GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N 0 measurements

Size: px
Start display at page:

Download "GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N 0 measurements"

Transcription

1 INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 22; 3:8 9 Published online in Wiley Online Library (wileyonlinelibrary.com)..2 GPS spoofer countermeasure effectiveness based on signal strength, noise power, and C/N measurements Ali Jafarnia Jahromi, *,, Ali Broumandan, John Nielsen 2 and Gérard Lachapelle University of Calgary, Geomatics Engineering, Calgary, Alberta, Canada 2 University of Calgary, Electrical and Computer Engineering, Calgary, Alberta, Canada SUMMARY Spoofing sources can effectively disrupt a GPS receiver during the acquisition phase by generating multiple false correlation peaks and increasing the noise floor. Such deceptive correlation peaks can mislead the GPS receiver into acquiring the spoofer generated signals rather than the authentic signals. Also, the spoofer can increase the receiver noise floor to bury the authentic signals in the noise and at the same time generate correlation peaks with amplitudes commensurate with reasonable C/N expectations. The main focus of this paper is on assessment of the reduced effectiveness of the GPS spoofer countermeasure during acquisition where the GPS receiver utilizes C/N discrimination. As shown, whereas the C/N discrimination is of limited effectiveness, with a modest circuit modification, the receiver can measure the absolute power of the correlation peaks, which is an effective means of detecting and discriminating spoofer sources. It will be shown that employing absolute power monitoring technique considerably reduces the vulnerability region of the receiver compared with the C/N monitoring techniques. Copyright 22 John Wiley & Sons, Ltd. Received 22 July 2; Accepted May 22 KEY WORDS: GPS, anti-spoofing, C/N analysis, noise power analysis, absolute power analysis. INTRODUCTION GPS signal is vulnerable to the in-band interferences because of being an extremely weak signal. Therefore, even low-power interference can easily jam or spoof the consumer handheld GPS receivers within a radius of several kilometers []. Spoofing is a deliberate interference that aims to coerce global navigation satellite system receivers into generating false position/navigation solutions [2]. The spoofing attack is potentially significantly more menacing than jamming because the target receiver is not aware of this threat. Because the GPS signal structure is in the public domain, the implementation of a spoofer of disruptive capability is not prohibitively complex. Spoofing and related countermeasures are emerging issues for GPS and are consequently attracting significant interest [3 5]. In recent years, several spoofing detection and mitigation techniques have been proposed in the articles [6 ]. During the acquisition procedure, a generic GPS receiver correlates the received signal with a locally generated one to provide a rough estimate of the code delay and the Doppler frequency. Herein, it is assumed that the receiver searches over all in range Doppler and code cells and estimates the signal parameters commensurate to the maximum peak of the correlation function that is above a predetermined detection threshold. The spoofing threat can affect the acquisition process of a GPS receiver from two different perspectives. First, the spoofer can generate one or more fake correlation peaks whose amplitude is larger than the authentic signals and as such, present the acquisition processing of the receiver *Correspondence to: Ali Jafarnia Jahromi, University of Calgary, Geomatics Engineering, Calgary, Alberta, Canada. ajafarni@ucalgary.ca Copyright 22 John Wiley & Sons, Ltd.

2 82 A. JAFARNIA JAHROMI ET AL. with seemingly legitimate correlation peaks from which a false navigation solution is generated. Second, the spoofer can generate a component of uncorrelated noise in the GPS band that can arbitrarily manipulate the noise floor observed by the receiver. Additionally, as the Pseudorandom Noise (PRN) codes are not orthogonal relative to the dwell time interval used by the GPS acquisition, there is a mutual nonzero cross-correlation of the PRN codes that further increases the noise floor. To be effective, the spoofer should generate a correlation peak that has more power than the authentic signal peak to mislead the target receiver. Hence, it would initially seem desirable to generate a powerful spoofing signal whose power is significantly larger than the corresponding authentic signal. However, as the maximum GPS signal strength at the receiver antenna is known approximately, the receiver can detect the spoofing source if it is too large. Therefore, the receiver has effective means of detecting a spoofing source and hence can take the appropriate action. This may be that the receiver merely informs the user of a potential spoofing attack such that less reliability is placed on the eventual navigation solution. A more sophisticated response would be for the receiver to attempt to discriminate and sort the spoofer and authentic correlation peaks. By monitoring the power levels of the noise and correlation peaks, it becomes much more difficult for the spoofer to be effective. Hence, the spoofer to be effective must present the receiver with an accurate signal power level within this window. This is significantly further exasperated by multipath as the spoofing signal level is then essentially random. Also, the distance between the spoofer and the receiver is not known to the spoofer. As will be shown in this paper, application of these simple power thresholds virtually assures the receiver that if the spoofer signal is strong enough to be effective, then it is also detectable with reasonable probability. Some recent articles have heuristically discussed the amplitude discrimination techniques to detect the spoofing threat [2,]; however, no considerable analytical discussion has been provided in this regard in the open literature. This paper considers an analytical approach to investigate the effect of the spoofing signals on the receiver noise floor. It has been shown that the distribution of spoofing interference can be approximated by a circularly symmetric Gaussian distribution that is added to the ambient additive white Gaussian noise. After that, the receiver acquisition process has been analyzed on the basis of the received signal-to-interference-and-noise ratio (SINR). It is shown that the spoofing interference can decrease the SINR of authentic signal and cause it to fall under the detection threshold that results in deterioration of receiver acquisition performance. In addition, the spoofing power increment increases the SINR of the spoofing PRNs that can mislead the receiver toward acquiring the spoofer-sourced correlation peaks. The rest of this paper is organized as follows: In Section 2, the received signal model and the acquisition technique have been discussed. Section 3 discusses the spoofing effect on increasing the noise floor estimate. The effect of spoofing threat on the receiver SINR and consequently deteriorating its acquisition performance has been discussed in Section 4. Section 5 presents spoofing discrimination on the absolute power monitoring, and finally, the concluding notes will be discussed in Section SYSTEM MODEL Herein, it is assumed that the spoofing signal is transmitted from a single source located on the earth surface and is received at the receiver antenna as shown in Figure. The spoofing signal is a terrestrial signal that is subjected to multipath fading on route to the GPS receiver. It is assumed that the structure of the spoofing signal is similar to that of the authentic GPS signals; however, the spoofer is not limited to generate signals at the same power level, code delay, Doppler frequency, and PRN set as the present authentic signals. The GPS receiver is assumed to operate in the acquisition stage and aim to correctly detect the presence of the authentic signal and provide a rough estimate of the code delay and Doppler frequency. Therefore, if the spoofing signal has totally aligned its signal with the authentic signal in terms of Doppler frequency and code delay, it does not mislead the acquisition procedure. The baseband section of a generic GPS receiver consists of a complex correlator whose structure has been shown in Figure 2. This procedure includes Doppler removal, signal despreading, and low-pass filtering. In Figure 2, c l is the lth locally generated spreading sequence, o l and t l are the Doppler and code delay of the locally generated signal, respectively, and T s is the sampling interval. During the acquisition process, the receiver correlates the received signal with the locally generated PRN codes with different Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

3 EFFECTIVENESS OF GPS SPOOFING DETECTION BASED ON C/N MEASUREMENT 83 Figure. Spoofing scenario illustration. delays that are modulated by different Doppler frequencies. Then the resulting signal is integrated over N consecutive samples. When the Doppler frequency and the code delay of the locally generated signal match to that of the received signal parameters, a correlation peak will be observed at the output of the integrator. Here, it is assumed that the phase of the locally generated carrier is not necessarily synchronized to the target PRN, but its Doppler frequency as well as the spreading code delay perfectly matches to the desired signal s parameters. Also, the integration time has been considered to be much shorter than the data bit duration; therefore, it can be assumed that there is no data bit transition during the acquisition process. Therefore, the output signal from integrator and dump block can be written as follows [2]: y l ½o l ; t l ; KŠ ¼ ffiffiffiffi N p P l exp ð jfl Þþ Auth SV pffiffiffiffi P ifil ½o l ; t l ; KŠ fflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflffl} i ¼ I: Desired Signal () i 6¼ l fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} II: Interference caused by where Figure 2. The correlator structure in the baseband section of the GPS receiver. F il ½o l ; t l ; K other authentic PRNs þ pffiffiffiffiffi P kfkl ½o l ; t l ; KŠ þ ½KŠ ffl{zffl} k¼ fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} IV: Gaussian Noise III: Interference caused by Š ¼ N spoofer generated PRNs KN n¼ðk ÞNþ c i ðn t ilk Þc l ðþexp n ðjδo ilk n þ jδf ilk Þ (2) where P i and c i are respectively the received power and the spreading code of the ith satellite. Δo ilk, Δf ilk,andt ilk are respectively the Doppler difference, the carrier phase difference, and the code Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9 ()

