, a receiving unit for calculating location based on the signals from the constellation of satellites, the receiving unit including an alert system to receive and transmit an alert signal to a vessel operator which the integrity of the signals received by the antenna are determined to be inaccurate.
The system and method of the present invention is designed to ensure enhanced levels of signal integrity for a GNSS or other geolocation service receiver, without increasing the complexity, costs, power demands or other requirements at either the signal transmitters or the signal receiver.
In the present invention, areas of interest—i.e., those areas where there is likely to be spoofing or jamming directed to that area, such as airports, harbours, shipping lanes, or other areas with significant volume of valuable transportation traffic—have installed around them a series of GNSS receivers, which receivers may have multiple receiving antennas which may be used to do directional analysis of incoming signals.
Incoming legitimate GNSS signals from satellites cover a very wide area of earth because they are line-of-sight to receivers and are sent out from a position many thousands of kilometres from those receivers. In contrast, incoming signals from a spoofer or jammer cover a significantly smaller area because they are terrestrially-based, and line-of-sight to terrestrially-based receiving antennas can cover only a much small area—in most cases, only hundreds of square meters up to, in best cases (with good terrestrial line-of-sight), only a few square kilometres.
Although the present invention is focused on an implementation that includes ground-based stations in order to implement an anti-spoofing and anti-jamming method and system, the invention could be supplemented using airborne (using aircraft or stationary balloons or dirigibles) stations.
The present invention makes use of the two main components to any GNSS signal—the ephemeris and the clock. The ephemeris of a GNSS signal describes the satellites' orbital location, whereas the clock of the GNSS signal provides a reference point for the time-difference calculation used in GNSS signal location calculations using the equation: D=t*c (distance=time*speed-of-light).
By knowing a particular satellite's position at time t (based on clock and ephemeris information from that satellite's GNSS signal), together with the distance information for four or more GNSS-signaling satellites, the location on earth of any particular receiver to be calculated using trilateration.
A spoofer may make subtle changes to the ephemeris and/or clock from an incoming satellite signal and then redirect that changed signal to cause a target to go off course, or it may broadcast recorded signals from another time and another place in order to deny service or to bypass time-limits on systems, or to (for instance) keep drones away from a location by simulating a no-fly zone.
In all GNSS systems except GLONASS (which uses frequency division multiple access (FDMA)) all systems broadcast their signal in Code Division Multiple Access (CDMA), usually around a 1575.32 MHz central frequency. Each satellite in the system has a unique Pseudo Random Noise Code (PRN), which PRN acts as a code allowing the user device to extract its signal. A spoofer can multiplex signals from multiple, faked, PRNs onto the radio signal it emits as a technique for simulating authenticity of the spoofed signal.
Essentially, this single-frequency multiple-access design simplifies the design of the radio components and shifts complexity to the computational efforts, with the downside that it also simplifies the design of a spoofer or jammer, as computing costs and power (and availability of skilled programmers) are favourable.
For an area of interest, such as an airport or harbour where there is a concern that a spoofer or jammer will be used to disrupt accurate navigation for vessels approaching that area, there are placed a series of high-accuracy GNSS receivers around it. The receivers collect the GNSS signals of interest in real time, and relay them to a central point, the processing hub. The processing hub also receives real-time satellite signals from many locations around the world The availability of multiple signals from widely dispersed locations provides a high-confidence that ‘truth’—the actual signals as broadcast from the satellites—has been captured by the processing hub.
The processing hub compares the signal(s) received from each receiver, and compares that signal with known location information for that receiver, as well as location information from other receivers, and identifies and corrects for signals received which are determined to be inaccurate, based on the known coordinates of the location of the receivers, or known time information received from satellites determined not to be spoofed or jammed.
