GNSS


Protecting GNSS against intentional interference

Apr 2023 | No Comment

This paper offers a state-of-the-art review of several proposed methods for interference detection and mitigation with solutions ranging from traditional to machine learning-based approaches.

Arul Elango

Department of Computer Science, University of Helsinki, Finland

Ahmed Al-Tahmeesschi

Department of Computer Science, University of Helsinki, Finland

Mikko Saukkoriipi

Department of Computer Science, University of Helsinki, Finland

Titti Malmivirta

Department of Computer Science, University of Helsinki, Finland

Laura Ruotsalainen

Department of Computer Science, University of Helsinki, Finland

Abstract

The vulnerabilities associated with modern systems relying on Global Navigation Satellite Systems (GNSS) due to intentional and unintentional interference is an increasing threat. Since radio frequency interference (RFI) significantly degrades the performance of a GNSS receiver. Several traditional critical applications such as aviation, maritime and rail transport systems to more recent applications such as autonomous vehicles, can be severely affected by such undetected nor mitigated RFIs. More- over, critical infrastructures such as power supply and money transfer, are becoming more and more dependent on the accurate timing information provided by GNSS. Thus, interference detection and management techniques are crucial to be utilised in order to reduce interference effects. This paper offers a state-of-theart review of several proposed methods for interference detection and mitigation with solutions ranging from traditional to machine learning-based approaches. In addition, to be able to characterise the RFI threats and develop mitigation techniques, it is essential to monitor RFI systematically and share recorded data with interested entities. Therefore, three GNSS threat monitoring systems are briefly described. This White paper is a compilation of the seminar presentations given at a seminar on ”Protecting GNSS against intentional interference” in March 2022 in Finland.

Introduction

Modern society, especially its critical infrastructure, is becoming more and more reliant on accurate and reliable Position, Velocity and Timing (PVT) information obtained using Global Navigation Satellite Systems (GNSS). GNSS signals travel more than 20000 km from the satellite signal transmitter in space to the user receiver on Earth. Radio waves disperse energy as they propagate; therefore the signals are very weak and vulnerable to interference when they reach the receiver. Interference caused by the atmosphere and signal reflections on the ground have been active research areas already for decades. Intentional interference, namely operations deliberately performed by humans for interfering with GNSS signals, is a continuously increasing problem. Its incidence is anticipated to increase with the increase of number and relevance of the applications relying on GNSS.

Basics of GNSS positioning

GNSS encompass the United States Global Positioning System (GPS), the Russian GLONASS, Chinese COMPASS/BeiDou and the European Galileo systems. In GNSS based positioning the traverse time of a signal from the satellite to the user receiver antenna is estimated. When this time is multiplied by the speed of light a geometric range between the satellite and the user is obtained. In an ideal case, measurements from three satellites would provide an accurate three dimensional position of the user. In reality, the measurements are erroneous, the main error source being the timing errors between the receiver clock and the satellite clock from the system time. Therefore the measured range is called the pseudorange. The satellite clocks are precise and synchronized by the ground control segment of the system. However, the clocks in the user receivers are lowcost with typically a large timing error which has to be estimated as a parameter in the navigation solution. Observations from at least four satellites are needed for three dimensional positioning, namely the fourth observation is used for resolving the receiver clock error. Any electromagnetic source interacting with the signals is interfering with the previously mentioned process of estimating the traverse time. In the atmosphere, mainly in the ionospheric layer, electron concentration causes delays in signal propagation. Signal reflections on the ground, when added to the line of-sight signals from the satellites, cause self-interference to the signal called multipath. Intentional interference is the most harmful type of interference because it is specifically designed to interfere with GNSS operations and will be discussed a bit in more detail in the following section and throughout this document.

