Any and all applications for which a foreign or domestic priority claim is identified in the Application Data Sheet as filed with the present application are hereby incorporated by reference under 37 CFR 1.57.
This application is related to issued and co-owned application titled GLOBAL NAVIGATION SATELLITE SYSTEM SPOOFER IDENTIFICATION TECHNIQUE, U.S. Pat. No. 10,024,973, issued on Jul. 17, 2018, Ser. No. 14/678,755, filed on Apr. 3, 2015, the disclosure of which is hereby incorporated by reference in its entirety herein.
The invention generally relates to electronics, and in particular, to global navigation satellite system (GNSS) receivers.
The global positioning system (GPS) is an example of a global navigation satellite system (GNSS). A potential threat to the performance of a GNSS receiver is known as “spoofing.” Spoofing includes the transmission of false GNSS signals that can trick a GNSS receiver into incorrectly estimating its position, velocity, and/or time. One form of spoofing is known as “meaconing,” in which real GNSS signals are rebroadcast in a manner that causes the GNSS receiver to incorrectly estimate position, velocity, and/or time.
In addition, in certain situations, it can be difficult to upgrade or replace an existing GNSS receiver. For example, some GNSS receivers are custom-made or are built into objects such as vehicles. It would be desirable to provide a countermeasure to render these and other GNSS receivers to be less vulnerable to spoofing attacks.
One embodiment includes an apparatus including a first global navigation satellite system (GNSS) receiver for providing anti-spoofing capability to a second GNSS receiver, wherein the apparatus includes: a first group of acquisition and tracking functions configured to acquire and track multiple downconverted signals, wherein an acquisition and tracking function includes a hardware correlator; a processor configured to determine which of the multiple downconverted signals are based on authentic GNSS signals and which of the multiple downconverted signals are based on spoofed GNSS signals; and GNSS signal replicators configured to generate replicas of authentic GNSS signals based on timing settings used by the first group of acquisition and tracking functions to track the multiple downconverted signals that are based on authentic GNSS signals and not on timing settings used to track the multiple downconverted signals that are based on spoofed GNSS signals.
One embodiment includes a method for providing anti-spoofing capability from a first global navigation satellite system (GNSS) receiver a second GNSS receiver, wherein the method includes: acquiring and tracking multiple downconverted signals using a first group of acquisition and tracking functions, wherein an acquisition and tracking function includes a hardware correlator; determining which of the multiple downconverted signals are based on authentic GNSS signals and which of the multiple downconverted signals are based on spoofed GNSS signals; and using GNSS signal replicators, generating replicas of authentic GNSS signals based on timing settings used by the first group of acquisition and tracking functions to track the multiple downconverted signals that are based on authentic GNSS signals and not on timing settings used to track the multiple downconverted signals that are based on spoofed GNSS signals.
One embodiment includes an apparatus including a first global positioning system (GPS) receiver for providing anti-spoofing capability to a second GPS receiver, wherein the apparatus includes: a first group of acquisition and tracking functions configured to acquire and track multiple downconverted signals, wherein an acquisition and tracking function includes a hardware correlator; a processor configured to determine which of the multiple downconverted signals are based on authentic GPS signals and which of the multiple downconverted signals are based on spoofed GPS signals; and a means for generating replicas of authentic GPS signals based on timing settings used by the first group of acquisition and tracking functions to track the multiple downconverted signals that are based on authentic GPS signals and not on timing settings used to track the multiple downconverted signals that are based on spoofed GPS signals.
One embodiment includes an apparatus including a global navigation satellite system (GNSS) receiver with anti-spoofing capability, wherein the apparatus includes: a beamformer having an output with a group of downconverted signals corresponding to a spot beam antenna pattern; a group of acquisition and tracking functions configured to acquire and track multiple downconverted signals, wherein an acquisition and tracking function includes a hardware correlator; and a processor configured to determine which of the multiple downconverted signals are based on authentic GNSS signals and which of the multiple downconverted signals are based on spoofed GNSS signals, wherein the processor is configured to determine that a downconverted signal is from an authentic space vehicle when a spot beam antenna pattern nominally pointed towards a location in space of a corresponding space vehicle is dithered and a signal strength of the downconverted signal varies in an expected manner with dithering of the spot beam antenna pattern, wherein the processor is further configured to determine position based on the multiple downconverted signals that are based on the authentic GNSS signals and not on the multiple downconverted signals that are based on spoofed GNSS signals.
