z-logo
open-access-imgOpen Access
Sensitivity analysis of the vestigial signal defence‐based civil GNSS spoofing detection method
Author(s) -
Zhang Zhenjun,
Zhan Xingqun,
Feng Shaojun,
Ochieng Washington Yotto
Publication year - 2017
Publication title -
iet radar, sonar and navigation
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.489
H-Index - 82
eISSN - 1751-8792
pISSN - 1751-8784
DOI - 10.1049/iet-rsn.2015.0409
Subject(s) - sensitivity (control systems) , gnss applications , spoofing attack , false alarm , interference (communication) , signal (programming language) , detection theory , computer science , constant false alarm rate , noise (video) , electronic engineering , algorithm , engineering , telecommunications , artificial intelligence , global positioning system , computer security , detector , channel (broadcasting) , image (mathematics) , programming language
The vestigial signal defence (VSD) method is used widely for GNSS spoofing detection through monitoring the vestigial signals within the receiver. Though the VSD has been extensively investigated in the open literature, its sensitivity in terms of detection and false alarm probabilities has not been analysed. This is addressed in this study. The sensitivity models including the vestigial signal‐to‐interference and noise ratio (SINR) and the detection and false alarm probabilities are mathematically formulated. The models are used to quantify and characterise the SINR and the detection and false alarm probabilities. It shows that the VSD is vulnerable to relatively strong spoofing signals. Strong spoofing signals significantly increase the noise floor in turn greatly decreasing the vestigial SINR, resulting in an unacceptable VSD detection performance. It also shows that the sensitivity could be improved with a higher sampling frequency and a longer integration time. It is therefore recommended to use a scheme that combines a long integration time and noise floor monitoring. The sensitivity models together with the recommendation scheme are validated by simulation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here