If one or more incoming signals deviates from the expected location information by more than a configurable threshold (which threshold may be set to account for variations in signals based on weather deviations or other known signal varying events), then an alert is triggered. The alert contains information about the affected region, the time the event began, the duration of the event and whether the event is ongoing, as well an identification of the particular signals which are affected. The processing hub may be designed and programmed to identify a region which is subject to jamming or spoofing, by making calculations triangulated from information from the multiple receivers, and may identify latitude, longitude and radius information for the spoofed signal or jamming signal, thereby identifying and discarding other signals that may be transmitted through, and therefore effected by, the false or jammed signal. As a result, the invention of the present invention can also allow individuals to narrow down the location of the spoofed or jamming signal, and direct them to that location to take mitigation steps to remove that signal from the area of interest, or to steer the user away from that area to an area where spoofing or jamming is calculated to not be occurring. The alert and related data are all recorded for later analysis, to thereby help in doing forensic analysis of the manner and techniques used in spoofing or jamming, thereby improving the ability to identify and mitigate future efforts to spoof or jam.
A false alert from the processing hub can be as disruptive to effective location services and navigation as a true spoofing event. To avoid false alerts, the present invention may include thresholds set in the processing hub, so as to account for minor variations in true location signals and therefore not trigger an alert in that circumstance. An alert has additional seriousness if it is ongoing, and/or if multiple GNSS stations detect the spoofing event, as the distance between stations implies that the spoofer has a high power level and is impacting many end users.
Thresholds are considered as follows. The natural variation in ionospheric and tropospheric delays as well as perturbations in the satellite orbits (and the description thereof in the broadcast ephemeris) will cause variations in the reported position of the receiver, as will wind load on the antenna mast. As a result, a threshold needs to be set for the detected variation of the receiver position, so that a ‘natural’ variation in receiver position doesn't cause an alarm. This threshold will be configurable, but a default value of 20 cm would be a typical setting for positional variance for any particular receiver. Setting the threshold to be too high, for example 10 m, may result in real spoofing or jamming event alarms being missed or delayed. For any particular set of receivers, or individual receivers within a set, different threshold values may be used to account for local conditions that might cause variance in positional signals, but which are not set too high so as to not properly detect real spoofing or jamming.
In the present invention, alerts and relevant data about the alert may be saved in a database. Statistical data can be generated related to the frequency, intensity, and sophistication of spoofing events and this data can be made available to interested parties, e.g. aviation and radio communication authorities, as a mechanism to identify trends and areas most susceptible to these activities, as a way of developing newer interdiction and mitigation steps. The present invention also allows for the location of a spoofer or jammer to deduced by trilateration if multiple receivers pick up the same spoofed signal, much in the way a GNSS system may locate a user by trilateration.
In the implementation of the present invention of
The GNSS receiving stations R1, R2, R3, R4, R5, R6, R7, R8 are stationary and have been carefully surveyed with regard to latitude, longitude and elevation, so as to provide more than adequate coverage for the area A1 where location accuracy is required. The purpose of conducting the careful survey of the receiving stations R1, R2, R3, R4, R5, R6, R7, R8 is to allow a processing hub P to detect anomalies in the self-calculated position of these stations using incoming signals, either true signals from satellites S1, S2, S3, S4 or false signals from spoofer or jammer S/J; such anomalies imply spoofing or jamming.
