1. Introduction
The vulnerability of Global Satellite Navigation Systems (GNSSs) to various intentional and non-intentional radio frequency interferences is an obstacle of GNSS applications [
1,
2]. Within them, the spoofing interference is a type of troublesome and malicious interference. Spoofing signals have the same characteristics to the legitimate GNSS signals. Thus, they are able to pass through the correlators of target receivers. Usually stronger than authentic signals, spoofing signals guide the victim receivers to track themselves, and then throw the victims astray [
3,
4,
5].
Many approaches have been proposed to detect or suppress spoofing attacks. For stand-alone GNSS receivers, multiple antennas are widely used to mitigate the effect of spoofing interference by monitoring the direction of arrival signals [
6,
7]. For single-antenna GNSS receiver, some signal-processing-based techniques have been implemented as effective ways to find spoofing attacks, including Receive Power Monitoring (RPM) [
8], correlation function analysis [
9] and Kalman filter-based tracking loop [
10].
Besides, INS aided methods have also developed because the inertial navigation system (INS) is autonomous and the integration of GNSS and INS is considered the possibility of countering spoofing attacks. The GNSS/INS integration systems overcome the drawbacks of each stand-alone system and become popular navigation systems [
11,
12,
13]. In the integration systems, the defects of INSs, the unknown absolute initial position and the accumulative position errors are compensated by GNSS that provides absolute positioning estimations with stationary noise [
11,
14,
15]. Meanwhile, autonomous INSs independent of surroundings have the capability to improve the robustness of GNSSs [
16,
17].
Actually, of normal GNSS/INS integration systems, the capability to counter spoofing attacks is limited [
18,
19,
20], since spoofing effects on GNSS probably pollute the estimations of the integration algorithm, such as the Kalman Filter, and then mis-correct the INS states. Some current researches improve the performance of integration systems under spoofing attacks. Using an INS-aided integrity monitoring algorithm, the tightly GNSS/INS integration systems, which fuse both systems using pseudoranges, effectively mitigate spoofing attacks [
21]. INS-estimated positions, as well as the satellite positions and receiver clock errors from the GNSS, are used to generate redundant virtual pseudoranges, considered as spoofing-free reference pseudoranges. When one satellite pseudorange is quite different from its virtual pseudorange, the distribution of pseudorange residuals change and the satellite is likely under spoofing attacks. Besides, as the Kalman Filter innovations in tightly GNSS/INS integration systems show unreasonable fluctuations under spoofing environments, they can be used as an alternative detection method [
22,
23,
24]. With dual antennas, GNSS is able to measure the vehicle heading. The consistency of attitudes resolved by INS and GNSS is able to detect spoofing attacks, due to the difference from the spoofing heading to the actual heading [
25,
26].
However, these methods are difficultly realized in low-cost GNSS chips that support neither pseudorange outputs nor dual/multiple antenna inputs. Additionally, for these black-box receivers, there is no access to signal processing-based interference detections. The GNSS/INS loosely coupled integration system, fusing both systems using positions (and velocities in some cases), is easily available and widely employed [
20]. Thus, we try to find a method to detect spoofing attacks based on the GNSS/INS loosely coupled integration system without additional hardware, information or special requirements.
Considering different behaviors of spoofing effects and different integration fusions, we analyze the performance of the GNSS/INS loosely coupled integration systems with position and position/velocity fusion under two typical spoofing attacks, Meaconing attacks (MEAC attacks) with constant spoofing-induced relative pseudoranges and Lift-off-aligned attacks (LOA attacks) with gradually increasing relative pseudoranges [
27]. In the analysis, we focus on variations of the IMU error compensations estimated by the Kalman filer. The compensations refer to IMU physical characteristics and vary within reasonable ranges. Abnormal increments of compensations are likely to alarm spoofing attacks and deeply discussed in the study. Besides, a spoofing detection algorithm based on the compensations is proposed and tested. MEAC attack could be alarmed by GNSS/INSs with both position and position/velocity fusion within one second and two seconds, respectively. For LOA attack, GNSS/INSs with position/velocity fusion are capable of alarming it instantly, while the system with position fusion fails in perceiving spoofing interference. One obvious merit of the spoofing detection is the easy availability for low-cost GNSS/INSs without extra-hardware or improvement on the receiver structure.
In
Section 2, the main features of different types spoofing attacks are introduced, as well as their effects on GNSS position and velocity estimations. In
Section 3, the effects of spoofing interferences on GNSS/INS loosely coupled integration system are discussed in detail. The effects of different spoofing interferences are compared by experimental studies and a detection method of spoofing attacks is proposed in
Section 4. Finally, the conclusions of this study are given in
Section 5.