One embodiment includes a method for providing a global navigation satellite system (GNSS) receiver with anti-spoofing capability, wherein the method includes: using a beamformer, generating an output with a group of downconverted signals corresponding to a spot beam antenna pattern; acquiring and tracking multiple downconverted signals using the group of acquisition and tracking functions, wherein an acquisition and tracking function includes a hardware correlator; determining which of the multiple downconverted signals are based on authentic GNSS signals and which of the multiple downconverted signals are based on spoofed GNSS signals, wherein a downconverted signal is determined to be based on a signal from an authentic space vehicle when a spot beam antenna pattern nominally pointed towards a location in space of a corresponding space vehicle is dithered and a signal strength of the downconverted signal varies in an expected manner with dithering of the spot beam antenna pattern; and determining position based on the multiple downconverted signals that are based on the authentic GNSS signals and not on the multiple downconverted signals that are based on spoofed GNSS signals.
These drawings and the associated description herein are provided to illustrate specific embodiments of the invention and are not intended to be limiting.
To avoid repetition of description, components having the same or similar function may be referenced by the same reference number.
Although particular embodiments are described herein, other embodiments, including embodiments that do not provide all of the benefits and features set forth herein, will be apparent to those of ordinary skill in the art.
Accurate reporting of position, velocity, and time are indeed desirable attributes of any GNSS receiver. While illustrated in the context of the NAVSTAR Global Positioning System (GPS), the principles and advantages described herein are applicable to other GNSS, such as, but not limited to, the Russian GLONASS system, the European Galileo system, the Chinese COMPASS system, the Indian IRNSS system, or the like.
GNSS receivers include, but are not limited to, navigation systems, surveying and mapping equipment, flight data recorders and other vehicle tracking equipment, Aircraft Communications Addressing and Reporting System (ACARS), and the like. Various types of objects can rely on the GNSS-based information. These objects can include, but are not limited to smart phones, cars, trucks, aircraft, gliders, helicopters, watercraft, driverless or autonomous motor vehicles, unmanned aerial vehicles (UAVs), guided missiles, cruise missiles, smart bombs, artillery, robots, farm equipment, network equipment, decoys, transponders, and the like. If a GNSS receiver for these objects were to incorrectly report information, undesirable events can occur to the object relying on the GNSS-based information, such as getting lost or thrown off course, incorrectly fertilizing a field, getting into accidents or crashes, incorrectly reporting position, velocity, and/or time in log entries, incorrectly synchronizing transmission of data, incorrectly mapping a region, or the like.
One embodiment of the invention can advantageously provide one or more countermeasures against spoofers. One embodiment identifies a direction from which a spoofing attack occurs. A beamformer can control an antenna pattern of a controlled reception pattern antenna (CRPA) to generate a variety of antenna patterns, such as directional patterns with a main lobe and/or to generate one or more nulls for a pattern that may or may not be directional. For example, a variety of different antenna patterns can be selected for beam steering or for null steering. These different antenna patterns can vary by, for example, applying different phase shifts for the signals from the elements of the CRPA. Parameters for antenna patterns, such as phase shift information, can be generated during a calibration operation and can be stored in lookup tables for access during operation and can also be generated during use using space-time adaptive processing (STAP) and/or space-frequency adaptive processing (SFAP).
With digital beamforming, many different antenna patterns can be generated at the same time. The different antenna patterns are generated via different patterns of constructive and destructive interference. When a directional antenna pattern is generated by the beamformer, the antenna pattern exhibits gain along the direction of the main lobe. A beam can be steered by changing the antenna pattern to one that has the main lobe along a different direction. When a null is generated by the beamformer, the antenna pattern exhibits attenuation or loss along the direction of the null. The nulls can also be steered by changing the antenna pattern from among various antenna patterns having nulls.
The antenna 102 can correspond to a controlled reception pattern antenna (CRPA). An RFDC block 104 of the illustrated GNSS receiver can include, for example, low noise amplifiers (LNAs), radio frequency (RF) downconverters, and analog-to-digital converters (ADCs). RF signals from each antenna element of the antenna 102 are amplified and downconverted by the LNAs and downconverters to generate intermediate frequency (IF) signals. The IF signals are then converted to digital form by the ADCs to generate digital IF signals. In the context of military GPS receivers utilizing both L1 and L2 bands, a digital IF signal downconverted from L1 and a digital IF signal downconverted from L2 can be generated for each antenna element. In the context of GPS, since the various signals from the various space vehicles (SVs) are broadcast at the same frequencies, these digital IF signals typically carry multiple digital downconverted signals. An advantage of using digital IF signals is that multiple independent antenna patterns/beams can be formed by a beamformer (BF) 106 from the signals originating from the antenna 102.