4 84 A. JAFARNIA JAHROMI ET AL. delay difference between ith received PRN code and lth locally generated PRN code at the Kth integration interval. y l [o l, t l, K] is the integrator output at the Kth interval and is actually composed of four terms. The first term is the desired signal that is the term of interest during acquisition process. The second term is the interference caused by other authentic PRN codes; the third term is actually the interference caused by the spoofing PRN codes. These two terms are generated because of the cross-correlation between different Gold sequences. [K] is the circularly symmetric complex Gaussian noise process with variance of ~s 2 =N where ~s 2 is the variance of input ambient white Gaussian noise. The conventional GPS receivers consider all the last three terms as the noise term and perform the acquisition and tracking operations just on the first term. 3. EFFECT OF SPOOFING SIGNAL ON RECEIVER NOISE FLOOR ESTIMATE Consider the case where the spoofing signal received at the GPS receiver antenna is stronger than the authentic GPS signals. The interference caused by the spoofer can elevate the noise floor of the receiver processing. The receiver noise floor can be estimated by correlating the received signal with a fictitious PRN code that is not present in the current GPS constellation. The noise floor is actually the variance of y f [o f, t f, K], which is the complex correlator output at time interval K. 2 3 N Auth SV pffiffiffiffiffi s 2 Y f ½KŠ ¼ var P a i Fif o f ; t f ; K þ pffiffiffiffiffi P s k Fkf o f ; t f ; K þ ½KŠ ffl{zffl} i¼ k¼ fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} fflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl{zfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflfflffl} IV: Gaussian Noise (3) II: Interference induced by III: Interference induced by 5 authentic PRNs spoofer generated PRNs where it is assumed that the fth PRN code is a fictitious code that is not present in neither of the authentic nor the spoofing PRN sets. Therefore, the correlator output is made up of three major terms, namely interference terms induced by authentic PRN codes, interference terms induced by the spoofing PRN codes, and finally the Gaussian channel noise. It is assumed that the delay and Doppler frequency of authentic and spoofing PRN codes are independent of each other and randomly distributed. Therefore, (3) can be rewritten as follows: s 2 Y f ½KŠ ¼ N Auth SV i¼ P a i var F if o f ; t f ; K þ k¼ P s k var F kf o f ; t f ; K þ var½½kšš (4) The first and second terms in (4) consist of var[f if [o f, t f, K]]. This term is actually the cross correlation of ith and fth PRN codes modulated by the random Doppler shift and phase difference between these two signals. The distribution of F if [o f, t f, K] has been calculated numerically and can be well approximated by a zero mean Gaussian distribution in either of the I and Q branches. The simulations have been performed for normalized power spreading Gold codes, and the cross correlation variance in either of in-phase or quadrature branches has been extracted to be s 2 I;F if ¼ s 2 Q;F if ¼ :33. On the basis of the simulation results, the covariance between the I and Q branches is negligible. Therefore, it can be written as F if o f ; t f ; K e Ν c ; " #! s 2 I;F if s 2 Q;F if where the N c (a,b) is the circularly symmetric complex Gaussian distribution with the mean vector of a and the covariance matrix of b. In consequence, the correlator output y f [o f, t f, K] is the summation of circularly symmetric Gaussian random variables, which in turn is a complex Gaussian random variable with the following distribution: y f o f ; t f ; K e Ν c ; N 2NT s þ N Auth SV i¼ P a i þ k¼ P s k!" #! s 2 I;Fif s 2 Q;F if (5) (6) Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

5 EFFECTIVENESS OF GPS SPOOFING DETECTION BASED ON C/N MEASUREMENT 85 Equation (6) shows that the variance of the interference term is directly affected by the transmitted power of the authentic and spoofing PRN codes. The GPS system has been designed such that the interference level of authentic PRN codes does not exceed the ambient noise floor [3]. However, spoofing signals can be much more powerful than the authentic GPS signals. Therefore, their corresponding interference level can overtake the ambient Gaussian noise floor and therefore decrease the authentic SINR at the correlator output of conventional single-user GPS receivers. To investigate the effect of spoofing interference on the noise floor variance of the GPS receiver, the total received spoofing power (TSP) has been considered and is defined as follows: P s k k¼ ½TSPŠ dbw ¼ log! (7) In Figure 3, the estimated noise floor is depicted versus the TSP for the integration time of ms. It is observed that when the TSP is very low, the ambient Gaussian noise is the dominant term that determines the noise floor of the receiver. However, increasing the TSP will increase the noise floor and causes it to overtake the authentic satellites received signal power. 4. VULNERABILITY OF GPS ACQUISITION IN THE PRESENCE OF SPOOFING ATTACK The acquisition process of the GPS receiver is aimed to detect the authentic signal correlation peak and estimate the Doppler frequency and code delay. However, the interference caused by a spoofing signal can considerably increase the observed noise floor of a GPS receiver. On the basis of the discussions in the previous sections, the correlator output can be written under H (signal absent), H a (authentic signal present), and H s (spoofing signal present) hypotheses as follows: H ðsignal absentþ : y l ½o l ; t l ; KŠ ¼ Ν c ð; s 2 I 2 Þ H a ð authentic signal present Þ : y l½o l ; t l ; KŠ ¼ Ν c m a ; s 2 a I 2 ð spoofing signal present Þ : y l½o l ; t l ; KŠ ¼ Ν c m s ; s 2 s I (8) 2 H s -5 Theoritical noise floor Noise floor estimate [dbw] GPS L Typical Received Power Coherent Integration Time (T c ) = ms Total Spoofing Power (TSP) [dbw] Figure 3. Noise floor estimate versus total spoofing power. Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

6 86 A. JAFARNIA JAHROMI ET AL. where qffiffiffiffiffiffiffi m ajs ¼ expðjf l Þ P ajs l N Auth SV s 2 ¼ N þ s 2 I;F 2NT if s s 2 a ¼ N þ s 2 B I;F 2NT s i¼ P a i þ N Auth SV P a i þ i ¼ i 6¼ l s 2 s ¼ N þ s 2 B I;F 2NT s N Auth SV P s k k¼ P a i þ ka i¼ k ¼ k 6¼ l where the superscript a s is a compact reference to either of the authentic or spoofing hypotheses. As k¼ P s k P s discussed before, the interference level of an authentic signal is very small compared with the interference level of Gaussian noise process. Therefore, it can be considered that s 2 s 2 a. Also, if the number of spoofing signals is large enough (around or more), it can be assumed that a single spoofing PRN signal does not considerably change the noise floor. Hence, all the three variance terms are very close to each other (s 2 s 2 a s2 s ). For most of the GPS receivers, it is more convenient to work with squared value of correlator output amplitude. Therefore, the distribution of D = y l [o l, t l, K] 2 under H and H a s can be respectively written as central and noncentral Chi-squared distributions with two degrees of freedom as follows: pdjh ð Þ ¼ D exp 2s2 2s 2 p DjH ajs ¼ 2s 2 exp ajs D þ Pajs l 2s 2 ajs! I! C A C qffiffiffiffiffiffiffiffiffiffiffi DP l A where H a s refers to either of the authentic or spoofing hypotheses. If the detection threshold is defined as D th, then the probability of detection (P D ) and probability of false alarm (P FA ) can be defined as follows: Z Z! qffiffiffiffiffiffiffiffiffiffiffi P ajs D ¼ p DjH ajs dd ¼ 2s 2 exp D þ Pajs DP ajs l ajs 2s 2 l AdD ajs s 2 ajs D th D th Z Z () D P FA ¼ pdjh ð ÞdD ¼ exp dd 2s2 2s 2 D th D th where I (x) is the modified zero-order Bessel function of the first kind. The generalized likelihood ratio test (GLRT) [4] suggests that the GPS receiver evaluates the correlator output corresponding to all possible range of Doppler and code delay and picks the cell with highest squared amplitude. If the amplitude is above the threshold, the signal presence is flagged and the Doppler and code delay of corresponding cell is reported as the rough estimate of detected signal parameters. Therefore, for the correct detection, only one of the cross ambiguity function (CAF) cells should be above the detection threshold, and for given noise floor estimate and the probability of false alarm, the detection threshold can be determined as follows (The proof has been provided in Appendix A): h i D th ¼ 2s 2 ln ð P FA ÞNc (2) where the N c is the number of cells in the search space. Under the H a or H s hypotheses, the SINR of the ith PRN can be calculated using the following equation: s 2 ajs (9) () SINR ajs i ¼ Pajs i 2s 2 ajs Also, a SINR threshold can be defined by modifying (2) as follows: (3) Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