2. Effects of Spoofing Attacks on GNSS Position and Velocity Estimations
Spoofing attacks can be realized by using special devices, such as a GNSS transmitter, to emit GNSS-like signals. The GNSS-like signals have the same signal structures to the authentic signals, but high signal power and different PRN code delays
. The similar signal structures and high power cause the spoofing signals passing through the correlators and being tracked by the receiver. The different PRN code delays induce different pseudorange measurements and then the false GNSS position and velocity estimations. The delay
of spoofing signal referring to the
-th satellite can be written as:
where
is the delay of the authentic signal from the
-th satellite and
is the relative spoofing delay. Correspondingly, the relationship within spoofing, authentic and relative pseudoranges is written as:
where
is the speed of light,
and
are spoofing and authentic pseudorange vectors, respectively, and
N is the number of available satellites. The estimated position
and receiver clock bias
are
where
is the satellite geometry matrix referring to the satellite number and distribution,
is the authentic position,
is the spoofing induced relative position,
is the authentic receiver clock bias, and
is the spoofing induced relative receiver clock bias.
Meanwhile, the simulated motion of the spoofing signals also leads to incorrect interpretation of the Doppler shift (
). The false Doppler shifts mis-lead the velocity solution of the victim receiver. The relationship between the Doppler shift and pseudorange rate is expressed as:
Similarly, the velocity solution can be written as
where
is the velocity vector from the authentic signals,
is the spoofing induced relative velocity,
is the authentic receiver clock error rate, and
is the spoofing induced relative receiver clock drift.
Spoofing attacks can be simply and low-costly realized by a transmitter or a repeater which delay the received GNSS signals and transmit them with high power via a transmitting antenna, as shown in
Figure 1. Under the situation, signals collected by the target receiver are transmitted from the spoofer rather than the satellites. Therefore, the pseudoranges measured by the target receiver consist of the ranges from satellites to the spoofer receiving antenna
, from the spoofer receiving antenna to the spoofer transmitting antenna
, and from the spoofer transmitting antenna to the target receiver
. In addition, the measured pseudoranges include the hardware-time-delay induced range
in the spoofer and receiver-clock-bias induced range
in the target receiver.
Within these ranges, is different in each pseudorange since its value refers to the different satellite position. The ranges , , and are the same in all pseudoranges. The total pseudorange collected by the target receiver referring to one satellite is written as,
From Equations (2) and (6), the relative spoofing pseudorange can be estimated as,
Equation (7) shows that the spoofing induced position error depends on the range difference between and . The spoofing induced clock bias error (in the unit of meter) includes , , and the common part of . Each them has the same value in all pseudoranges and hence the same behavior to the receiver clock bias. Specially, if and , namely the transmitter and the target receiver settled near to each other, it can be obtained that .
In Equation (7), the item is constant, equal to the cable length between the spoofer receiving antenna and transmitting antenna. Other items , , and are time-varying. Thus, the spoofing induced pseudorange rate is written as,
Similarly, the different part in the pseudorange rate leads to velocity variation, which is the spoofing induced velocity. The common parts and affect the receiver clock drift error.
Neither receiver clock bias nor drift is integrated in the GNSS/INS loosely coupled integration system. Their variations under spoofing attacks are simplified in the following analysis. According to Equations (3), (5), (7) and (8), it can be obtained that . A common case of and would occur under MEAC attack. The item is the initial position offset, the position difference between the spoofer and the target receiver. The nonzero item results from the pseudorange rate difference of and When the spoofer is near to the target receiver and both are relatively static, the item is close to zero. The value of steps up to a constant value when spoofing occurs.
Different to the impulsive position error case, the other common case of and would occur under Lift-off-aligned attack (LOA attack). In this case, the spoofing signal aligned to the authentic signal at the beginning of the attack, i.e., , meanwhile the spoofing induced position deviation . Under LOA attack, the spoofing relative delay increases with time. As a result, the spoofing induced relative pseudorange increases with time, i.e., . In this case, pseudorange rate is nonzero and the position estimated from the spoofed receiver are gradually away from the authentic position over time, i.e., . It should be noted that the variation is also able to realize under MEAC attack. For instance, the spoofer is close to the target receiver and then far away from it. The simple implementation is not exact LOA attack since the spoofing signal with unknown hardware delay is unaligned to the authentic signal.