Intentional Interference

Intentional interference, called either jamming or spoofing depending on the method of implementation and effect on the GNSS signal, deteriorates the obtained PVT solution significantly or completely denies its computation. Jam ming means transmission of radio frequency energy at some of the GNSS frequency bands which masks GNSS signals at the related band with noise and thereby prevent the PVT computation [Dovis, 2015]. Although the use of jammers, i.e., equipment used for transmitting a jamming signal, are illegal in most of the countries, many people still use them for the protection of personal privacy. Personal privacy protection in this context means preventing the operation of GNSS receiver that could track its own location and transmit the information to for example the employer monitoring the working time or place [Pullen and Gao, 2012]. Jammers transmit signals with power and characteristics disturbing acquisition and tracking of GNSS signals [Mitch et al., 2011]. The use of easyaccess low-cost jammers results in degraded positioning accuracy or total loss of GNSS signals and, therefore, may cause serious damage if the jamming signals are not properly detected and their effects mitigated. In addition to privacy protection purposes, intentional interference is caused by political activists with political agenda, cybercriminals for financial purposes and foreign states to damage others’ systems ([Richter, 2022], presentation). These latter groups doing for criminal purposes have usually higher capabilities and therefore create more significant threat for the GNSS dependent systems. Spoofing, in turn, means the malicious transmission of counterfeit GNSS-like signals and fools the receiver to output an erroneous PVT solution. The greatest danger of spoofing is that its occurrence can be difficult to detect. Fortunately, it is so difficult to be implemented unobtrusively that it cannot be done with off-the-shelf devices without special expertise. In order to be able to create a credible spoofing attack one must be able to generate true GNSS signals including data, modulation and timing, maintain time synchronization close to true GNSS time and adapt the signal power levels to match those of the true signals ([S ̈oderholm, 2022], presentation).

It should be noted, that some radio devices, such as amateur radio and mili tary systems, cause natural ”jamming” for the GNSS signals ([S ̈oderholm, 2022], presentation). In addition to interference, GNSS systems can fail such as Galileo ground system atomic clock failure in December 2020, have created interference to GNSS ([Richter, 2022], presentation).

Contents and Organization of this White Paper

In order to secure the critical infrastructure and assure continuous availability of GNSS, all forms of interference have to be detected and their impact on GNSS-based systems mitigated. This White Paper been compiled based on presentations given at the ”Protecting GNSS against intentional interference” seminar, held on 24.3.2022 at the University of Helsinki. The presentations discussed the stateof-the-art activities related to GNSS vulnerabilities in Nordic countries.

The impact and detection of interference has been discussed widely in the literature, e.g. [Guo et al., 2021] for ionospheric effects, [Borio et al., 2013] for jamming and [Psiaki et al., 2014] for spoofing. However, current detection methods are not sufficient for the ever-evolving interference attacks and society’s growing dependence on GNSS. Therefore, Section 2 of this document will look into most recent methods for detecting the interference, unintentional (Section 2.1) and intentional (Section 2.2). Section 2.2 will also go through methods for identifying the specific jamming device in order to encounter its use. Counter- measures to protect the critical infrastructure will be discussed in Section 3 and the deployment of large scale interference monitoring infrastructure in Section 4. The document will summarize the main findings in Section 5.

Interference detection

A GNSS radio receiver usually consists of two main parts: the analog and the digital part. The analog part includes the antenna and the radio front-end (RFE). The RFE is responsible for amplifying the weak signal received by the antenna, filtering it by a band-pass filter to minimize out-of-band contributions and down-converting it to Intermediate Frequency (IF). Finally, the Analog-to-Digital Converter (ADC) converts the analog signal to a digital version, with an Automatic Gain Control (AGC) lower quantization losses apparent in the digitization process by automatically adjusting the signal dynamics.

The digital part of the GNSS receiver is processing the digitized signal to obtain a PVT solution. Figure 1 shows the GNSS receiver’s digital processing blocks. Acquisition block detects the signal presence and gives a rough estimate of the two parameters required in the process, code delay and Doppler shift. When these are obtained, processing transfers to the tracking stage, where the code delay and Doppler shift estimates are fined down. Tracking outputs are monitored by the signal monitoring block, which also computes the signal quality measures, Carrier-to-Noise (C/N0 ) values. Tracking provides signal observations called carrier phases and pseudoranges, which together with the navigation data information (satellite parameters and time of the signal transmission) packed into the signal, are used for computing the PVT solution at the navigation block.

Detecting unintentional interference

As discussed before, concentration of free electrons in the atmosphere, specifically ionosphere, degrade the GNSS signal and therefore their effect has to be compensated for. When the positioning solution may be computed using signals at more than one GNSS frequency band, the ionospheric effect can be cancelled out, and in the case of only single frequency it can be modelled and its impact can be reduced. However, sometimes existing electron density irregularities disrupt the signal propagation and introduce scintillation, which means fluctuating signal’s amplitude and phase [Dovis, 2015]. The extent and effect of scintillation is dependent on solar and geomagnetic activity, geographical location, time and signal frequency. For example day and night variation on the electron density may be 100 fold, and 10 fold according to solar cycle ([Kauristie, 2022], presentation). The most feasible method for detecting GNSS scintillation is the use of a dense GNSS receiver network, where the network GNSS stations are static and provide scintillation indices and other observables indicating the signal quality. Some networks provide also near-real-time data, for both research and operational use.