Each of the receiving stations R1, R2, R3, R4, R5, R6, R7, R8 are in signal communication via secure network N with processing hub P, which may be located at a central location near, or within, area A1, and processing hub P may also serve multiple areas for which location accuracy is needed, providing signal processing services for other banks of receiving stations covering other areas. In the embodiment of
The processing hub P receives signals from the receiving stations R1, R2, R3, R4, R5, R6, R7, R8 with enough redundancy to be able to detect the true signals as broadcast from the satellites S1, S2, S3, S4. The first order of detection is to recognize that there is an inconsistency. That is, stations R1 and R2 are receiving a signal that is different from that received at stations R3, R4 etc. At this level the system and method of the present invention can warn that there is some anomalous information occurring in the region of R1, R2, R3 and R4. The next order of detection is to be able to confidently ascertain whether the correct signal is at R1 and R2, or R3 and R4. One approach that may be used in the present invention is majority voting. In order to allow for a majority voting system to work effectively, there needs to be a sufficient number of stations in a sufficiently diverse area to be able to confidently say, for example, that 3 of 10 stations are receiving signal X, but 7 of 10 stations are receiving signal Y, and therefore signal Y must be the correct satellite signal, and signal X must be from a device or devices attempting to compromise GNSS receiving at least in the area of the 3 stations receiving signal X. The best way to achieve an effective system and method that allows majority voting to effectively detect attempts to compromise, there needs to be a highly distributed network of receivers, and to alter the weighting of signals from receivers based on their distance from one another. Thus, a system and method of the present inventions configured in that matter allows for a confident determination that, for example, the signals at receivers R1 and R2 are compromised because many other receivers are consistently reporting signals different (outside of threshold) from those two receivers.
Because it is not known beforehand the scope of spoofing or jamming that may be affecting the area A1, the system and method of the present invention is prepared to assume that multiple receiving stations are being simultaneously affected. In order to discern true from false (or incomplete or non-existent) signals, the system and method of the present invention relies upon a number of geographically distributed receivers R1, R2, R3, R4, R5, R6, R7, R8 so that at least some of the receivers receive true signals from the satellites S1, S2, S3, S4.
As an example, if a single satellite signal is being spoofed by spoofer or jammer S/J, the processing hub P will receive signals from a number n of receivers R1, R2, R3, R4, R5, R6, R7, R8. At t0, all n receiving stations R1, R2, R3, R4, R5, R6, R7, R8 should report the same clock and ephemeris info for a particular satellite. If the processing hub P receives one signal from one or more of the receiving stations R1, R2, R3, R4, R5, R6, R7, R8 which is different from the others in clock or ephemeris, then there is a very high probability that that particular satellite's signal is being spoofed.
The system includes a mechanism to detect and exclude corrupt messages. The messages from the satellites S1, S2, S3, S4 include a cyclic redundancy check (CRC) which is intended to allow the receiver to detect and exclude messages that have been corrupted in transit—whether intentionally or not, corruption in transit is a fact of data communications. Occasionally a message will be corrupted but still pass a CRC check—this is a matter of statistical probability. The system will be configured to ignore N suspect messages from a particular station where the default for N is 1.
If the hub receives several signals from receiving stations R1, R2, R3, R4, R5, R6, R7, R8 which deviate from expected signals, then the signal which is consistent between the most receivers is deemed to be correct, (“Majority voting”). Clearly this scheme would have little validity if there were only a small number of receivers in proximity—it would be reasonable to anticipate a spoofing episode that affected, say, three out of four receivers For this reason it is important to have sufficiently large number of receivers distributed over a sufficiently large area that any single spoofer or jammer is unable to overwhelm or outnumber the ‘truth’.
The GNSS receivers R2 and R3 receiving accurate signals from GNSS satellite S2, as well as the GNSS receivers R1 and R8 receiving inaccurate or incomplete signals from the GNSS satellite S2 as a result of spoofer or jammer S/J both relay information about their received signals to central processing hub P. In one embodiment of the present invention, that information is transmitted over a hard-wired network so as to prevent efforts to spoof or jam the transmission from the receivers R1, R2; in another embodiment, this transmission is done wirelessly using encrypted or other secured wireless transmission technologies, so as to be secure against spoofing or jamming. The processing hub P compares the signals transmitted for each satellite S1, S2, S3, S4 as received by the different receivers R1, R2, R3, R4, R5, R6, R7, R8, with an allowance for the expected time delay between stations. That is, the system and method of the present invention ensures that it is comparing the signal emitted from the satellite at t0. Because the receiving stations R1, R2, R3, R4, R5, R6, R7, R8 are at different distances from any particular satellite S1, S2, S3, S4, and at are also at different distances from the processing hub P, speed-of-light time delay must be corrected for both for signals from a particular satellite S1, S2, S3, S4 to a particular receiving station R1, R2, R3, R4, R5, R6, R7, R8 as well as from a particular receiving station R1, R2, R3, R4, R5, R6, R7, R8 to processing hub P . Fortunately, the message frames include the information to permit this correction.