Generally, the position and velocity measured by GNSS under spoofing attacks can be written as,
Shortly, under MEAC attack, and , GNSS-estimated positions step up without significant velocity variations. Under LOA attack, and , GNSS-estimated velocities jump up and the estimated positions are gradually away from the actual position.
3. Effects of Spoofing Attacks on the GNSS/INS
The variations of spoofing-induced relative positions and velocities under MEAC and LOA attacks can be described as two typical situations of and , respectively. Their effects on the integration system are investigated after a short introduction to the integration system model under spoofing-free situation.
3.1. The GNSS/INS Loosely Coupled Integration System Model in the Normal Case
GNSS/INS loosely coupled integration systems commonly employ the Kalman Filter to estimate the position and velocity errors, gyroscope bias and first-order Markov process random noise errors, and accelerometer bias error. Then, the state vector
consists of INS position error
, velocity error
, gyroscope bias errors
, and first-order Markov process random noise errors of gyroscope
and accelerometer bias error
[
2,
6,
28]. The process model is commonly as,
where
is the state transition matrix,
is the system noise matrix, and
is the process noise, which is assumed as white noise with covariance
.
The acquisition of attitude in GNSS requires multiple antennas, while typical commercial GNSS receivers are equipped with only one receiver antenna and cannot resolve attitudes directly. Therefore, in the GNSS/INS loosely coupled integration systems, GNSS position or GNSS position/velocity are fused with INS. The position and velocity differences between INS and GNSS are considered as measurements. The measurement model is written as:
where
and
are position error and velocity error of GNSS, respectively.
,
are the measurement matrices. The measurement error
is considered as white noise, i.e.,
. Its covariance
can be estimated as
. Details about the specific parameters of
can be found in [
28]. In Equation (11), the item
represents the position and velocity difference between the GNSS measurements and INS estimation. Under the normal cases, the position and velocity states of GNSS are consistent with that of INS, and hence the position and velocity difference
is small, equal to the sum of GNSS noise and INS errors, i.e.,
. If all INS errors are corrected, the item
is GNSS noise. In some loosely coupled integration systems, the velocity difference
is optional. Then, the GNSS/INS integration system becomes integration with position fusion, and the measurement model becomes
.
3.2. Analysis of the Effect of Spoofing Interference on the GNSS/INS
Kalman Filter is most used in the GNSS/INS integration systems. In a standard Kalman Filter, the posteriori state estimate
is estimated as,
where
is the priori state estimate,
is the optimal Kalman gain,
is the priori error covariance matrix,
is the posteriori error covariance matrix. The items
and
are computed as,
The item is the optimal estimate of the errors of position, velocity and the IMU errors. It also used to compensate the position, velocity and IMU errors. In the normal case, the item is close to zero, meaning that the all errors of INS are compensated. According to the errorless , the item equal to the GNSS noise, and . However, when the standard Kalman Filer is in steady state, the matrix , , and tend to be constant matrices. They slightly vary with the change of measurement noise or process noise. As a result, the Kalman Filter is degraded and equivalent to a constant weighted average method.
Under a spoofing attack, the GNSS position and velocity errors include additional spoofing-induced relative position and relative velocity. The measurement
becomes,
where the spoofing vector
is
. The offsets of position
and velocity
generated by spoofing attacks cannot be eliminated by using Equation (11). The spoofed measurements
includes the deviation
. Clearly, spoofing attracts can lead to measurement increase. Besides spoofing attacks, the increase may result from the vehicle motion and IMU error.
Substituting Equation (13) into (12.1), the state compensation at moment k when spoofing attack appears becomes,
In Equation (14), the priori state estimate
is related to the previous state compensation
, which is independent of the measurement
at the
k − 1 moment, and
is the part of state compensation without spoofing attack effects. Therefore, the spoofing effects on state compensation is
. Since
and
, it can be obtained that
. The value of
in the spoofing environment varies slightly, disagreement with the state error variations. As pointed in Reference [
18], it is difficult to detect spoofing attacks using single
. Meanwhile, the posteriori state estimate
varies with
. It means that the spoofing attack causes abnormal corrections on all state compensations, including the navigation compensations (
and
) and IMU error compensations (
,
and
). Between the two types of compensation, the navigation information follows the spoofed GNSS [
18]; because, without spoofing detection, integration algorithms tend to believe the position and velocity difference between GNSS and INS relating to the carrier motion. Thus, the position and velocity from the integration system are quickly corrected as the similar to the spoofing values.