Detecting intentional interference

Jamming deteriorates the GNSS signal. Figure 2 shows the spectrum (left) of the original GNSS signal (top) and jammed signal (bottom) and time-frequency plots for the signals (right), respectively. Detection of the presence of a jam ming signal is crucial for being able to protect the GNSS signal reception and provision of the PVT solution. Interference detection methods can be classified into domain-specific techniques and generic techniques. Domain-specific refers to implementation of methods in specific receiver stage (front-end, acquisition, tracking or navigation techniques) ([Lohan, 2022], presentation). The front-end specific methods include for example monitoring the AGC level changes, acquisition looking at time based and frequency-based transforms, tracking monitoring the C/N0 levels and navigation correlation of propagation dependent observables and consistency checks With additional sensors. Generic techniques include techniques like using machine learning for anomaly detection or radio frequency fingerprinting.

Jammer fingerprinting

Radio frequency fingerprinting refers to identifying radio transmitters based on unique signal distortions. The distortions are caused by irregularities in hardware components in signal processing chains. The distortions are unique to each device, which makes it possible to use radio frequency fingerprinting to detect spoofing ([Lohan, 2022], presentation) as well as identify individual jamming devices. While commonly used cheap jammers tend to not have very complex signal processing chains, the signals from similar jammer devices can and do still vary. Machine learning has provided good performance in classifying individual jammers ([Malmivirta, 2022].

In addition to identifying the sources of interference, it is also important to be able to localize them or find the signal direction in order to stop such harmful activities. Multi-antenna arrays can be used for localization or direction finding ([Lohan, 2022], presentation). An example of jammer direction sensing was presented by Stefan S ̈oderholm ([S ̈oderholm, 2022], presentation). Dual-antenna receiver was placed on a highway with several lanes. Direction detection method used was based on power changes in signals as a function of time. This was done by directing one antenna to face left figure 3 so that it received stronger signals when interference source was approaching from left. After the signal source has passed the antenna the signal power level decreases rapidly. This is due to the use of a tilted professional grade chokering antenna, which is implemented in a way that it blocks the signals arriving from the below the antenna. However, as the antenna is tilted, the ”below” is actually pointing to right of the figure.

Direction of the source can be seen from power changes in signals as seen in figure 4. Upper graph in figure 4 shows the signal power as a function of time when interference source is carried by a truck arriving from the left, where we consider the left side of the figure being east direction. The figure shows that when the interference source approaches the antenna, the signal power level rises slowly. Same can be seen in lower graph of figure 4 plotting the change of the jamming signal power level when the source is westbound.

GNSS anomaly detection

Anomaly means different or abnormal, in GNSS domain we can consider anomalies all features in the signal that are caused by a signal degradation source. Thereby, GNSS anomaly detection means the detection of both unintentional and intentional interference. The goal is to both observe that something is wrong with the signal and in the best case to classify its source. At present, anomaly detection provides promising results when machine learning and especially deep learning based methods are used.

The conventional deep learning methods, usually based on neural networks, ignore the temporal domain, which is not very feasible in the case of navigation data. Long Short Term Memory (LSTM) methods are so called recurrent models, which process the data as time sequences. An autoencoder is an unsupervised neural network able to learn efficient codings of unlabelled data. It learns a representation for the input data by training the neural network to ignore noise. Autoencoder is comprised of an encoder function, which converts the input data into a different representation, and a decoder function, which converts the new representation back into the original format. Autoencoders may be realized with various neural network architectures. To accommodate for temporal correlations in the data, the encoder and decoder are implemented using the LSTM architecture. In anomaly detection, encoder section first modifies the data into a time-dependent sequence, preserving only the most important features of the data. The decoder then modifies the data back to the original format. This back-and-forth editing will result in an error that will be minimized. The training data is clean, meaning it has no anomalies. If a beforehand set threshold is exceeded when the algorithm uses real data, anomalies are declared.

In general, part of the GNSS signal is considered to be anomalous in comparison to the whole GNSS signal [S. Wang, 2021]. In addition, for the time domain representation of the GNSS signal, signal behaviour changes and cannot be easily visualized. Therefore, frequency domain representation is utilized for anomaly detection ([Elango, 2022], presentation). The method which is specific to deal with time series is the LSTM which falls in the category of supervised deep learning method [Farshchi et al., 2018].