GPS L1 C/A signals are organized into 1500-bit frames divided into 300-bit subframes transmitted at 50 bps. Each subframe contains clock information. Every 6 seconds a new subframe is sent.
The processing hub receives these subframes within milliseconds to tenths of a second, depending on the distance between the hub and the number of internet processing hops. Once the processing hub has correlated the subframes that have been received by the receivers, it can readily determine if they are identical, as they should be. If the subframes are not all identical then the processing hub identifies which receivers have sent the different ones. Because there is enough information and little enough latency, the processing hub can detect which receivers are receiving subframes that have been tampered with or are inaccurate or insufficiently strong. The processing hub can also anticipate the difference between subsequent subframes of a particular type, and if the difference is greater or lesser than anticipated, raise an alarm. This works because the ephemeris changes very slowly and infrequently, compared to the frequency with which the messages are sent. For instance, the clock time should be advancing very similarly for the satellites and the onboard clock of the receiver, even if the receiver's clock has less precision. A change in satellite clock greater than the change in the receiver's clock is a potential problem. Also, the satellite's orbit parameters can be persistent over hours, and can't suddenly change because the satellite is just obeying the laws of physics in a near-vacuum. Hence a receiver that has prior data (as opposed to one that just got turned on, a.k.a. “cold start”) has potential clues to spoofing.
The receiver attaches fairly accurate timestamps to packets sent to the processing hub. The timestamp accuracy can be maintained by a combination of the GNSS receiver (which itself is susceptible to spoofing) and terrestrial-based Network Time Protocol (NTP). The processing hub can use these timestamps to supplement its interference detection algorithms.
When the processing hub P detects a spoofing or jamming event, it sends an alert to interested parties such as the target T. The target T may validate that the alert indicates an effort to misdirect the user U away from the area A1 at the target T, and relay that alert to the user U so that they know not to rely on the location information calculated by the GNSS signal receiver located on board user U.
In one embodiment of the present invention, the processing hub P of the present invention can be used to calculate the area (or volume) A2, and alert the U of the location and size of that area A2, so that the user U can direct itself away from that are to ensure the integrity of the navigation signals it is receiving and using. In another embodiment of the present invention, the processing hub P may be used to relay to the user U correct location information signals—preferably using a secure and possibly encrypted signal—to the user U so that it may use those signals instead of potentially spoofed or jammed signals it may be receiving when navigating in, or near, the area A2 in which spoofing or jamming may be occuring.
All of the signals from the satellites S1, S2, S3, S4 travel at the speed of light in vacuum. The signal is slowed down somewhat by the ionosphere and troposphere, as the result of traveling through non-vacuum media, and compensating calculations need to be made (as defined in the GPS Interface Control Documents (ICD)), but for the purpose of describing the present invention adjustment for speed variations as the result of transmission through media will not be detailed, and the description below is based on the signals from the satellites S1, S2, S3, S4 are assumed to travel to the receivers R1, R2, R3, R4, R5, R6, R7, R8 entirely through a vacuum.
Each satellite S1, S2, S3, S4 broadcasts its clock and orbital position data at a time t0. Each receiver R1, R2, R3, R4, R5, R6, R7, R8 compares its own internal clock with the clock information transmitted by any satellite S1, S2, S3, S4 that transmits a signal that that receiver R1, R2, R3, R4, R5, R6, R7, R8 receives. The difference between the internal receiver clock and the satellite clock is designated as Δt. Dividing the speed of light in a vacuum—approximately 3*108 m/s—by the calculated Δt yields the distance between any one particular satellite S1, S2, S3, S4 and the receiver R1, R2, R3, R4, R5, R6, R7, R8 which receives that signal at the time t0 at which that signal was transmitted. Thus, each receiver R1, R2, R3, R4, R5, R6, R7, R8 can compute the location in space of each satellite S1, S2, S3, S4 at time t0.