7 EFFECTIVENESS OF GPS SPOOFING DETECTION BASED ON C/N MEASUREMENT 87 ðsinrþ th ¼ D h i th 2s 2 ¼ ln ð P FAÞNc (4) On the basis of (4), it can be deduced that for a given probability of false alarm, the acquisition procedure is able to detect those signals whose SINR is above the detection SINR threshold. Figure 4 shows the authentic and spoofing SINR values versus the TSP for the case of equal power authentic PRNs and of, 2, 3, and 4 equal power spoofing PRNs. The power of each authentic PRN is 58 dbw, and the integration time is T c = ms. The threshold SINR has been calculated for P FA = 3 as a typical probability of false alarm. The search space consists of 5 Doppler bins and 246 code delay bins; therefore, the size of search space is defined as N c = = 3,69. It is observed that the SINR of authentic signals decreases as the TSP increases, whereas on the contrary, the SINR of spoofing PRNs increases up to a certain level as the TSP increases. The maximum spoofing SINR level depends on the number of transmitted spoofing PRNs and the distribution of TSP among them. The receiver noise floor estimate at ms integration time has been also depicted on the right-hand Y-axis. This curve is useful for analyzing the noise floor increase at a certain TSP level. The spoofer can add some additive white Gaussian noise to the transmitted signal to shift down the SINR curves and equivalently shift up the receiver noise floor estimate. However, this noise does not move the junction point of the authentic/spoofing SINR curves. The analysis of Figure 4 is based on the following assumptions: (i) (ii) (iii) (iv) The power of spoofing PRN signals should be higher than the authentic PRN signal s power to mislead the previously discussed GLRT detector. However, this power should not be considerably higher than the maximum authentic signal s power level anticipated by the receiver as it can be easily detected. The spoofing interference should not considerably increase the receiver noise floor because it might be detected as an unwanted interference by a spoofing-aware GPS receiver. The number of spoofing PRNs should be selected from a plausible list of visible space vehicles. Furthermore, the C/N of spoofing PRNs should not exceed the typical C/N level of authentic signals because the unusual C/N levels might be detected by the GPS receiver. If the spoofer knows the detection threshold of the receiver, it is better to choose a TSP bias point such that the authentic SINR falls under the detection threshold. In this case, only the spoofing peak can be found above the detection threshold. On the basis of the aforementioned discussion, a possible TSP bias point can be TSP = 43 dbw for equal power spoofing PRNs. In this case, all the first three conditions mentioned previously have been met while the absolute power of each spoofing PRN is around 53 dbw, which is equal to the maximum possible power level of the L C/A GPS signals [5]. Also, the noise floor increase is around 2 db. Authentic Signal SINR (N auth =) Spoofing Signal SINR (N spoof =) SINR [db] 2 Spoofing Signal SINR (N spoof =2) Spoofing Signal SINR (N spoof =3) Spoofing Signal SINR (N spoof =4) SINR Threshold for Detection (P Fa = -3 ) Noise Floor Estimate (I) Only Authentic Peak Above Detection Threshold (III) Two Correlation Peaks Above Detection Threshold 2 db (II) Only Spoofing Peak Above Detection Threshold -6-7 Noise Floor Estimate [dbw] (@ T c =ms) Total Spoofing Power (TSP) [dbw] Figure 4. Received signal-to-interference-and-noise ratio (SINR) versus TSP for authentic and spoofing correlation peaks. Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

8 88 A. JAFARNIA JAHROMI ET AL. The following two subsections investigate the effect of spoofing attack on the basis of the analysis of the curves in Figure 4. This analysis shows that the acquisition process of the GPS receivers is vulnerable to the spoofing attack even if the spoofing signal is not much more powerful compared with the authentic signals. 4.. Acquisition vulnerability analysis for uncommon authentic/spoofing PRN signals In this case, it is assumed that the receiver is trying to acquire an authentic PRN signal that is not common between authentic and spoofing PRN signals. Therefore, as shown by the green plot in Figure 4, the spoofing signal decreases the SINR of the authentic signal and finally makes it fall under the detection SINR threshold. In this scenario, the spoofer performs more like a wideband interference that deteriorates the detection performance of the receiver by decreasing the received SINR (increasing the noise plus interference floor). Figure 5 shows the ROC for different values of TSP. It is observed that the detection performance of the receiver substantially decreases as the TSP increases. P a D has been defined in (). Another case also can be defined where the receiver is acquiring a PRN signal that is only transmitted by the spoofer. In this case, as shown by the red curves in Figure 4, the receiver mistakenly acquires the spoofing correlation peak if the spoofing power is enough to overtake the detection SINR threshold Acquisition vulnerability analysis for common authentic/spoofing PRN signal In this case, it is supposed that the receiver is acquiring a PRN signal that is common between authentic and spoofing signals. Therefore, both green and red curves in Figure 4 should be considered while the receiver detection performance analysis. Three different zones can be observed in Figure 4 for the case of authenticandspoofing PRN signals. The first area happens when the TSP is less than 5 dbw; therefore, the spoofing SINR is under the detection threshold. Here, the only harmful effect of the spoofer is a slight reduction in the authentic signal SINR, but the authentic correlation peak is still acquired by the receiver. The second area happens for the TSPs greater than 39 dbw where the authentic SINR falls under the detection SINR threshold and only spoofing generated correlation peak can be detected by the acquisition procedure. In this case, the spoofing interference has a major contribution on the receiver noise floor. Third area happens when the TSP is higher than 5 dbw and lower than 39 dbw. In this case, the SINR of both authentic and spoofing signals are above the detection threshold that implies the presence of two correlation peaks above the detection threshold. Hence, the receiver might mistakenly acquire the spoofing correlation peak when its SINR is higher than the authentic signal s SINR. In this area, especially for the region where the noise floor increase is less than 2 db, the receiver might not be able to detect the spoofing interference on the basis of the noise floor increment analysis. It seems that in this TSP window, the GPS receiver has the maximum vulnerability to the spoofing attack P D a.5 Spoofing Power Increase No spoofing [TAP=-47 dbw] [TSP=-37 dbw] [TSP=-32 dbw] [TSP=-27 dbw] Figure 5. Receiver operating characteristic for different spoofing powers. P FA Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