In the embodiment illustrated in
In the context of GPS, the SVs broadcast their signals at the same frequencies. While these frequencies will be altered a bit by Doppler shift, multiple downconverted signals from multiple SV RF signals and possibly RF signals from spoofers can exist when received. Different SVs modulate their RF signals using different spreading codes or pseudo-random noise (PRN) codes such that a GPS receiver can distinguish among the signals. However, a spoofer will broadcast its signals using the same spreading codes as the SVs. A meaconer type of spoofer can take authentic signals from SVs and rebroadcast them with delays. It can be difficult for a conventional GPS receiver to distinguish between authentic and spoofed signals, which can lead to undesirable results, such as miscalculations of position.
The multiple downconverted signals from the non-directional pattern output are provided as an input to multiple acquisition and tracking functions 108. These acquisition and tracking functions 108 should be numerous enough to acquire and track both downconverted signals based on authentic RF SV signals and acquire and track downconverted signals based on spoofed RF signals. Acquisition and tracking of PRN codes is well known in the art and involves synchronizing a replica code for a SV with the signal (or downconverted version of the signal) received. After a signal is acquired and is being tracked, the timing required for synchronization with the replica code will be known. This timing information, which can be numerically-controlled oscillator (NCO) timing, can be the basis for reconstruction of a clean version of the GNSS signals, that is, a version without spoofing. These acquisition and tracking functions can include a combination of hardware and software. An example of hardware can include a correlator circuit, which is also known as a digital matched filter. Much of the control function, however, is typically implemented using firmware/software instructions executed by a processor.
Using techniques to be described later, the acquired and tracked downconverted signals are characterized as being authentic or spoofed. For example, NCO timing and the characterization can be stored in a memory device 110. A selector 112, which can be implemented by software, can pass identifiers for the relevant replica codes and the corresponding NCO timings to GNSS signal replicators 114 for only the authenticated signals. The GNSS signal replicators can modulate the SV replica code, such as coarse acquisition (C/A) codes and precise P(Y) codes onto an RF carrier, such as via binary phase-shift keying (BPSK) modulation. Other codes, such as military (M) codes exist and will also be applicable. The almanac data and the relevant ephemeris data for the SV can also be included in the modulation. This can be performed in a similar manner as is actually done in a SV. Other techniques can apply. The ephemeris data and almanac data can be retrieved from the authentic GNSS signals via the navigation message or can be retrieved from a different source, such as a computer network. The various modulated RF signals are then combined 116 and can be provided as an input to the second GNSS receiver to provide the second GNSS receiver with anti-spoofing capability. The RF combining technique is not critical as the RF signal power can be relatively low. A process for generating simulated or replica GNSS signals will be described later in connection with
In the embodiment illustrated in
Unlike the embodiment of
If the signal power varies as expected, the process determines that the signal is authentic and can flag that signal as authentic. If the signal power does not vary as expected, the process determines that the signal originates from a spoofer and can flag that signal as spoofed or untrustworthy. These determination can be used in reconstructing clean replica signals for a second GNSS receiver or for providing anti-spoofing capability in a standalone GNSS receiver. The process can be repeated for other signals of the same code but with different NCO timings and/or for other codes. These techniques can be implemented by execution of software modules by a computer hardware system. Instructions for the software can be stored in a tangible, computer-readable medium.
Various embodiments have been described above. Although described with reference to these specific embodiments, the descriptions are intended to be illustrative and are not intended to be limiting.