The IMU errors refer to its inherent physical characteristics, and therefore the compensation of the IMU errors , and theoretically vary within reasonable ranges. During spoofing, GNSS measured position and velocity are inconsistent with INS estimated ones. The inconsistency leads to abnormal compensation of the IMU errors through the Kalman gain.
Under MEAC attacks , the item is for the integration system with position/velocity fusion, and for the system with position fusion. The IMU error compensations are the 7–15th elements of and their values are proportional to . Both integration systems, with position and position/velocity fusions, are sensitive to the spoofing position deviations under MEAC attacks. Under LOA attack, the spoofing position gradually deviates from the authentic position with small initial position offset (=). The state compensation is in the system with position fusion and the norm . In the system with position/velocity fusion, the item , is proportional to spoofing velocity deviations . Therefore, the IMU error compensations in the system with position/velocity fusion have more significant increment at the moment spoofing velocity changes.
Generally, the analysis shows three effects of spoofing attacks on the GNSS/INS loosely coupled integration systems.
- (1)
Spoofing attack leads to an additional compensation in the integration systems. The modifies the INS estimated position and velocity into spoofed ones.
- (2)
The mis-corrects the IMU errors different from its own physical features, which is possibly used to detect spoofing attacks.
- (3)
The integration systems with position fusion and position/velocity fusion are susceptible to MEAC attacks. To LOA attack, the system with position/velocity fusion is more susceptible.
4. Experimental Results and Discussions
In this section, MEAC attack and LOA attack are implemented. The performances of the Global Positioning System/Inertial Navigation System (GPS/INS) loosely coupled integration systems with position fusion and position/velocity fusion are tested under these two spoofing attacks.
4.1. Experimental
Figure 2 shows the experimental setup of the spoofing interference on the roof of the College of Automation Engineering (CAE) Building 2 in the Nanjing University of Aeronautics and Astronautics (NUAA) campus.
A GPS repeater is used to generate spoofing signal. Its receiving antenna is about 20 m distance from the target receiver in the case of MEAC attack, and gradually far away from the target receiver in the case of LOA attack. In the test, the spoofing signals cover limited ranges, about 2–5 m. The transmitting antenna should be close to the target receiver to ensure a strong power of spoofing signals. The target receiver is a software-defined GPS receiver with the OLinkStar NS210M IF sampler (OLinkStar Co., Beijing, China) collecting GPS L1 signals. Meanwhile, inertial data are acquired using the low-accurate Xsens MTi-G-710 inertial sensors (Xsens Co., Enschede, The Netherlands), where nominal specifications are shown in
Table 1.
It should be noted that spoofing attacks in the experiments are not strict MEAC attack or LOA attack, due to the unknown hardware delay of the repeater. The two cases simulate the position and velocity variations of MEAC attack and LOA attack. LOA attack tries to drag the GPS measured position gradually far away from its authentic position. MEAC attack tends to lead a sudden position variation. In MEAC attack case, the distance between antennas of the receiver and repeater is fixed. The collected data length is about 150 s and spoofing attack starts at 83 s. In LOA attack case, the antenna of the repeater is slowly (about 1.2 m/s measured by GPS) away from the receiving antenna of the receiver.
Two common loosely coupled integration systems are tested. One integration system fuses position and velocity information in the Kalman Filter; the other uses position information only. The employed standard Kalman Filter is updated twice per second. The measurement noise covariance matrix is set as , based on the accuracy of GPS position errors and velocity errors in ENU coordinate. The process noise, is set as , where deg/s, deg/h, and μg.
4.2. Navigation Performanceof the GPS/INS under SpoofingAttacks
The average position in East-North-Up coordinate from the GPS receiver under normal situation is considered as the reference value.
Figure 3 shows the eastern position errors and eastern velocities from the GPS receiver and the two GPS/INS loosely coupled integration systems.
In
Figure 3a, during MEAC attack, the eastern position errors of GPS suddenly jump to −12 m from 0 m and the eastern velocity mainly keeps at zero except a slight increment during 83 s to 90 s. The slight increment on velocity probably results from spoofing attack. The eastern position errors from the two GPS/INS loosely coupled integration systems show the similar performance to that of GPS. Although the velocity fusion smooths the increase of position error, the GPS/INS system has been spoofed under MEAC attack. For the velocity estimation, the integration system with position/velocity fusion performs similar to the GPS receiver, estimated eastern velocity varying slightly and close to zero. However, the integration system with position fusion displays a high sensitivity to MEAC attack, a −3.8 m/s eastern velocity jerk following the occurrence of MEAC attack.