9 EFFECTIVENESS OF GPS SPOOFING DETECTION BASED ON C/N MEASUREMENT 89 In Figure 4, it is also observed that if the number of PRN signals among which the spoofer is dividing its transmit power increases, each individual PRN will receive a smaller portion of spoofing power that leads to a lower SINR at the same TSP value. For instance, for the case of 3 equal power spoofing PRN signals, it is observed that the maximum SINR is less than 9 db, which is not unusually high to be detected by C/N monitoring techniques. In addition, in this case, for the region where both authentic and spoofing correlation peaks are above the threshold, their SINR difference is so smaller than the case of spoofing PRNs, and this makes it more difficult for the receiver to discriminate the spoofing attack. 5. SPOOFING DISCRIMINATION BASED ON ABSOLUTE POWER MONITORING As mentioned in the previous section, the C/N (equivalently SINR) measurements are vulnerable to the spoofing attack. This is because the spoofer can set up its TSP such that the C/N does not change considerably at the receiver side. However, if the receiver is capable to analyze the absolute received power within a certain accuracy level, the receiver vulnerability against the spoofing attack can be reduced significantly. A spoofing-aware receiver should be able to monitor the noise floor to detect any unusual noise level increase due to the spoofing interference. In addition, the ability of the receiver to monitor the absolute received power of each individual PRN signal, increases its resistance against the spoofing signals whose power is considerably higher than the typical power level of the authentic GPS signals. The incremental receiver hardware required to facilitate an absolute power measurement within an uncertainty of about 2 db is trivial especially in the context of monolithic application-specific integrated circuit (ASIC) integration. However, an additional factory calibration step will be required. On the basis of this, it is very reasonable to consider absolute power measurements as a readily available spoofer countermeasure. Figure 6 compares the spoofing vulnerability region for a C/N monitoring receiver versus an absolute power monitoring receiver. It has been assumed that the absolute power monitoring receiver is able to discriminate the elevated noise floor as well as higher power PRN signals within a 2 db accuracy range. In other words, this receiver is able to discriminate those signals whose absolute power is 2 db or more, higher than the maximum possible received power of GPS L C/A signal, which is 53 dbw [5]. Also, this receiver is capable to detect 2 db increase in noise floor from its desired value. However, the C/N monitoring receiver is only able to discriminate the signals whose SINR is higher than the maximum possible SINR of the GPS L C/A signal (This value is assumed to be 2.8 db for T c = ms and temperature = 3 K). Therefore, the C/N monitoring receiver is vulnerable to those signals whose SINR is higher than the detection SINR threshold and lower than the maximum SINR level of authentic GPS signals. This vulnerability region has been depicted in Figure 6. It is shown that for a spoofer whose TSP is equally divided among 6 PRNs, the C/N monitoring is vulnerable to the TSPs higher than 45 dbw. However, the vulnerability region of the absolute power monitoring receiver is limited to those signals whose SINR is SINR [db] 3 2 Maximum SINR of GPS signal at Tc=ms Spoofing Signal SINR (N-spoof=6) Boundary for Maximum Absolute Power (-5 dbw) SINR Threshold for Detection (P-Fa= -3 ) Noise Floor Estimate (right side Y axis) Vulnerability Region for Spoofing Detection based on Absolute Power Analysis Vulnerability Region for Spoofing Detection based on C/N 2dBNoiseFloorIncrease -6-7 Noise Floor Estimate [dbw] (@T c =ms) Total Spoofing Power (TSP) [dbw] Figure 6. Vulnerability region comparison of C/N versus absolute power monitoring techniques. Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

10 9 A. JAFARNIA JAHROMI ET AL. above the detection threshold, and their absolute power is below the maximum allowable GPS L power level. In this case, the vulnerability region is limited to the TSP value above which the receiver noise floor increases more than 2 db. Hence, as it is depicted in Figure 6, the vulnerability region of the absolute power monitoring receiver is much smaller than the vulnerability region of C/N monitoring receiver. Furthermore, if the receiver is able to detect the absolute receiver power more accurately, it can considerably reduce the size of its vulnerability window in presence of spoofing attack. 6. CONCLUSION Analysis of the vulnerability of GPS receivers to spoofing signals during the acquisition phase has been given. It has been shown that the C/N measurement alone is not an effective means of spoofing discrimination. As shown, spoofer is capable to transmit higher power signals and/or additional noise to elevate the noise floor estimate in the receiver processing. In this case, because of the noise floor increase, the C/N of the authentic signals reduces, which leads to the deterioration of the receiver detection performance. It was shown that the absolute power monitoring techniques enable the receiver to analyze the absolute noise floor as well as the absolute power of the correlation peaks. It has been shown that observations of the absolute power can be used to considerably reduce the effectiveness of the spoofing attack. This effectiveness comes about from the spoofer having to operate in a very small range of received power at the GPS receiver. APPENDI A: DETECTION THRESHOLD CALCULATION BASED ON PROBABILITY OF FALSE ALARM On the basis of (), the false alarm probability for a given Doppler and code phase can be calculated using the following equation: Z P FA cell ¼ pdjh ð ÞdD ¼ D th Z D th D exp 2s2 2s 2 dd ¼ exp D th 2s 2 For the correct detection, the false alarm should not occur in none of the CAF cells. Therefore, considering the independent CAF cells, the false alarm probability of total CAF can be defined as follows: (A) and therefore, P FA system ¼ ð P FA cell Þ N c (A2) P FA cell ¼ P Nc FA system (A3) On the basis of the aforementioned calculations, the detection threshold can be defined as follows: h D th ¼ 2s 2 ln½p FA cell Š ¼ 2s 2 i ln P Nc FA system (A4) REFERENCES. Hwang S, Shynk JJ. A null despreader for interference suppression in GPS. International Journal of Satellite Communications and Networking 2; 29(4):35 332, John Wiley Publications. 2. Montgomery PY, Humphreys TE, Ledvina BM. Receiver-autonomous spoofing detection: experimental results of a multiantenna receiver defense against a portable civil GPS spoofer. ION 29 International Technical Meeting, Anaheim, CA, January Forssell B. The dangers of GPS/GNSS. Coordinates magazine 29; V(2): Humphreys TE, Ledvina BM, Psiaki ML, O Hanlon BW, Kintner PM. Assessing the spoofing threat: development of a portable GPS civilian spoofer. ION GNSS 2st International Technical Meeting of the Satellite Division, Savannah, GA, 6 9 September Shepard D, Humphreys T. Characterization of Receiver Response to a Spoofing Attack. Proceedings of. ION GNSS 2, Portland, OR, September 2; Ledvina BM, Bencze WJ, Galusha B, Miller I. An In-line Anti-spoofing Device for Legacy Civil GPS Receivers. Institute of Navigation ITM: San Deigo, CA, Nielsen J, Broumandan A, Lachapelle G. GNSS Spoofing Detection for Single Antenna Handheld Receivers. Journal of the Institute of Navigation 2; 58(4): Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

11 EFFECTIVENESS OF GPS SPOOFING DETECTION BASED ON C/N MEASUREMENT 9 8. Scott L. Anti-spoofing & authenticated signal architecture for civil navigation systems. 6th International Technical Meeting of the Satellite Division of the Institute of Navigation (ION GPS/GNSS 23), Portland, OR, 9 2 September McDowell CE. GPS Spoofer and Repeater Mitigation System using Digital Spatial Nulling. US Patent B, 27.. Wen H, Huang PY, Dyer J, Archinal A, Fagan J. Countermeasures for GPS signal spoofing. ION GNSS 8th International Technical Meeting of the Satellite Division, Long Beach, CA, 3 6 September 25.. Jafarnia-Jahromi A, Lin T, Broumandan A, Nielsen J, Lachapelle G. Detection and Mitigation of Spoofing Attack on a Vector Based Tracking GPS Receiver. In The International Technical Meeting ITM 22, Institute of Navigation: Newport Beach, CA, 3 Jan Feb; Van Dierendonck AJ. Determination of C/A code self-interference using cross-correlation simulations and receiver bench tests. ION GPS 22, Portland, OR, September O Driscoll C. Performance analysis of the parallel acquisition of weak GPS signals. Ph.D. Thesis, Department of Electrical and Electronic Engineering, National University of Ireland, Cork, Kay SM. Fundamentals of Statistical Signal Processing, Volume II: Detection Theory. Prentice Hall Signal Processing Series, Upper Saddle River, New Jersey 7458, 998; Kaplan ED, Hegarty CJ. Understanding GPS Principles and Applications (2nd edn). Artech House: Boston, London, 26; AUTHORS BIOGRAPHIES Ali Jafarnia Jahromi is a Ph.D. student in the Position, Location and Navigation (PLAN) group of Geomatics Engineering Department of University of Calgary. He received his B.Sc. and M.Sc. degrees in Telecommunications Engineering from Amirkabir University of Technology, in 26 and 29 respectively. His research interests include signal processing in GNSS applications, statistical signal processing, array processing and GNSS software receiver design. Dr. Ali Broumandan received his Ph.D. from the Department of Geomatics Engineering, the University of Calgary (29). He holds a MSc. degree from the Department of Electrical and Computer Engineering, University of Tehran (26). His current research focuses on GNSS software receiver, array processing and detection and estimation theory. Dr. John Nielsen is an Associate Professor in the Department of Electrical and Computer Engineering of University of Calgary. Two main areas of his research are Ultra-Wideband technology that is applicable for high rate data communications and short-range imaging radar. The other area is mobile positioning based on TOA/AOA using CDMA and GPS signals. Professor Gérard Lachapelle is a Professor and Canada Research Chair in Wireless Location in the PLAN Group. He has been involved with GPS developments and applications since 98. His research ranges from precise positioning to GNSS signal processing. Copyright 22 John Wiley & Sons, Ltd. Int. J. Satell. Commun. Network. 22; 3:8 9