Number | Name | Date | Kind |
---|---|---|---|
4622557 | Weterfield | Nov 1986 | A |
5021792 | Hwang | Jun 1991 | A |
5119341 | Youngberg | Jun 1992 | A |
5173700 | Chesley | Dec 1992 | A |
5438337 | Aguado | Aug 1995 | A |
5461387 | Weaver | Oct 1995 | A |
5548293 | Cohen | Aug 1996 | A |
5570097 | Aguado | Oct 1996 | A |
5579021 | Lee | Nov 1996 | A |
5596600 | Dimos et al. | Jan 1997 | A |
5617317 | Ignagni | Apr 1997 | A |
5712641 | Casabona et al. | Jan 1998 | A |
5757316 | Buchler | May 1998 | A |
5784028 | Corman et al. | Jul 1998 | A |
5786790 | Abbott | Jul 1998 | A |
5786791 | Bruckert | Jul 1998 | A |
5812086 | Bertiger | Sep 1998 | A |
5872540 | Casabona et al. | Feb 1999 | A |
5877725 | Kalafus | Mar 1999 | A |
5940026 | Popeck | Aug 1999 | A |
5952968 | McDowell | Sep 1999 | A |
5955987 | Murphy et al. | Sep 1999 | A |
6018315 | Ence et al. | Jan 2000 | A |
6031488 | Hua et al. | Feb 2000 | A |
6084540 | Yu | Jul 2000 | A |
6166690 | Lin et al. | Dec 2000 | A |
6195040 | Arethens | Feb 2001 | B1 |
6201497 | Snyder et al. | Mar 2001 | B1 |
6266008 | Huston et al. | Jul 2001 | B1 |
6281841 | Nevill | Aug 2001 | B1 |
6339396 | Mayersak | Jan 2002 | B1 |
6392596 | Lin et al. | May 2002 | B1 |
6452543 | Tseng et al. | Sep 2002 | B1 |
6466177 | Kunysz | Oct 2002 | B1 |
6531976 | Yu | Mar 2003 | B1 |
6580389 | Speyer et al. | Jun 2003 | B2 |
6598009 | Yang | Jul 2003 | B2 |
6653973 | Yu | Nov 2003 | B2 |
6700536 | Wiegand | Mar 2004 | B1 |
6744408 | Stockmaster | Jun 2004 | B1 |
6784831 | Wang et al. | Aug 2004 | B1 |
6836645 | Hilgers et al. | Dec 2004 | B2 |
6861983 | Casabona et al. | Mar 2005 | B2 |
6952460 | Van Wechel et al. | Oct 2005 | B1 |
6961017 | Naylor et al. | Nov 2005 | B1 |
7010262 | Tyson | Mar 2006 | B2 |
7170445 | Thiel et al. | Jan 2007 | B2 |
7183971 | Lloyd et al. | Feb 2007 | B1 |
7250903 | McDowell | Jul 2007 | B1 |
7340283 | Melick | Mar 2008 | B1 |
7411550 | Torimoto et al. | Aug 2008 | B2 |
7415354 | Alexander | Aug 2008 | B2 |
7460064 | Tester et al. | Dec 2008 | B1 |
7468695 | Williams | Dec 2008 | B1 |
7471238 | Lillo | Dec 2008 | B2 |
7508339 | McDowell | Mar 2009 | B1 |
7577464 | Ezal et al. | Aug 2009 | B2 |
7602335 | Pan | Oct 2009 | B2 |
7605751 | Schipper et al. | Oct 2009 | B2 |
7671791 | Feller | Mar 2010 | B2 |
7764224 | Anderson | Jul 2010 | B1 |
7952519 | Nielsen | May 2011 | B1 |
7978130 | Cohen et al. | Jul 2011 | B1 |
7979203 | Haag et al. | Jul 2011 | B2 |
8035562 | Chang | Oct 2011 | B2 |
8044857 | Maenpa et al. | Oct 2011 | B2 |
8154445 | Maenpa et al. | Apr 2012 | B2 |
8305265 | Ezal et al. | Nov 2012 | B2 |
8487812 | Stratton | Jul 2013 | B1 |
8712051 | Psiaki | Apr 2014 | B2 |
8922427 | Dehnie | Dec 2014 | B2 |
9164176 | Fenton | Oct 2015 | B2 |
9383449 | Kim et al. | Jul 2016 | B2 |
9500483 | Stockmaster et al. | Nov 2016 | B1 |
9523774 | Davies | Dec 2016 | B2 |
9581699 | Zarowski | Feb 2017 | B2 |
9716315 | Rasheed | Jul 2017 | B2 |
10024973 | Alexander | Jul 2018 | B1 |
10031234 | Alexander | Jul 2018 | B1 |
10495759 | Leibner | Dec 2019 | B2 |
10545246 | Johnston | Jan 2020 | B1 |
10690776 | McMilin | Jun 2020 | B2 |
10721004 | Floch | Jul 2020 | B2 |
10725182 | Boyer | Jul 2020 | B2 |
10768309 | Alexander | Sep 2020 | B1 |
10948602 | Alexander | Mar 2021 | B1 |
11181646 | Boyer | Nov 2021 | B2 |
20020169578 | Yang | Nov 2002 | A1 |
20030048221 | Tseng et al. | Mar 2003 | A1 |
20030232595 | Baker et al. | Dec 2003 | A1 |
20050228841 | Grobert | Oct 2005 | A1 |
20060044204 | Kruth | Mar 2006 | A1 |