As shown in
Figure 3b, under LOA attack, the eastern position errors of GPS deviate gradually from the authentic location during 55.5 s to 78 s, and maintain at about 22 m after 78 s. Like the GPS receiver, the both integration systems are spoofed by LOA attack. Their velocity estimations show the same variation during the spoofing period. A short velocity increase by 0.5–1.8 m/s occurs during the dragging period from 55.5 s to 78 s. Then, the velocity turns back zero after 78 s.
To investigate the overall influence of spoofing attacks on the position and velocity, the norms of position compensation
and velocity compensation
are defined as:
Figure 4 shows the norms of position and velocity compensation under spoofing attacks. Under MEAC attack, the position and velocity compensation norms from the GPS/INS with position fusion increases greatly, while the norms from the GPS/INS with position/velocity fusion change a little. Under LOA attack, both the norms estimated by the GPS/INS with position fusion and position/velocity fusion here have some increments, not as significant as variations under MEAC attack. In addition, the norm increments of position and velocity from the system with position fusion quickly and sharply follow the occurrence of MEAC attack. Under LOA attack, the increment occurs at 64 s, about lagging 9 s to the occurrence of LOA attack. It implies a possible spoofing detection for the integration system with position fusion through using unreasonable increment on norms of position and velocity compensation. The unreasonable norm increment occurs following MEAC attack and a period lagging to LOA attack. It should be pointed out that under LOA attack the position and velocity compensation norms increments is difficult to detect.
Shortly, the GPS/INS loosely coupled integration systems based on standard Kalman Filter are deceived by both MEAC and LOA attacks.
4.3. The Variations of IMU Error Compensation under MEAC and LOA Attacks
Figure 5 shows the estimated gyroscope bias errors from the GPS/INS with position and position/velocity fusions under MEAC and LOA attacks. Before spoofing, the gyroscope bias errors vary within 0.01 deg/h in
Figure 5a and 0.03 deg/h in
Figure 5b. Under MEAC attack, the gyroscope bias errors in Z-axis range between −0.07 deg/h and 0.06 deg/h. The two integration systems show the similar performance. The gyroscope bias errors significantly increase during the whole MEAC spoofing. Under LOA attack, the gyroscope bias errors estimated by the position/velocity-fusion-based integration system become large, ranging between −0.08 deg/h and 0.14 deg/h. With the position fusion, the GPS/INS integration system is little disturbed by LOA attack.
In addition, the effects of spoofing attacks on different axial gyroscopes are different. To investigate the overall influence of the spoofing attack on the IMU, the norms of the XYZ-axis gyroscope bias compensation , the gyroscope first-order Markov compensation and the XYZ-axis accelerometers bias compensation are defined as,
Figure 6 shows the norms of the IMU error compensation under spoofing attacks. Under MEAC attack, as shown in
Figure 6a, the norms of the gyroscope bias compensations become much larger than that under spoofing-free period. The norm of the gyroscope bias compensation reaches 0.074 deg/h at 95 s during spoofing period. Under spoofing-free condition, the maximum norm value is 0.007 deg/h at 64.5 s. Similar variations are also found in
and
. Although the occurrence of the incorrectness in the GPS/INS loosely coupled integration with position/velocity fusion is 1 s slower than that in the system with position fusion, two systems show the similar sensitivity to MEAC attack. Thus, the norms of the IMU error compensation have the capability to detect MEAC attack.
Under LOA attack, as shown in
Figure 6b, the increments of
,
and
from the integration system with the position fusion become insignificant. Differently, from the system with the position/velocity fusion, the norms also increase during LOA attack. Although the increments are not as obvious as that under MEAC attack, the maximum value of
reaches 0.14 deg/h, 4.6 times larger than the value under spoofing-free periods.
To test the performance of
,
and
under dynamic situation, the IMU is placed on a turntable to simulate attitude movement, i.e., heading, pitch and roll angle changes simultaneously. The collected inertial data is integrated with the spoofed GPS data to study whether spoofing attacks would have significant impacts on the dynamic IMU error compensation. The results are shown in
Figure 7.
In
Figure 7a, the fluctuations of IMU error compensation norms, under spoofing-free period, are slightly larger than the static IMU. Under MEAC attack, the norms significantly increase regardless of whether the fusion information is position or position/velocity. Similar to the static case, the variation of
from the integration system with position fusion is not obvious under LOA attack, as shown in
Figure 7b. With the position/velocity fusion, the maximum value of
reaches 0.43 deg/h during spoofing period, which is five times of the maximum norm under normal condition. The variations of
and
are similar to
. It should be noted that the moment with obvious spoofing-induced increments on
,
and
are later than the moment spoofing appearing. It may be due to the smoothing effects of Kalman Filter on velocity correction.