The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR

The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR The Case for Recording IF Data for GNSS Signal Forensic Analysis Using a SDR Professor Gérard Lachapelle & Dr. Ali Broumandan PLAN Group, University of Calgary PLAN.geomatics.ucalgary.ca IGAW 2016-GNSS

More information

LOW POWER GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) SIGNAL DETECTION AND PROCESSING

LOW POWER GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) SIGNAL DETECTION AND PROCESSING LOW POWER GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) SIGNAL DETECTION AND PROCESSING Dennis M. Akos, Per-Ludvig Normark, Jeong-Taek Lee, Konstantin G. Gromov Stanford University James B. Y. Tsui, John Schamus

More information

How Effective Are Signal. Quality Monitoring Techniques

How Effective Are Signal. Quality Monitoring Techniques How Effective Are Signal Quality Monitoring Techniques for GNSS Multipath Detection? istockphoto.com/ppampicture An analytical discussion on the sensitivity and effectiveness of signal quality monitoring

More information

GNSS Technologies. GNSS Acquisition Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey

GNSS Technologies. GNSS Acquisition Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey GNSS Acquisition 25.1.2016 Dr. Zahidul Bhuiyan Finnish Geospatial Research Institute, National Land Survey Content GNSS signal background Binary phase shift keying (BPSK) modulation Binary offset carrier

More information

Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques

Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques Security of Global Navigation Satellite Systems (GNSS) GPS Fundamentals GPS Signal Spoofing Attack Spoofing Detection Techniques Global Navigation Satellite Systems (GNSS) Umbrella term for navigation

More information

The Galileo signal in space (SiS)

The Galileo signal in space (SiS) GNSS Solutions: Galileo Open Service and weak signal acquisition GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send their questions

More information

Cooperative GNSS Authentication

Cooperative GNSS Authentication AUTHENTICATION Cooperative GNSS Authentication Reliability from Unreliable Peers Secure, reliable position and time information is indispensable for many civil GNSS applications such as guiding aircraft,

More information

SPECTRAL SEPARATION COEFFICIENTS FOR DIGITAL GNSS RECEIVERS

SPECTRAL SEPARATION COEFFICIENTS FOR DIGITAL GNSS RECEIVERS SPECTRAL SEPARATION COEFFICIENTS FOR DIGITAL GNSS RECEIVERS Daniele Borio, Letizia Lo Presti 2, and Paolo Mulassano 3 Dipartimento di Elettronica, Politecnico di Torino Corso Duca degli Abruzzi 24, 029,

More information

Evaluation of C/N 0 estimators performance for GNSS receivers

Evaluation of C/N 0 estimators performance for GNSS receivers International Conference and Exhibition The 14th IAIN Congress 2012 Seamless Navigation (Challenges & Opportunities) 01-03 October, 2012 - Cairo, Egypt Concorde EL Salam Hotel Evaluation of C/N 0 estimators

More information

On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection

On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection sensors Article On the Use of a Feedback Tracking Architecture for Satellite Navigation Spoofing Detection Esteban Garbin Manfredini * and Fabio Dovis Department of Electronics and Telecommunications,

More information

Mutual Coupling Estimation for GPS Antenna Arrays in the Presence of Multipath

Mutual Coupling Estimation for GPS Antenna Arrays in the Presence of Multipath Mutual Coupling Estimation for GPS Antenna Arrays in the Presence of Multipath Zili Xu, Matthew Trinkle School of Electrical and Electronic Engineering University of Adelaide PACal 2012 Adelaide 27/09/2012

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

Satellite Navigation Principle and performance of GPS receivers

Satellite Navigation Principle and performance of GPS receivers Satellite Navigation Principle and performance of GPS receivers AE4E08 GPS Block IIF satellite Boeing North America Christian Tiberius Course 2010 2011, lecture 3 Today s topics Introduction basic idea

More information

Characterization of L5 Receiver Performance Using Digital Pulse Blanking

Characterization of L5 Receiver Performance Using Digital Pulse Blanking Characterization of L5 Receiver Performance Using Digital Pulse Blanking Joseph Grabowski, Zeta Associates Incorporated, Christopher Hegarty, Mitre Corporation BIOGRAPHIES Joe Grabowski received his B.S.EE

More information

Jamming and Spoofing of GNSS Signals An Underestimated Risk?!

Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Alexander Rügamer Dirk Kowalewski Fraunhofer IIS NavXperience GmbH Fraunhofer IIS 1 Source: http://securityaffairs.co/wordpress/wpcontent/uploads/2012/02/spoofing.jpg

More information

Improved GPS Carrier Phase Tracking in Difficult Environments Using Vector Tracking Approach

Improved GPS Carrier Phase Tracking in Difficult Environments Using Vector Tracking Approach Improved GPS Carrier Phase Tracking in Difficult Environments Using Vector Tracking Approach Scott M. Martin David M. Bevly Auburn University GPS and Vehicle Dynamics Laboratory Presentation Overview Introduction

More information

THE EFFECT of multipath fading in wireless systems can

THE EFFECT of multipath fading in wireless systems can IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 119 The Diversity Gain of Transmit Diversity in Wireless Systems with Rayleigh Fading Jack H. Winters, Fellow, IEEE Abstract In

More information

Performance Analysis of Joint Multi-Antenna Spoofing Detection and Attitude Estimation

Performance Analysis of Joint Multi-Antenna Spoofing Detection and Attitude Estimation Performance Analysis of Joint Multi-Antenna Spoofing Detection and Attitude Estimation Andriy Konovaltsev, Manuel Cuntz, Christian Haettich, Michael Meurer Institute of Communications and Navigation, German

More information

Analysis of Processing Parameters of GPS Signal Acquisition Scheme

Analysis of Processing Parameters of GPS Signal Acquisition Scheme Analysis of Processing Parameters of GPS Signal Acquisition Scheme Prof. Vrushali Bhatt, Nithin Krishnan Department of Electronics and Telecommunication Thakur College of Engineering and Technology Mumbai-400101,

More information

Performance Evaluation of the VBLAST Algorithm in W-CDMA Systems

Performance Evaluation of the VBLAST Algorithm in W-CDMA Systems erformance Evaluation of the VBLAST Algorithm in W-CDMA Systems Dragan Samardzija, eter Wolniansky, Jonathan Ling Wireless Research Laboratory, Bell Labs, Lucent Technologies, 79 Holmdel-Keyport Road,

More information

B SCITEQ. Transceiver and System Design for Digital Communications. Scott R. Bullock, P.E. Third Edition. SciTech Publishing, Inc.

B SCITEQ. Transceiver and System Design for Digital Communications. Scott R. Bullock, P.E. Third Edition. SciTech Publishing, Inc. Transceiver and System Design for Digital Communications Scott R. Bullock, P.E. Third Edition B SCITEQ PUBLISHtN^INC. SciTech Publishing, Inc. Raleigh, NC Contents Preface xvii About the Author xxiii Transceiver

More information

UWB Small Scale Channel Modeling and System Performance

UWB Small Scale Channel Modeling and System Performance UWB Small Scale Channel Modeling and System Performance David R. McKinstry and R. Michael Buehrer Mobile and Portable Radio Research Group Virginia Tech Blacksburg, VA, USA {dmckinst, buehrer}@vt.edu Abstract

More information

GPS receivers built for various

GPS receivers built for various GNSS Solutions: Measuring GNSS Signal Strength angelo joseph GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send their questions

More information

Fundamentals of Global Positioning System Receivers

Fundamentals of Global Positioning System Receivers Fundamentals of Global Positioning System Receivers A Software Approach SECOND EDITION JAMES BAO-YEN TSUI A JOHN WILEY & SONS, INC., PUBLICATION Fundamentals of Global Positioning System Receivers Fundamentals

More information

Receiving the L2C Signal with Namuru GPS L1 Receiver

Receiving the L2C Signal with Namuru GPS L1 Receiver International Global Navigation Satellite Systems Society IGNSS Symposium 27 The University of New South Wales, Sydney, Australia 4 6 December, 27 Receiving the L2C Signal with Namuru GPS L1 Receiver Sana

More information

Decoding Galileo and Compass

Decoding Galileo and Compass Decoding Galileo and Compass Grace Xingxin Gao The GPS Lab, Stanford University June 14, 2007 What is Galileo System? Global Navigation Satellite System built by European Union The first Galileo test satellite