An autoencoder network comprises of two parts: an input layer (endcoder) and an output layer (decoder). The encoder block compresses the N-dimensional GNSS data into an X-dimensional code (where X < N), which contains most of the features carried in the input. The decoder, reconstructs the input from the lowerdimensional code (also refereed to in the literature as latent space representation). The way one can use trained autoencoders for anomaly detection is that in normal conditions, when normal signal is fed into the network, it can only reconstruct the signal that does not include abnormalities. If the error between the original signal and the reconstructed signal is small then the data containing anomalies can be used to recognize the changes in the original signal. In figure 5 initially the signal of interest (GPS signal) is fed to the network so that the output layer could be able to reproduce the same GPS signal but when jamming signal is included (continuous wave interference (CWI) in our case) the root mean square error (RMSE) between the input and the output is calculated if that error exceeds the predefined threshold then it is spotted as anomaly region as indicated in red coloured region at the top right hand side of figure 5.

GNSS interference research and development requires the use of simulated data. Many of the interference events are rare and difficult to be captured from the real signal data, and as the research is still actively ongoing their identification and correct classification might not be doable. Orolia Skydel GNSS signal simulator ([Burke, 2022], presentation) provides not only simulating the different kinds of jamming, spoofing and multipath signals but also support for multiple technologies such as GNSS Augmentations, RTK, Low Earth Orbiting (LEO) Satellite simulations. Orolia Skydel uses Graphical Processing Unit (GPU) accelerated computing to create GNSS/ RF signals digitally and software defined radios (SDR) to output the RF. Another salient feature of this simulator is that it provides an intuitive application program interface (API) to configure the simulator.

Counter measures for interference

GNSS interference mitigation techniques can be roughly divided into five categories; signal processing means [Ferrara et al., 2018] antenna configuration- based methods, encryption of signals, sensor integration, and system deployment related approaches. This section discusses the four first categories, system deployment related approaches, namely interference monitoring infrastructures, are discussed in the following section.

Signal processing based interference mitigation

Signal processing based interference mitigation may be grouped into frequencydomain and time-domain techniques [Dovis, 2015]. Interference mitigation using signal processing means, namely filtering, is best to be performed in the frequency-domain. Two of the most feasible filtering methods are called Notch and Frequency Domain Adapt Filtering (FDAF) [Falletti et al., 2020]. They are both able to adjust at some extent to the situation, where the interfering signal changes its spectral characteristics in time. Although the processing of the signal in the time-domain is feasible for the interference detection purposes, it often is not for mitigation as the interfering signal is usually mixed with the original signal.

Antenna configuration based mitigation

Antenna polarization defines the geometrical orientation of the oscillations of the wave. To maximize the received signal strength, the polarization of the receiving GNSS antenna must match the transmitted signal. GPS satellites transmit signals in the form of Right-Hand Circularly Polarized (RHCP) wave and the polarization may change from right to left when the signal is reflected from obstacles. As a result, multipath effects will be diminished in the pre-processing stage. The observation of GPS signal using right hand and left-hand circular polarization antennas will help us better understand the characteristics of multipath GNSS signals and thus mitigate their effects [Manandhar et al., 2004]. This is achieved by introducing left hand polarization to handle NLOS signals to nullify the effects of multipath. Nevertheless, the mitigation effectiveness on satellite visibility and may not be enough for treating all the kind of threats. In the case of jamming, adaptive antenna systems and null steering (the use of spatial signal processing for nulling the interference) antennas provide mitigation ([Richter, 2022], presentation). Spoofing mitigation may be done by using antenna arrays for angle of arrival (AoA) detection and thereby evaluating if the signals are really coming from the space or falsely from the ground.

European Union’s Galileo

New GNSS systems provide system based means for interference mitigation. The best example of such is Europe’s own Galileo system’s Public Regulated Service (PRS) which will provide the European authorities protection against GNSS spoofing.

Galileo is an entirely civilian global navigation system managed by the European Union (EU) and the European Space Agency (ESA). In the management of Galileo, the EU is responsible for the legal and political issues, and ESA manages the technological development. Galileo has been designed to be open, global, and highly reliable while being completely independent of the other satellite systems. The Galileo project contracts were signed in 1999, and the declaration of Galileo’s initial service happened in December 2016. While Galileo is an independent satellite navigation system, it was not designed to replace or compete with other global navigation systems. Instead, it is designed to be interoperable with them while offering complete sovereignty.

Once Galileo is fully operational, it will offer four services [Gal, 2021]. These are Open Service (OS), High Accuracy Service (HAS), Public Regulated Service (PRS), and the Search and Rescue Service (SAR). OS is the conventional navigation service provided by Galileo globally and free of charge and directed at mass markets requiring meter level accuracy. HAS, on the other hand, is aimed at professional or commercial applications requiring centimeter level performance, which is higher than offered by the OS. It will be offered globally and free of charge.

