|Table of Contents|

[1] Sun Minhong, Shao Zhangyi, Bao Jianrong, et al. GNSS spoofing detection based on uncultivated wolf pack algorithm [J]. Journal of Southeast University (English Edition), 2017, 33 (1): 1-4. [doi:10.3969/j.issn.1003-7985.2017.01.001]

GNSS spoofing detection based on uncultivated wolf pack algorithm()

Journal of Southeast University (English Edition)[ISSN:1003-7985/CN:32-1325/N]

2017 1
Research Field:
Electromagnetic Field and Microwave Technology
Publishing date:


GNSS spoofing detection based on uncultivated wolf pack algorithm
Sun Minhong1 2 Shao Zhangyi2 Bao Jianrong2 Yu Xutao1
1School of Information Science and Engineering, Southeast University, Nanjing 210096, China
2School of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China
global navigation satellite system(GNSS) spoofing detection system identification uncultivated wolf pack algorithm
In order to solve the problem that the global navigation satellite system(GNSS)receivers can hardly detect the GNSS spoofing when they are deceived by a spoofer, a model-based approach for the identification of the GNSS spoofing is proposed. First, a Hammerstein model is applied to model the spoofer/GNSS transmitter and the wireless channel. Then, a novel method based on the uncultivated wolf pack algorithm(UWPA)is proposed to estimate the model parameters. Taking the estimated model parameters as a feature vector, the identification of the spoofing is realized by comparing the Euclidean distance between the feature vectors. Simulations verify the effectiveness and the robustness of the proposed method.The results show that, compared with the other identification algorithms, such as least square(LS), the iterative method and the bat-inspired algorithm(BA), although the UWPA has a little more time-complexity than the LS and the BA algorithm, it has better estimation precision of the model parameters and higher identification rate of the GNSS spoofing, even for relative low signal-to-noise ratios.


[1] Basker S. Jamming: A clear and present danger[J]. GPS World, 2010, 21(4):8-9.
[2] Nielsen J, Broumandan A, Lachapelle G. Spoofing detection and mitigation with a moving handheld receiver[J]. GPS World, 2010, 21(9):27-33.
[3] Humphreys T E, Ledvina B M, Psiaki M L, et al. Assessing the spoofing threat: Development of a portable GPS civilian spoofer[C]// ION GNSS Conference. Savanna, USA, 2008:2314-2325.
[4] Montgomery P Y, Humphreys T E, Ledvina B M. Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer[C]// Proceedings of the Institute of Navigation International Technical Meeting. Anaheim, USA, 2009: 124-130.
[5] Polak A C, Dolatshahi S, Goeckel D L. Identifying wireless users via transmitter imperfections[J]. IEEE Journal on Selected Areas in Communications, 2011, 29(7): 1469-1479. DOI:10.1109/jsac.2011.110812.
[6] Liu M W, Doherty J F. Nonlinearity estimation for specific emitter identification in multipath channels[J]. IEEE Transactions on Information Forensics and Security, 2011, 6(3):1076-1085.
[7] Lennart Ljung. System identification—theory for the user [M]. Beijing: Tsinghua University Press, 2002.
[8] Bai E W, Li D. Convergence of the iterative Hammerstein system identification algorithm[J]. IEEE Transactions on Automatic Control, 2004, 49(11):1929-1940. DOI:10.1109/tac.2004.837592.
[9] Wu H S, Zhang F M. A uncultivated wolf pack algorithm for high-dimensional functions and its application in parameters optimization of PID controller[C]// IEEE Congress on Evolutionary Computation. Beijing, China, 2014: 1477-1482.
[10] Wu H S, Zhang F M, Wu L S. New swarm intelligence algorithm—wolf pack algorithm[J]. Systems Engineering and Electronics, 2013, 35(11): 2430-2438.(in Chinese)
[11] Barradas F M, Cunha T R, Lavrador P M, et al. Polynomials and LUTs in PA behavioral modeling: A fair theoretical comparison[J]. IEEE Transactions on Microwave Theory and Techniques, 2014, 62(12): 3274-3285. DOI:10.1109/tmtt.2014.2365188.
[12] Hong X, Chen S, Gong Y, et al. Nonlinear equalization of Hammerstein OFDM systems[J]. IEEE Transactions on Signal Processing, 2014, 62(21): 5629-5639. DOI:10.1109/tsp.2014.2355773.
[13] Yang X S. A new metaheuristic bat-inspired algorithm[J]. Nature Inspired Cooperative Strategies for Optimization, 2012, 284: 65-74. DOI:10.1007/978-3-642-12538-6_6.


Biography: Sun Minhong(1974—), male, doctor, associate professor, cougar@hdu.edu.cn.
Foundation items: The National Natural Science Foundation of China(No.61271214, 61471152), the Postdoctoral Science Foundation of Jiangsu Province(No.1402023C), the Natural Science Foundation of Zhejiang Province(No.LZ14F010003).
Citation: Sun Minhong, Shao Zhangyi, Bao Jianrong, et al. GNSS spoofing detection based on uncultivated wolf pack algorithm.[J].Journal of Southeast University(English Edition), 2017, 33(1):1-4.DOI:10.3969/j.issn.1003-7985.2017.01.001.
Last Update: 2017-03-20