More information

UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS

UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS Proceedings of the 5th Annual ISC Research Symposium ISCRS 2011 April 7, 2011, Rolla, Missouri UNDERWATER ACOUSTIC CHANNEL ESTIMATION AND ANALYSIS Jesse Cross Missouri University of Science and Technology

More information

GPS Signal Degradation Analysis Using a Simulator

GPS Signal Degradation Analysis Using a Simulator GPS Signal Degradation Analysis Using a Simulator G. MacGougan, G. Lachapelle, M.E. Cannon, G. Jee Department of Geomatics Engineering, University of Calgary M. Vinnins, Defence Research Establishment

More information

GPS Civil Signal Self-Interference Mitigation During Weak Signal Acquisition

GPS Civil Signal Self-Interference Mitigation During Weak Signal Acquisition IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 12, DECEMBER 2007 5859 GPS Civil Signal Self-Interference Mitigation During Weak Signal Acquisition Yu T. Morton, Mikel Miller, James Tsui, David Lin,

More information

IF ONE OR MORE of the antennas in a wireless communication

IF ONE OR MORE of the antennas in a wireless communication 1976 IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 52, NO. 8, AUGUST 2004 Adaptive Crossed Dipole Antennas Using a Genetic Algorithm Randy L. Haupt, Fellow, IEEE Abstract Antenna misalignment in

More information

It is well known that GNSS signals

It is well known that GNSS signals GNSS Solutions: Multipath vs. NLOS signals GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send their questions to the columnist,

More information

STAP Capability of Sea Based MIMO Radar Using Virtual Array

STAP Capability of Sea Based MIMO Radar Using Virtual Array International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 7, Number 1 (2014), pp. 47-56 International Research Publication House http://www.irphouse.com STAP Capability

More information

Correlators for L2C. Some Considerations

Correlators for L2C. Some Considerations Correlators for L2C Some Considerations Andrew dempster Lockheed Martin With the launch of the first modernized GPS Block IIR satellite in September 2006, GNSS product designers have an additional, fully

More information

Evaluation of L2C Observations and Limitations

Evaluation of L2C Observations and Limitations Evaluation of L2C Observations and Limitations O. al-fanek, S. Skone, G.Lachapelle Department of Geomatics Engineering, Schulich School of Engineering, University of Calgary, Canada; P. Fenton NovAtel

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 82.6 Broadband Wireless Access Working Group Corrections to Initial Ranging in OFDMA PY Date Submitted Source(s) 25-4-22 Tal Kaitz, Ran Yaniv Alvarion Ltd. tal.kaitz@alvarion.com

More information

VOL. 3, NO.11 Nov, 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

VOL. 3, NO.11 Nov, 2012 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. Effect of Fading Correlation on the Performance of Spatial Multiplexed MIMO systems with circular antennas M. A. Mangoud Department of Electrical and Electronics Engineering, University of Bahrain P. O.

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF THE ALAMOUTI STBC BASED DS-CDMA SYSTEM

CHAPTER 4 PERFORMANCE ANALYSIS OF THE ALAMOUTI STBC BASED DS-CDMA SYSTEM 89 CHAPTER 4 PERFORMANCE ANALYSIS OF THE ALAMOUTI STBC BASED DS-CDMA SYSTEM 4.1 INTRODUCTION This chapter investigates a technique, which uses antenna diversity to achieve full transmit diversity, using

More information

Written Exam Channel Modeling for Wireless Communications - ETIN10

Written Exam Channel Modeling for Wireless Communications - ETIN10 Written Exam Channel Modeling for Wireless Communications - ETIN10 Department of Electrical and Information Technology Lund University 2017-03-13 2.00 PM - 7.00 PM A minimum of 30 out of 60 points are

More information

Detailed Analysis of the Impact of the Code Doppler on the Acquisition Performance of New GNSS Signals

Detailed Analysis of the Impact of the Code Doppler on the Acquisition Performance of New GNSS Signals Detailed Analysis of the Impact of the Code Doppler on the Acquisition Performance of New GNSS Signals Myriam Foucras, Olivier Julien, Christophe Macabiau, Bertrand Ekambi To cite this version: Myriam

More information

Galileo E1 OS/SoL Acquisition, Tracking and Data Demodulation Performances for Civil Aviation

Galileo E1 OS/SoL Acquisition, Tracking and Data Demodulation Performances for Civil Aviation Galileo E1 OS/SoL Acquisition, Tracking and Data Demodulation Performances for Civil Aviation Olivier Julien, Christophe Macabiau Laboratoire de Traitement du Signal et des Télécommunications Ecole Nationale

More information

Comparison of Beamforming Techniques for W-CDMA Communication Systems

Comparison of Beamforming Techniques for W-CDMA Communication Systems 752 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 Comparison of Beamforming Techniques for W-CDMA Communication Systems Hsueh-Jyh Li and Ta-Yung Liu Abstract In this paper, different

More information

2 INTRODUCTION TO GNSS REFLECTOMERY

2 INTRODUCTION TO GNSS REFLECTOMERY 2 INTRODUCTION TO GNSS REFLECTOMERY 2.1 Introduction The use of Global Navigation Satellite Systems (GNSS) signals reflected by the sea surface for altimetry applications was first suggested by Martín-Neira

More information

Multiple Antenna Processing for WiMAX

Multiple Antenna Processing for WiMAX Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery

More information

Probability of Secondary Code Acquisition for Multi-Component GNSS Signals

Probability of Secondary Code Acquisition for Multi-Component GNSS Signals Author manuscript, published in "EWGNSS 23, 6th European Workshop on GNSS Signals and Signal Processing, Munich : Germany (23)" Probability of Secondary Code Acquisition for Multi-Component GNSS Signals

More information

(Refer Slide Time: 00:01:31 min)

(Refer Slide Time: 00:01:31 min) Wireless Communications Dr. Ranjan Bose Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture No. # 32 Equalization and Diversity Techniques for Wireless Communications (Continued)

More information

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference

A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference 2006 IEEE Ninth International Symposium on Spread Spectrum Techniques and Applications A Soft-Limiting Receiver Structure for Time-Hopping UWB in Multiple Access Interference Norman C. Beaulieu, Fellow,

More information

GNSS Spoofing, Jamming, and Multipath Interference Classification using a Maximum-Likelihood Multi-Tap Multipath Estimator

GNSS Spoofing, Jamming, and Multipath Interference Classification using a Maximum-Likelihood Multi-Tap Multipath Estimator GNSS Spoofing, Jamming, and Multipath Interference Classification using a Maximum-Likelihood Multi-Tap Multipath Estimator Jason N. Gross, West Virginia University Todd E. Humphreys, University of Texas

More information

Adaptive Antenna Array Processing for GPS Receivers

Adaptive Antenna Array Processing for GPS Receivers Adaptive Antenna Array Processing for GPS Receivers By Yaohua Zheng Thesis submitted for the degree of Master of Engineering Science School of Electrical & Electronic Engineering Faculty of Engineering,

More information

Surviving and Operating Through GPS Denial and Deception Attack. Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems

Surviving and Operating Through GPS Denial and Deception Attack. Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems Surviving and Operating Through GPS Denial and Deception Attack Nathan Shults Kiewit Engineering Group Aaron Fansler AMPEX Intelligent Systems How GPS Works GPS Satellite sends exact time (~3 nanoseconds)

More information

By Nour Alhariqi. nalhareqi

By Nour Alhariqi. nalhareqi By Nour Alhariqi nalhareqi - 2014 1 Outline Basic background Research work What I have learned nalhareqi - 2014 2 DS-CDMA Technique For years, direct sequence code division multiple access (DS-CDMA) appears

More information

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS

SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS Dr. Ali Muqaibel SPREAD SPECTRUM (SS) SIGNALS FOR DIGITAL COMMUNICATIONS VERSION 1.1 Dr. Ali Hussein Muqaibel 1 Introduction Narrow band signal (data) In Spread Spectrum, the bandwidth W is much greater

More information

OPTIMAL POINT TARGET DETECTION USING DIGITAL RADARS

OPTIMAL POINT TARGET DETECTION USING DIGITAL RADARS OPTIMAL POINT TARGET DETECTION USING DIGITAL RADARS NIRMALENDU BIKAS SINHA AND M.MITRA 2 College of Engineering & Management, Kolaghat, K.T.P.P Township, Purba Medinipur, 727, W.B, India. 2 Bengal Engineering