Any particular receiver R1, R2, R3, R4 receives information about its own location according to the formula:
Satellite Sn: Xn, Yn, Zn
Where n is the number of a particular satellite. A well-known and relatively simple, known algebraic equation can be used for a particular receiver R1, R2, R3, R4, R5, R6, R7, R8 to calculate its own X, Y and Z position from the received satellite position and clock information.
All locations of receivers R1, R2, R3, R4, R5, R6, R7, R8 are calculated by processing hub P using an earth-centred-earth-fixed reference model and corrections are then applied to allow for the rotation of the earth. Details of how this reference models compensate for earth rotation, impedance of signals from the speed of light in a vacuum due to media delays, and other corrections to location and time date from satellite signals are published in the GNSS system's interface control document (ICD). There are known techniques to manage inconsistent and redundant signals from multiple satellites, such as Kalman filters. For instance, a Kalman filter maintains information about the state of the system and the variance of its parameters, and as information is added, it applies a weighted average based on the certainty of the new parameters, in a recursive manner.
A spoofer may use a signal that has been recorded from a particular location at a previous time, and alter it to suit the spoofed location it is attempting to represent via the spoofing signal, or it may use the actual incoming current signal from a satellite S1, S2, S3, S4 and modify the transmitted information slightly, and then rebroadcast it. The present invention is designed to ensure that in either case, or in the case of merely overpowering an incoming satellite signal via jamming, accurate location information is calculated and transmitted to the user U so as to prevent mis-navigation. Signals—either an alert, or corrected or relayed true positional signals from receivers which are not subject to spoofing or jamming—may be transmitted to user U using a transmitting antenna K. The present invention could also be configured to calculate the area (or in the case of vehicles moving in three dimensions, such as aircraft, volume) of an area that has been calculated—based on detection of false signals received from receivers in that area/volume—to be subject to spoofing or jamming, and alert a user U of the location of those areas so the user U could decide to redirect the vehicle away from that area. The user U includes one or more antennae X which may be used separately, or as a single antenna, to receive GNSS signals from satellites S1, S2, S3, S4 and from transmitting antenna K.
As a result of the system and method of the present invention being able to both know the correct positional location of each of the receivers R1, R2, R3, R4, R5, R6, R7, R8 as well as to determine when any particular receiver R1, R2, R3, R4, R5, R6, R7, R8 is within the area A2 where spoofing or jamming is occurring because the location information from that receiver is transmitted to the processing hub P location information that deviates from its fixed, known, location data, the system and process of the present invention is able to detect the deviation and remove that receiver from location calculations at the user U. The processing hub P correlates the data from multiple receivers R1, R2, R3, R4, R5, R6, R7, R8 and uses deviation information between location calculated by received information and location information known about each receiver's fixed location based on unjammed or unspoofed data, thereby allowing the processing hub to calculate the area A2 affected by the spoofer or jammer, and discard and data received from any receiver R1, R2, R3, R4, R5, R6, R7, R8 that is transmitting information to the processing hub P. The processing hub maintains a database of the true locations of all the receivers, based upon calculations or other measurements of the location of those receivers known to be true and not subject to any interference. This database may be used to compare signals from the receivers at any time, and to therefore detect when those signals are false because of spoofing or jamming, when they fall outside of set variance thresholds for those locations.
When the hub detects that multiple receivers in a region are receiving interference through spoofed or jammed signals, it can make a coarse deduction of the area affected by interference based on the locations of the affected receivers and interpolate that the area between and around them is also affected. The accuracy of this deduction is increased as the number of receivers in this system increases.