SAR/Galileo is EU’s contribution to Cospas-Sarsat, an international satellitebased search and rescue distress alert detection system. SAR/Galileo is two-way, meaning it forwards the distress signals to the relevant rescue authorities and returns an automated acknowledgement message back to the user in distress [Sar, 2021]. The carrier frequencies of OS, HAS and PRS are introduced in table 2. High precision and reliable timing are critical in satellite navigation. To meet these requirement, each Galileo satellite has four high-precision atomic clocks. Two of these are Rubidium Atomic Frequency Standard (RAFS) clocks with a precision of 10 ns per day. The other two are Passive Hydrogen Maser (PHM) clocks with a precision of 1 ns per day. The RAFS clocks are used to secure shortterm stability, while the PHM clocks guarantee short and long-term stability [Hofmann-Wellenhof et al., 2007].

Even though Galileo is relatively new, and the first Galileo-enabled mobile phone came to market in 2016, it is already widely used in civilian applications. Currently there are over 3 billion Galileoenabled mobile phones and over 15 million Galileo-equipped cars ([H ̈anninen, 2022], updated post presentation).

Galileo Public Regulated Service (PRS)

PRS is an encrypted navigation service for government-authorised users in the EU and in duly authorised third countries and international organisations. In Finland, the Finnish Transport and Communications Agency (Traficom) is the competent PRS authority (CPA), and preparations for building a national PRS management infrastructure are underway ([H ̈anninen, 2022], presentation).

When the PRS reaches full operational capability, it is expected to serve a wide range of authorised users. These users include police, defence forces, border guard, emergency services, and selected security-of-supply companies that are part of the critical national infrastructure and logistics ([H ̈anninen, 2022], presentation). When comparing Galileo PRS to open and commercial GNSS services, PRS offers several benefits. Most importantly, it gives protection against interference, jamming, and spoofing, making it significantly more reliable under adversarial conditions. PRS uses two spectrally separated and encrypted carrier frequency bands (E1 & E6) to maximize the inference resistance and make it more difficult to attack the signal. EU [Law, 2011] also emphasises that PRS must have service continuity even in the most serious crisis situations ([H ̈anninen, 2022], presentation).

Deeply-coupling Methods

Deeply-coupled GNSS receiver and self contained sensor integration for jamming and spoofing mitigation has not been discussed in the extent it deserves, because it seems to be one of the most promising countermeasures. Sensors are not affected by radio interference and the attitude and acceleration information they provide are good complements to GNSS from other aspects too. An advanced integration method called deep-coupling uses information obtained from self- contained sensors to aid the signal processing algorithms and therefore enhances the robustness of GNSS to interference [Ruotsalainen et al., 2014]. However, self-contained sensors suffer from biases and drift errors that may decrease the position accuracy substantially. Especially when using consumer grade Micro- Electro-Mechanical System (MEMS) sensors, suited when weight and cost have to be considered.

Typically, deep-coupling with GNSS signals corrects the above-mentioned bias and drift errors in self-contained sensors, but if the interference continues for a longer time forestalling the use of proper GNSS signals, degradation of the combined position solution will incur after some period. Therefore, other sensors or methods have to be used to calibrate the errors in self-contained sensors frequently for a robust result. One emerging technology for error calibration is the use of visual perception. Visual sensors, i.e., cameras, are feasible instruments for constricting the growth of the errors and are also resistant to GNSS interference. Deeply-coupled GNSS, inertial navigation system (INS) and vision fusion has proven to be a feasible method for interference mitigation Integration [Cristodaro et al., 2019].

Interference monitoring infrastructure

The vulnerability in GNSS-based systems to intentional and unintentional interference requires having disparate monitoring systems continuously monitoring the GNSS signals for anomalies. In general, monitoring systems can be classified into two main categories; fixed and portable [Thombre et al., 2018]. The fixed monitoring systems are installed at a site to operate over long periods. In addition, the fixed monitoring systems can be expanded to multiple monitoring nodes connected to a central control unit. The raw observed data are sent via the communication channels to the control unit. The control centre stores the observed GNSS received signals and makes them available for post-processing to the end users. The portable monitoring systems are typically small handheld or mounted on vehicles which are intended to be operated over shorter periods. In this section, three fixed European monitoring infrastructures to monitor interference will be explained. Table 3 shows a comparison summary which is based on the capabilities of the threat monitoring systems; based on their capabilities to classify the interference type, detection of signal spoofing, if they are capable of geo-localisation of the interference source, price per station and redeployment capability (i.e., more feasible to change monitoring station position).