More information

Comparative Analysis of the BER Performance of WCDMA Using Different Spreading Code Generator

Comparative Analysis of the BER Performance of WCDMA Using Different Spreading Code Generator Science Journal of Circuits, Systems and Signal Processing 2016; 5(2): 19-23 http://www.sciencepublishinggroup.com/j/cssp doi: 10.11648/j.cssp.20160502.12 ISSN: 2326-9065 (Print); ISSN: 2326-9073 (Online)

More information

124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997

124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997 124 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 1, JANUARY 1997 Blind Adaptive Interference Suppression for the Near-Far Resistant Acquisition and Demodulation of Direct-Sequence CDMA Signals

More information

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss

EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss EENG473 Mobile Communications Module 3 : Week # (12) Mobile Radio Propagation: Small-Scale Path Loss Introduction Small-scale fading is used to describe the rapid fluctuation of the amplitude of a radio

More information

SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR

SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR SIGNAL MODEL AND PARAMETER ESTIMATION FOR COLOCATED MIMO RADAR Moein Ahmadi*, Kamal Mohamed-pour K.N. Toosi University of Technology, Iran.*moein@ee.kntu.ac.ir, kmpour@kntu.ac.ir Keywords: Multiple-input

More information

Miniaturized GPS Antenna Array Technology and Predicted Anti-Jam Performance

Miniaturized GPS Antenna Array Technology and Predicted Anti-Jam Performance Miniaturized GPS Antenna Array Technology and Predicted Anti-Jam Performance Dale Reynolds; Alison Brown NAVSYS Corporation. Al Reynolds, Boeing Military Aircraft And Missile Systems Group ABSTRACT NAVSYS

More information

A Multiple COTS Receiver GNSS Spoof Detector -- Extensions

A Multiple COTS Receiver GNSS Spoof Detector -- Extensions University of Rhode Isl DigitalCommons@URI Department of Electrical, Computer, Biomedical Engineering Faculty Publications Department of Electrical, Computer, Biomedical Engineering 4 A Multiple COTS Receiver

More information

An ultra-low-cost antenna array frontend for GNSS application

An ultra-low-cost antenna array frontend for GNSS application International Collaboration Centre for Research and Development on Satellite Navigation Technology in South East Asia An ultra-low-cost antenna array frontend for GNSS application Thuan D. Nguyen, Vinh

More information

Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence

Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence Detection of an LTE Signal Based on Constant False Alarm Rate Methods and Constant Amplitude Zero Autocorrelation Sequence Marjan Mazrooei sebdani, M. Javad Omidi Department of Electrical and Computer

More information

On Using Channel Prediction in Adaptive Beamforming Systems

On Using Channel Prediction in Adaptive Beamforming Systems On Using Channel rediction in Adaptive Beamforming Systems T. R. Ramya and Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology Madras, Chennai - 600 036, India. Email:

More information

Symbol Error Probability Analysis of a Multiuser Detector for M-PSK Signals Based on Successive Cancellation

Symbol Error Probability Analysis of a Multiuser Detector for M-PSK Signals Based on Successive Cancellation 330 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 2, FEBRUARY 2002 Symbol Error Probability Analysis of a Multiuser Detector for M-PSK Signals Based on Successive Cancellation Gerard J.

More information

Assessing & Mitigation of risks on railways operational scenarios

Assessing & Mitigation of risks on railways operational scenarios R H I N O S Railway High Integrity Navigation Overlay System Assessing & Mitigation of risks on railways operational scenarios Rome, June 22 nd 2017 Anja Grosch, Ilaria Martini, Omar Garcia Crespillo (DLR)

More information

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN

More information

Impact of Personal Privacy Devices for WAAS Aviation Users

Impact of Personal Privacy Devices for WAAS Aviation Users Impact of Personal Privacy Devices for WAAS Aviation Users Grace Xingxin Gao, Kazuma Gunning, Todd Walter and Per Enge Stanford University, USA ABSTRACT Personal privacy devices (PPDs) are low-cost jammers

More information

Robust GPS-Based Timing for Phasor Measurement Units: A Position-Information- Aided Approach

Robust GPS-Based Timing for Phasor Measurement Units: A Position-Information- Aided Approach Robust GPS-Based Timing for Phasor Measurement Units: A Position-Information- Aided Approach Daniel Chou, Liang Heng, and Grace XingXin Gao, University of Illinois Urbana-Champaign BIOGRAPHIES Daniel Chou

More information

Performance Study of FLL Schemes for a Successful Acquisition-to-Tracking Transition

Performance Study of FLL Schemes for a Successful Acquisition-to-Tracking Transition Performance Study of FLL Schemes for a Successful Acquisition-to-Tracking Transition Myriam Foucras, Bertrand Ekambi, Ulrich Ngayap, Jen Yu Li, Olivier Julien, Christophe Macabiau To cite this version:

More information

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE FADING CHANNEL CHARACTERIZATION AND MODELING

CALIFORNIA STATE UNIVERSITY, NORTHRIDGE FADING CHANNEL CHARACTERIZATION AND MODELING CALIFORNIA STATE UNIVERSITY, NORTHRIDGE FADING CHANNEL CHARACTERIZATION AND MODELING A graduate project submitted in partial fulfillment of the requirements For the degree of Master of Science in Electrical

More information

COMMUNICATION SYSTEMS

COMMUNICATION SYSTEMS COMMUNICATION SYSTEMS 4TH EDITION Simon Hayhin McMaster University JOHN WILEY & SONS, INC. Ш.! [ BACKGROUND AND PREVIEW 1. The Communication Process 1 2. Primary Communication Resources 3 3. Sources of

More information

GNSS Jamming: A Short Survival Guide

GNSS Jamming: A Short Survival Guide GNSS Jamming: A Short Survival Guide Daniele Borio 15-16 November 2016 International Technical Symposium on Navigation and Timing (ITSN 2016) The European Commission s science and knowledge service 1 Joint

More information

Does Anyone Really Know What Time It Is? Dr. Michael L. Cohen, MITRE October 15, 2013

Does Anyone Really Know What Time It Is? Dr. Michael L. Cohen, MITRE October 15, 2013 Does Anyone Really Know What Time It Is? Dr. Michael L. Cohen, MITRE October 15, 2013 2013 The MITRE Corporation. All rights reserved Approved for Public Release; Distribution Unlimited 13-3392. The Problem:

More information

Lecture 9: Spread Spectrum Modulation Techniques

Lecture 9: Spread Spectrum Modulation Techniques Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth

More information

Prototype Software-based Receiver for Remote Sensing using Reflected GPS Signals. Dinesh Manandhar The University of Tokyo

Prototype Software-based Receiver for Remote Sensing using Reflected GPS Signals. Dinesh Manandhar The University of Tokyo Prototype Software-based Receiver for Remote Sensing using Reflected GPS Signals Dinesh Manandhar The University of Tokyo dinesh@qzss.org 1 Contents Background Remote Sensing Capability System Architecture

More information

Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array

Design and Experiment of Adaptive Anti-saturation and Anti-jamming Modules for GPS Receiver Based on 4-antenna Array Advances in Computer Science Research (ACRS), volume 54 International Conference on Computer Networks and Communication Technology (CNCT2016) Design and Experiment of Adaptive Anti-saturation and Anti-jamming

More information

Towards a Practical Single Element Null Steering Antenna

Towards a Practical Single Element Null Steering Antenna Towards a Practical Single Element Null Steering Antenna Yu-Hsuan Chen, Fabian Rothmaier, Stanford University Dennis Akos, University of Colorado at Boulder Sherman Lo and Per Enge, Stanford University

More information

Abstract. Marío A. Bedoya-Martinez. He joined Fujitsu Europe Telecom R&D Centre (UK), where he has been working on R&D of Second-and

Abstract. Marío A. Bedoya-Martinez. He joined Fujitsu Europe Telecom R&D Centre (UK), where he has been working on R&D of Second-and Abstract The adaptive antenna array is one of the advanced techniques which could be implemented in the IMT-2 mobile telecommunications systems to achieve high system capacity. In this paper, an integrated

More information

CHAPTER 2 WIRELESS CHANNEL

CHAPTER 2 WIRELESS CHANNEL CHAPTER 2 WIRELESS CHANNEL 2.1 INTRODUCTION In mobile radio channel there is certain fundamental limitation on the performance of wireless communication system. There are many obstructions between transmitter