Any information useful for user U to alert it to an area A2 to avoid, or to provide secure alerts, to relay or otherwise transmit correct location information, can be done using an antenna K in signal connection with processing hub P and designed to transmit signals receivable and translatable by user U.
In the present invention, because the actual location of the receivers R1, R2, R3, R4, R5, R6, R7, R8 is known or calculable at a time when there are no spoofing or jamming signals nearby, and because the system and method of the present invention maintains an independent time standard, when any receiver calculates a wrong position for itself based on data from the spoofer or jammer S/J, or cannot calculate a location for itself as the result of jamming, the system and method of the present invention is able to detect the deviation between the false and true location of that receiver. The processing hub correlates the data from multiple receivers to approximate the area A2 affected by the spoofer or jammer S/J.
Any of the receivers R1, R2, R3, R4, R5, R6, R7, R8 in the system and method of the present invention which are out of range of the spoofer/jammer S/J will continue receiving the correct satellite signals and thereby are able to maintain an accurate time standard for the overall system, and also act as a flag when incorrect time information is transmitted by a compromised receiver.
The receiving stations receiver R1, R2, R3, R4, R5, R6, R7, R8 can be used to detect a jammer because it is unable to extract the signal from any one of the satellites S1, S2, S3, S4 from the noise generated by the jammer. By using the system and method of the present invention, a user U can be reassured that some or all of the GNSS signals it is supposed to receive are not being interfered with, and that that condition is not equipment malfunction.
In addition to the above method, the central processing hub may also to detect spoofing in the following way. Each receiver R1, R2, R3, R4, R5, R6, R7, R8 receives the ephemeris from overhead satellites S1, S2, S3, S4 (or spoofer S/J). Each receiver R1, R2, R3, R4, R5, R6, R7, R8 relays the ephemeris it receives (whether true, or false) to the central processing hub P. The central processing hub P is able to compare the received ephemeris from multiple receivers R1, R2, R3, R4, R5, R6, R7, R8 and detect falsified data by comparing timing, location, or other data deviations from expected values. This is because each satellite S1, S2, S3, S4 is broadcasting its own ephemeris, so all receivers R1, R2, R3, R4, R5, R6, R7, R8 should receive the same messages from the same satellite. The hub can use a majority-voting scheme to determine which signal is correct, and to discard those signals that are incorrect based on deviation analysis. Users near the receivers R1, R2, R3, R4, R5, R6, R7, R8 receiving the incorrect messages can receive a warning alert, or the central processing hub P can send out corrected location information to the user after discarding of signals known to be false. Similarly, when multiple receivers R1, R2, R3, R4, R5, R6, R7, R8 are detected to be not receiving signals because of jamming, the central processing hub P is able to infer which users U within the jammed area A2 need to receive a warning alert, or have corrected location information transmitted to them.
Interested parties may subscribe to the system and method of the present invention to receive alerts about identified spoofing or jamming activity. This can be broken down into three service levels:
When multiple receivers in a region are subject to the same interference, the present invention can interpolate that all points between and near to these receivers are also subject to this interference. As a useful approximation, the system and method of the present invention assumes that the interferer is located at the centroid of the locations of all receivers that are subject to interference, with a radius large enough to include all subject receivers. In the present invention, if there are receivers within the calculated region that are not subject to interference, then the area around such a receiver is treated independently from the calculated area of interference. If the receivers are within, for example, tens of kilometres of one another, the system and method of the present invention assumes the zone of interference extends halfway between those two receivers. This calculation is not a completely accurate calculation of an area of interference, but it does serve as a useful approximation of affected areas.