Shortly, for the loosely coupled integration system with the position/velocity fusion, the IMU error compensations are sensitive to both MEAC and LOA attacks. The compensations increase significantly during spoofing. For the system with position fusion, the IMU error compensation are sensitive to MEAC attacks. Different to the position and velocity compensations which also affected by the receiver dynamic situation, the IMU error compensations refer to IMU physical features and are possible to detect spoofing attacks in the GPS/INS loosely coupled integration systems.
To test the feasibility of spoofing attack detection based on IMU error compensations, a basic detection is employed. When the instantaneous
is larger than its historical statistics, the state of
will stay at pre-alarm state (marked as 2 in
Figure 8), which means there would be a possibility of spoofing attack. The states of the item
and
are detected using the similar method. Then the alarm of spoofing attack is given through combining detection results of
,
and
. Since both
and
are the features of gyroscopes and
is related to accelerometers, the spoofing attack is alarmed when the state of
is pre-alarm, and any state of
or
is pre-alarm.
Figure 8a illustrates the detection results of MEAC attack in GPS/INS with position and position/velocity fusions. Under MEAC attack,
,
and
of the GNSS/INS with position fusion suddenly rise at 83 s, the moment of MEAC attack beginning. All
,
and
are into the pre-alarm state and spoofing is detected at 83 s. For the GPS/INS with position/velocity fusion, the visible rise of
,
and
follows the occurrence of MEAC attack after about two seconds. Each of them alarms the spoofing after a short delay. Therefore, the voted alarm of MEAC attack is about two second later than the moment of spoofing occurrence. By contrast, under LOA attack, as shown in
Figure 8b, any item of
,
and
in system with position fusion fails in alarming spoofing; because, the IMU error compensations increase slightly. Fortunately, these items, especially the
and
, of the system with position/velocity fusion, increase dramatically once LOA attack occurs. Although the item
switches into pre-alarm state with 8 s delay, the voted spoofing alarm is at 56 s, close to the occurrence moment of LOA attack. In short, INS error compensations, in both integration systems with position and position/velocity fusions, can be used to detect MEAC attack. LOA attack is likely to be detected effectively by using the INS error compensations from the position/velocity fusion-based integration system. Once the spoofing attack being detected, it is suggested to reject GPS information input to Kalman filter, which is shown in
Figure 9.
Figure 9 shows the eastern position error estimated by GPS/INS with two types of fusions before and during spoofing attacks. Under MEAC attack, as shown in
Figure 9a, both GPS/INS systems with position fusion and position/velocity fusion succeed in detecting the occurrence of MEAC attack with a short delay, about one or two seconds. The integration system degrades into independent INS. The estimated position is no longer deceived by spoofing attacks. It is no doubt that the position error of stand-alone INS increases with time. Therefore, in
Figure 9a, the position error of GPS/INS with position fusion increases to 12 m at 88 s. After 5 s since spoofing detection, the position error of the system with position fusion is larger than the spoofing induced position error. With position/velocity fusion, the GPS/INS shows better performances than the one with position fusion. It keeps its position error within 12 m for about 16 s. The improvement is probably due to more accurate error compensation than that estimated by the system with position fusion. Under LOA attack, as shown in
Figure 9b, the GPS/INS with position fusion fails in spoofing detection since its
,
and
increments are too slight to detect spoofing attack. The system with position/velocity fusion still successfully detects the spoofing attack and turns into stand-alone INS at 56 s. The position error under LOA attack quickly increases to 22 m at 76 s. During the 20 s duration, the INS position error keeps less than spoofing induced position error. The slight superiority results from the growth rate of INS position error lower than the spoofing velocity
. It is a combination result of IMU performance and error compensation, as well as the values of spoofing velocity
and position deviation
, which are out of the discussion of the study.
Shortly, IMU error compensation-based spoofing detection is effective. For GPS/INS with position/velocity fusion, it is possible to detect both MEAC attack and LOA attack. Once the integration system turns into the stand-alone INS after spoofing detection, the system is able to isolate spoofing effects. In this case, the accumulative position error is inevitable. High-precise IMUs and advanced IMU error compensation algorithms are helpful in slowing the INS position error growth.