More information

Autonomous Spoofing Detection and Mitigation with a Miniaturized Adaptive Antenna Array

Autonomous Spoofing Detection and Mitigation with a Miniaturized Adaptive Antenna Array Autonomous Spoofing Detection and Mitigation with a Miniaturized Adaptive Antenna Array Andriy Konovaltsev 1, Stefano Caizzone 1, Manuel Cuntz 1, Michael Meurer 1,2 1 Institute of Communications and Navigation,

More information

Design of Peak-finding Algorithm on Acquisition of Weak GPS Signals

Design of Peak-finding Algorithm on Acquisition of Weak GPS Signals 006 IEEE Conference on Systems, Man, and Cybernetics October 8-11, 006, Taipei, Taiwan Design of Peak-finding Algorithm on Acquisition of Weak GPS Signals W. L. Mao, A. B. Chen, Y. F. Tseng, F. R. Chang,

More information

for Single Introduction interference. Radio Frequency Signal Quality Monitor three main Vector Based Fourier Transform radiate the the targett ψ(t)

for Single Introduction interference. Radio Frequency Signal Quality Monitor three main Vector Based Fourier Transform radiate the the targett ψ(t) JAST, Vol. 10, No. 2, pp. 9-16 Iranian Aerospace Society, Summer-Fall 2013 A Wavelet-based Spoofi ing Error Compensation Technique for Single Frequency GPS Stationary Receiver A. R. Baziar 1, M. Moazedi

More information

PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTERFERENCE CORRUPTED GPS DATA IN MOBILE HANDSETS

PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTERFERENCE CORRUPTED GPS DATA IN MOBILE HANDSETS PERFORMANCE ASSESSMENT OF MAXIMUM LIKELIHOOD IN THE DETECTION OF CARRIER INTERFERENCE CORRUPTED GPS DATA IN MOBILE HANDSETS Taher AlSharabati Electronics and Communications Engineering Department, Al-Ahliyya

More information

Spread Spectrum Techniques

Spread Spectrum Techniques 0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic

More information

UCGE Reports. Number GNSS Interference Mitigation Using Antenna Array Processing. Saeed Daneshmand. Department of Geomatics Engineering

UCGE Reports. Number GNSS Interference Mitigation Using Antenna Array Processing. Saeed Daneshmand. Department of Geomatics Engineering UCGE Reports Number 20376 Department of Geomatics Engineering GNSS Interference Mitigation Using Antenna Array Processing by Saeed Daneshmand April 2013 UNIVERSITY OF CALGARY GNSS Interference Mitigation

More information

Intelligent Approach to Improve Standard CFAR Detection in non-gaussian Sea Clutter THESIS

Intelligent Approach to Improve Standard CFAR Detection in non-gaussian Sea Clutter THESIS Intelligent Approach to Improve Standard CFAR Detection in non-gaussian Sea Clutter THESIS Presented in Partial Fulfillment of the Requirements for the Degree Master of Science in the Graduate School of

More information

Research Article Simulation and Performance Evaluations of the New GPS L5 and L1 Signals

Research Article Simulation and Performance Evaluations of the New GPS L5 and L1 Signals Hindawi Wireless Communications and Mobile Computing Volume 27, Article ID 749273, 4 pages https://doi.org/.55/27/749273 Research Article Simulation and Performance Evaluations of the New GPS and L Signals

More information

A Multicarrier CDMA Based Low Probability of Intercept Network

A Multicarrier CDMA Based Low Probability of Intercept Network A Multicarrier CDMA Based Low Probability of Intercept Network Sayan Ghosal Email: sayanghosal@yahoo.co.uk Devendra Jalihal Email: dj@ee.iitm.ac.in Giridhar K. Email: giri@ee.iitm.ac.in Abstract The need

More information

Vector tracking loops are a type

Vector tracking loops are a type GNSS Solutions: What are vector tracking loops, and what are their benefits and drawbacks? GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are

More information

Signal Quality Checks For Multipath Detection in GNSS

Signal Quality Checks For Multipath Detection in GNSS Signal Quality Checks For Multipath Detection in GNSS Diego M. Franco-Patiño #1, Gonzalo Seco-Granados *2, and Fabio Dovis #3 # Dipartimento di Elettronica e Telecomunicazioni, Politecnico di Torino Corso

More information

REPORT ITU-R M Impact of radar detection requirements of dynamic frequency selection on 5 GHz wireless access system receivers

REPORT ITU-R M Impact of radar detection requirements of dynamic frequency selection on 5 GHz wireless access system receivers Rep. ITU-R M.2034 1 REPORT ITU-R M.2034 Impact of radar detection requirements of dynamic frequency selection on 5 GHz wireless access system receivers (2003) 1 Introduction Recommendation ITU-R M.1652

More information

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA By Hamed D. AlSharari College of Engineering, Aljouf University, Sakaka, Aljouf 2014, Kingdom of Saudi Arabia, hamed_100@hotmail.com

More information

SEVERAL diversity techniques have been studied and found

SEVERAL diversity techniques have been studied and found IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 11, NOVEMBER 2004 1851 A New Base Station Receiver for Increasing Diversity Order in a CDMA Cellular System Wan Choi, Chaehag Yi, Jin Young Kim, and Dong

More information

Real-Time Software Receiver Using Massively Parallel

Real-Time Software Receiver Using Massively Parallel Real-Time Software Receiver Using Massively Parallel Processors for GPS Adaptive Antenna Array Processing Jiwon Seo, David De Lorenzo, Sherman Lo, Per Enge, Stanford University Yu-Hsuan Chen, National

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2005 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading

ECE 476/ECE 501C/CS Wireless Communication Systems Winter Lecture 6: Fading ECE 476/ECE 501C/CS 513 - Wireless Communication Systems Winter 2004 Lecture 6: Fading Last lecture: Large scale propagation properties of wireless systems - slowly varying properties that depend primarily

More information

Stationary, Cyclostationary and Nonstationary Analysis of GNSS Signal Propagation Channel Shashank Satyanarayana

Stationary, Cyclostationary and Nonstationary Analysis of GNSS Signal Propagation Channel Shashank Satyanarayana Stationary, Cyclostationary and Nonstationary Analysis of GNSS Signal Propagation Channel Shashank Satyanarayana Position, Location And Navigation (PLAN) Group Department of Geomatics Engineering, University

More information

Effect of Imperfect Channel Estimation on Transmit Diversity in CDMA Systems. Xiangyang Wang and Jiangzhou Wang, Senior Member, IEEE

Effect of Imperfect Channel Estimation on Transmit Diversity in CDMA Systems. Xiangyang Wang and Jiangzhou Wang, Senior Member, IEEE 1400 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 53, NO. 5, SEPTEMBER 2004 Effect of Imperfect Channel Estimation on Transmit Diversity in CDMA Systems Xiangyang Wang and Jiangzhou Wang, Senior Member,

More information

A Positon and Orientation Post-Processing Software Package for Land Applications - New Technology

A Positon and Orientation Post-Processing Software Package for Land Applications - New Technology A Positon and Orientation Post-Processing Software Package for Land Applications - New Technology Tatyana Bourke, Applanix Corporation Abstract This paper describes a post-processing software package that

More information

VHF Radar Target Detection in the Presence of Clutter *

VHF Radar Target Detection in the Presence of Clutter * BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 1 Sofia 2006 VHF Radar Target Detection in the Presence of Clutter * Boriana Vassileva Institute for Parallel Processing,

More information

RECEIVER DEVELOPMENT, SIGNALS, CODES AND INTERFERENCE

RECEIVER DEVELOPMENT, SIGNALS, CODES AND INTERFERENCE Presentation for: 14 th GNSS Workshop November 01, 2007 Jeju Island, Korea RECEIVER DEVELOPMENT, SIGNALS, CODES AND INTERFERENCE Stefan Wallner, José-Ángel Ávila-Rodríguez, Guenter W. Hein Institute of

More information

Satellite-Induced Multipath Analysis on the Cause of BeiDou Code Pseudorange Bias

Satellite-Induced Multipath Analysis on the Cause of BeiDou Code Pseudorange Bias Satellite-Induced Multipath Analysis on the Cause of BeiDou Code Pseudorange Bias Hailong Xu, Xiaowei Cui and Mingquan Lu Abstract Data from previous observation have shown that the BeiDou satellite navigation

More information