Finnish National Reference Network (FinnRef)

Finnish National Reference Network (FinnRef) includes 47 fixed stations to monitor GNSS signal quality with locations as can be seen in figure 6 and a typical station is seen in figure 7. FinnRef forms the basis for the national reference frame, EUREF FIN and is maintained by the National Land Survey of Finland. Moreover, some of the stations also serve as International GNSS Service (IGS) stations to provide open access, high quality GNSS data for scientific, educational, and commercial applications. In addition, one station is co-located with European Geostationary Navigation Overlay Service (EGNOS) Ranging and Integrity Monitoring Station (RIMS) which are used to improve the performance of GNSS. The Real-time positioning service ‘FINPOS’ uses FinnRef data to provide DifferentialGNSS (DGNSS) and Network RTK measurement data to improve localisation accuracy for end users. The information from multiple global constellations i.e., GPS, Galileo, GLONASS and BeiDou are monitored. The monitored information is available in RINEX format and in real-time streams for the monitored constellations, where RINEX is a standard format that allows the management and disposal of the measured data ([Bhuiyan, 2022], presentation). In addition, the FinnRef monitors the GNSS signals for interference and jamming. It sends alert messages to Traficom when signal anomalies are detected [Gns, 2022].

 

GNSS-Finland Service

The data obtained from FinnRef forms the backbone for GNSS Finland Service where the obtained data from the network are continuously analysed in real- time. The service creates a signal quality indicator for the monitored GNSS signal strengths. The indicators are ”good”, ”satisfactory” or ”poor”. The specific observed GNSS signal at a specific station is estimated as the average C/N0 demonstrating the quality of the signal for all observed satellites excluding satellites with an elevation angle less than 15 degrees. As for the signal quality indicator of the above-mentioned grades based on average C/N0 , two thresholds are empirically estimated for all signals. More details on thresholds values can be found at [Gns, 2022]. The Finnish Meteorological Institute uses the FinnRef receiver data in its space weather services to monitor ionospheric activity.

SWEPOS

The Swedish network of permanent reference stations for GNSS includes 500+ fixed nodes scattered all around Sweden. The receiver nodes are connected to a control centre that provides access to the whole accumulated GNSS data in real-time [Norin et al., 2008]. Each node is equipped with antennas and receivers which enable the network to track GPS, GLONASS, Galileo and Beidou signals. In addition to spectrum monitoring, SWEPOS also provides a range of applications such as: network real-time kinematic (NRTK) correction for realtime applications, Data for geoscientific and meteorological research and serves as the backbone of the Swedish national geodetic reference frame ([Kibrom Ebuy, 2022], presentation).

Figure 8 shows the design of the the SWEPOS-network. The SWEPOS stations are connected to the control centre at the National Land Survey through TCP/IP connection. The quality of raw data and the Differential GPS (DGPS) corrections checked at the control centre, and then, the control centre provides the data in a RINEX format for post processing through a WWW/FTP-server. In general, most of the SWEPOS stations are built in areas with an undisturbed line of sight to the monitored satellite constellation.

The SWEPOS network infrastructure is utilised to monitor multi-GNSS constellations at multi-frequency bands. In addition, testing has been done in order to characterise and detect radio frequency interference in Sweden for both jamming and spoofing events in near-real-time from C/N0 history and characteristics [Alexandersson, 2022]. Moreover, it sends alarms when radio frequency interfernece (RFI) is detected (Figure 9. Also, it characterises the GNSS RFI events and geolocates the RFI sources for the use of the Swedish Post and Telecom Authority (PTS) based on the power and duration of the interference ([Kibrom Ebuy, 2022], presentation).

Advanced RFI Detection, Analysis and Alerting System (ARFIDAAS II)

The Advanced RFI Detection, Analysis and Alerting System (ARFIDAAS II) project is a collaboration between SINTEF (Norway) and the University of Helsinki (Finland) with stakeholders NKOM (Norway) and Traficom (Finland). ARFIDAAS II is a European Space Agency NAVISP element 3 project running from 2021 through 2022 and continuation of SINTEF’s ARFIDAAS project operational from 2018 through 2019. The project is focused on the capture, collection and classification of RFI events impacting GNSS L-band signals and fingerprinting the jamming devices causing the RFI. One of the key features of the ARFIDAAS project is that it utilises custom monitoring hardware front- ends to simultaneously observe 240 MHz of aggregate spectrum divided into four tuneable sub-bands. The typical configuration is of one covering the L1 band including BeiDou B1 through GLONASS G1 signals, and the other three partially overlapping bands spread between the Galileo E5a+E5b, GPS L2 and Galileo E6 signals. The custom developed software for triggering, analysis and reporting runs on an off the shelf low cost computer. One of the main drivers in the front-end development was low deployment cost. At present, the cost of the whole system (Figure 10); front-end, computer, cabling and an antenna (Figure 11), is below 2000 euros ([Morrison, 2022], presentation). Low costs would enable increasing monitoring network density and thereby the detection of situations of potential failure in PVT computation.