All of the signal information from receivers R1, R2, R3, R4, R5, R6, R7, R8 are sent to processing hub P. The processing hub P includes electronic storage (such as a hard drive) in which a database is stored. The database may contain previously stored, or otherwise calculated, known and accurate location and clock data for each of the receivers R1, R2, R3, R4, R5, R6, R7, R8. The processing hub compares the signal received from each receiver to the stored or calculated known, accurate, location and clock data for that receiver, and determines if there is a discrepancy sufficient to trigger an alert. A discrepancy may be determined based on set, and stored, threshold values set either for all receivers, or individually for each receiver, if there are known differences in variability tolerance for different receivers. If the comparison between location signals received from a receiver and the known, accurate, stored data for that receiver indicates that that signal is outside of the threshold for that receiver, some form of alert may be transmitter to the user U. The alert may be in the form of a simple warning signal, or—as described in more detail below—more informative warning information as the location and size of an area calculated to be subject to jamming or spoofing.
It should be noted that the features of the various methods described above and show in
All of the information in the database DB may be used by the system and method of the present invention to provide appropriate levels of service to users U according to their needs, their financial subscription level, and the equipment that may be resident on the vessel accessing the present invention.
Each satellite broadcasts the same information to all users, in a given signal. The messages in the signal repeat every 22.5 minutes, so it is a straightforward exercise to compare the message (subframe) transmitted at to, even though it is received at slightly different times due to the varied distance from each satellite to the receivers, and from the receivers to the processing hub. A simple binary comparison of each 300-bit subframe is sufficient to detect which receivers are receiving an altered message.
The correct information may then be transmitted to the user U so that the user U can take mitigation steps to prevent mis-navigation.
A user U device may use multiple constellations to calculate its position; it just needs to know the inter-constellation time offsets as well as the different reference systems.
The user U device typically has a relatively cheap and simple clock on board. Only larger and more expensive reference receivers may connect to an atomic clock which is of comparable quality to the GNSS satellite's on-board atomic clock. Therefore, it is customary for the navigation system used by the user U to use its own clock only for the very coarse portion of signal acquisition, and then trusts the atomic clocks of the four or more satellites it is receiving in order to do GNSS location identification. The navigation system used by user U may even reset its own internal clock to match the received time from the more accurate clocks on the satellites S1, S2, S3, S4. If a spoofer S/J is broadcasting a wrong clock signal this can affect the end user's system and possibly cause that system to reset its own clock to an inaccurate time. For instance, some software systems require a check against GNSS time to determine whether the license to that software is valid and the user U may intentionally spoof the clock to keep the software running when the license has actually expired. The present invention could be used by the vendor of that software to ensure the user U is not self-spoofing its own system in order to circumvent restrictions on the time period for using that software, by detecting self-spoofing by a user and disabling the software that relies upon a GNSS clock in order to keep the software license valid.
The description and drawings describe but a few of the potential embodiments of the present invention. Although the embodiment described above uses an airport as the area of interest and an aircraft as the user of the system, the invention is equally adaptable and applicable to maritime or general transportation uses, such as harbours, shipping channels or straits, high-traffic or dangerous roadways or rivers, as well as a system to improve the integrity of autonomous driving, flying, or sailing when GNSS location systems are an important part of a driverless, pilotless or navigator-less system.
Interested parties may subscribe to this system and receive alerts and updated and accurate location information in a secure manner. For instance, an airport authority may receive the alerts at the Air Traffic Control Centre (ATCC) and controllers can relay the information to nearby aircraft so that they can adjust their navigation system so as to discount location signals identified as false or jammed. Likewise, a shipping company could equip its vessels with alert receivers and internal systems to account for false or jammed signals. Alerts may be sent to subscribers via encoded radio message and/or via the internet, as long as these messages are made in a secure fashion so that they are also not subject to spoofing or jamming. The system should be designed to ensure that only messages relevant to a user are displayed. For instance if there is a spoofing incident in one location—for example, Boston, Massachusetts, USA—a subscriber in Seattle, Washington, USA wouldn't need to receive an alert, but a subscriber in Providence, Rhode Island, USA, might wish to receive an alert as the spoofing or jamming might equally effect some signals relied upon at that location.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2020/000993 | 11/30/2020 | WO |