20060208946 | Bailey et al. | Sep 2006 | A1 |
20060214845 | Jendbro et al. | Sep 2006 | A1 |
20070262899 | Walter | Nov 2007 | A1 |
20070293150 | Ezal et al. | Dec 2007 | A1 |
20080062039 | Cohen et al. | Mar 2008 | A1 |
20080068260 | Schipper et al. | Mar 2008 | A1 |
20100007555 | Ezal et al. | Jan 2010 | A1 |
20110050489 | Maenpa | Mar 2011 | A1 |
20110050497 | Maenpa et al. | Mar 2011 | A1 |
20110068973 | Humphreys et al. | Mar 2011 | A1 |
20110102259 | Ledvina et al. | May 2011 | A1 |
20110109506 | Humphreys et al. | May 2011 | A1 |
20110241939 | Maenpa et al. | Oct 2011 | A1 |
20110287779 | Harper | Nov 2011 | A1 |
20120119950 | Kim | May 2012 | A1 |
20120121087 | Psiaki | May 2012 | A1 |
20130002477 | Dehnie | Jan 2013 | A1 |
20140035783 | Contarino | Feb 2014 | A1 |
20140247186 | Daneshmand | Sep 2014 | A1 |
20150116147 | Jaeckie | Apr 2015 | A1 |
20150168562 | Nichols | Jun 2015 | A1 |
20150234053 | Psiaki | Aug 2015 | A1 |
20150268045 | Duscha | Sep 2015 | A1 |
20150268350 | Whitehead | Sep 2015 | A1 |
20150293234 | Snyder | Oct 2015 | A1 |
20150309181 | Stahlin et al. | Oct 2015 | A1 |
20160252623 | Richard | Sep 2016 | A1 |
20160349379 | Lacaze et al. | Dec 2016 | A1 |
20170102464 | Davies | Apr 2017 | A1 |
20170227650 | Grobert | Aug 2017 | A1 |
20210333411 | Gum | Oct 2021 | A1 |
Number | Date | Country |
---|---|---|
2353648 | Feb 2001 | GB |
Entry |
---|
Chen et al., “Off-the-Shelf Antennas for Controlled-Reception-Pattern Antenna Arrays”; GPS World; Innovation: Getting Control; Feb. 1, 2013, [retrieved on Feb. 26, 2014]. Retrieved from the Internet: URL: http://gpsworld.com/innovation-getting-control-off-the-shelf-antennas-for-controlled-reception-pattern-antenna-arrays/. |
Jackson Labs, “RSR GPS RF=Transcoder / 10-Channel GPS Simulator, 2.3 x 1.6 inches,” [online], Jan. 22, 2017, [retrieved on Jun. 1, 2017], retrieved from <URL: http://www.jackson-labs.com/assets/uploads/main/RSR_Transcoder_specsheet.pdf>. |
Office Action dated Aug. 28, 2017, from related application U.S. Appl. No. 14/678,755, filed Apr. 3, 2015. |
PCT International Search Report and Written Opinion of the International Searching Authority regarding International Application No. PCT/US18/62115, dated Feb. 5, 2019, 19 Pages. |
Todd E. Humphreys et al., “The GPS Assimilator: a Method for Upgrading Existing GPS User Equipment to Improve Accuracy, Robustness, and Resistance to Spoofing,” [online], Preprint of the 2010 Ion Gnss Conference, Portland, Oregon, Sep. 21-24, 2010, [online], [retrieved on Apr. 26, 2017], retrieved from: < URL: https://radionavlab.ae.utexas.edu/images/stories/files/papers/assimilator_for_distribution.pdf>. |
Todd Humphreys et al., “Assessing the Civil GPS Spoofing Threat,” [online], The University of Texas at Austin Radionavigation Laboratory, Powerpoint presentation, 2009, [retrieved on Apr. 26, 2017], retrieved from <URL: https://radionavlab.ae.utexas.edu/images/stories/files/presentations/assessingSpoofingThreat.pdf>. |
Wen et al., “Countermeasures for GPS Signal Spoofing”; Proceedings of the 18th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2005); Long Beach, CA, Sep. 2005, pp. 1285-1290, [retrieved on Sep. 24, 2013]. Retrieved from the Internet: URL: http://lens.ou.edu/Download/ION/ION%202005%20Wen_Spoof.doc. |
Number | Date | Country | |
---|---|---|---|
20220137233 A1 | May 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16902858 | Jun 2020 | US |
Child | 17455191 | US | |
Parent | 15861961 | Jan 2018 | US |
Child | 16902858 | US |