Between 2019 and 2021, eleven ARFIDAAS quad-band RFI monitoring stations had been deployed between Norway (6), Finland (1), the Czech Republic (2), and the Netherlands(2), and have together observed nearly five thousand RFI events impacting one or more GNSS signal bands ([Sokolova, 2022], presentation). At the beginning of 2022, three more stations were deployed to the Arctic environment in Northern Finland ([Ruotsalainen, 2022], presentation). During the five operational months, over ten RFI events have been observed. One more station is being deployed into Germany during 2022. The full geographical coverage of the stations is seen in Figure 12, where the operating sites are shown with green and the planned 2022 deployment in blue, number of systems per site shown in brackets after each site name.

Summary

The disruptions to GNSS based navigation systems due to intentional and unintentional interference is a global phenomenon. Therefore, interference management techniques are crucial to mitigate interference effects. This white paper provides an overview of GNSS interference sources and methods to detect it. Specifically, traditional and machine learning methods are used to detect abnormal behaviour in the GNSS signal. Basic type of autoencoder is used for anomaly detection in the CWI interference type. In addition, jammer finger- printing methods are described. RF fingerprinting is based on detecting unique signal distortions caused by hardware irregularities, and this can be used to detect the signal transmitter. Moreover, methodologies to mitigate interference such as, Deeply coupling methods and Galileo Public Regulated Service (PRS) were discussed. Lastly, three GNSS signal monitoring infrastructures were briefly introduced.

Seminar presentation

[SeminarAlexandersson, 2022] Alexandersson, M. (2022). Using the swedish CORS network to detect GNSS interference, results from tests and measurements. Seminar Presentation.

[SeminarBhuiyan, 2022] Bhuiyan, Z. (2022). R&D activities on resilient PNT at finnish geospatial research institute. Seminar Presentation.

[SeminarBurke, 2022] Burke, R. (2022). Resilient positioning, navigation and timing. Seminar Presentation.

[SeminarElango, 2022] Elango, A. (2022). GNSS anomaly monitoring. Seminar Presentation.

[SeminarH ̈anninen, 2022] Ha ̈nninen, J. (2022). European union’s Galileo and its PRS. Seminar Presentation.

[SeminarKauristie, 2022] Kauristie, K. (2022). GNSS interference by space weather storms. Seminar Presentation.

[SeminarKibrom Ebuy, 2022] Kibrom Ebuy, A. (2022). SWEPOS data quality monitoring, GNSS signal interference and disturbance monitoring system. Seminar Presentation.

[SeminarLohan, 2022] Lohan, S. (2022). Interference detection, localization, and mitigation in GNSS. Seminar Presentation.

[SeminarMalmivirta, 2022] Malmivirta, T. (2022). Jammer fingerprinting. Seminar Presentation.

[SeminarMorrison, 2022] Morrison, A. (2022). The ARFIDAAS system design and operation. Seminar Presentation.

[SeminarRichter, 2022] Richter, P. (2022). GNSS threats and countermeasures. Seminar Presentation.

[SeminarRuotsalainen, 2022] Ruotsalainen, L. (2022). Protecting GNSS against intentional interference. Seminar Presentation.

[SeminarS ̈oderholm, 2022] S ̈oderholm, S. (2022). GNSS jamming & spoofing – attacks, techniques, countermeasures. Seminar Presentation.

[SeminarSokolova, 2022] Sokolova, N. (2022). Analysis of a full year of multi- band RFI data from multiple sites in europe. Seminar Presentation.

References

[Law, 2011] (2011). Decision no 1104/2011/ EU of the European Parliament and of the Council of 25 October 2011 on the rules for access to the public regulated service provided by the global navigation satellite system established under the Galileo programme. OJ L 287. https:// eur-lex.europa.eu/ legal-content/EN/

[Sar, 2021] (2021). Search and Rescue (SAR) / Galileo Service.

https://www.euspa.europa.eu/ european-space/galileo/services/ search-and-rescue-sar-galileo-service, note = Accessed: 2022-06-12.

[Gns, 2022] (2022). GNSS-Finland Service. https://gnss-finland.nls. fi, note = Accessed: 2022-06-12.

[Borio et al., 2013] Borio, D., O’Driscoll, C., and Fortuny, J. (2013). On the use of an ultra-tight integration for robust navigation in jammed scenarios. In Intl. Conference on Localization and GNSS (ICL-GNSS).

[Cristodaro et al., 2019] Cristodaro, C., Falco, G., Ruotsalainen, L., and Dovis (2019). On the use of an ultra-tight integration for robust navigation in jammed scenarios.

[Dovis, 2015] Dovis, F. (2015). GNSS interference threats and countermeasures. Artech House.

[Falletti et al., 2020] Falletti, E., Troglia Gamba, M., and Pini, M. (2020). Design and analysis of activation strategies for adaptive notch filters to suppress gnss jamming. IEEE Transactions on Aerospace and Electronic Systems, PP:1–1.

[Farshchi et al., 2018] Farshchi, M., Weber, I., Della Corte, R., Pecchia, A., Cinque, M., Schneider, J.-G., and Grundy, J. (2018). Contextual anomaly detection for a critical industrial system based on logs and metrics. In 2018 14th European Dependable Computing Conference (EDCC), pages 140–143.

[Ferrara et al., 2018] Ferrara, N. G., Bhuiyan, M. Z. H., S ̈oderholm, S., Ruotsalainen, L., and Kuusniemi, H. (2018). A new implementation of narrow- band interference detection, characterization, and mitigation technique for a software-defined multi-gnss receiver. GPS Solutions, 22(4):106.

[Guo et al., 2021] Guo, K., Veettil, S., Weaver, B., and Aquino, M. (2021). Mitigating high latitude ionospheric scintillation effects on gnss precise point positioning exploiting 1-s scintillation indices. Journal of Geodesy, 95(30):1250.

[Hedling et al., 2001] Hedling, G., Jonsson, B., Lilje, C., and Lilje, M. (2001). SWEPOS the swedish network of permanent GPS reference station (status february 2001).

[Hofmann-Wellenhof et al., 2007] Hofmann-Wellenhof, B., Lichtenegger, H., and Wasle, E. (2007). GNSS– global navigation satellite systems: GPS, GLONASS, Galileo, and more. Springer Science & Business Media.

[Manandhar et al., 2004] Manandhar, D., Shibasaki, R., and Normark, P.- L. (2004). Gps Signal Analysis using LHCP / RHCP Antenna and Software GPS Receiver. pages 2489–2498. Proceedings of the 17th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2004), Long Beach, CA.

[Mitch et al., 2011] Mitch, R. H., Dougherty, R. C., Psiaki, M. L., Powell, S. P., O’Hanlon, B. W., Bhatti, J. A., and Humphreys, T. E. (2011). Signal characteristics of civil gps jammers. In Proceedings of the 24th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2011), pages 1907–1919.

[Norin et al., 2008] Norin, D., Jonsson, B., and Wiklund, P. (2008). SWEPOS and its GNSS-based positioning services.

[Psiaki et al., 2014] Psiaki, M. L., OHanlon, B. W., Powell, S. P., Bhatti, J. A., Wesson, K. D., and Schofield, T. E. (2014). Gnss spoofing detection using two-antenna differential carrier phase. In Proceedings of the 27th international technical meeting of the satellite division of the Institute of Navigation (ION GNSS+ 2014), pages 2776–2800.

[Pullen and Gao, 2012] Pullen, S. and Gao, G. X. (2012). Gnss jamming in the name of privacy: Potential threat to gps aviation. Inside GNSS, 7(2):34–43.

[Ruotsalainen et al., 2014] Ruotsalainen, L., Bhuiyan, M. Z. H., Thombre, S., S ̈oderholm, S., and Kuusniemi, H. (2014). Impact of cheap commercial jammer on BeiDou signal. Coordinates.

[S. Wang, 2021] S. Wang, J. F. (2021). Machine learning in network anomaly detection: A survey. IEEE Access, 9.

[Thombre et al., 2018] Thombre, S., Bhuiyan, M. Z. H., Eliardsson, P., Gabrielsson, B., Pattinson, M., Dumville, M., Fryganiotis, D., Hill, S., Manikundalam, V., P ̈ol ̈oskey, M., et al. (2018). GNSS threat monitoring and reporting: Past, present, and a proposed future. The Journal of Navigation, 71(3):513–529.

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 3.00 out of 5)
Loading...


Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.