Skip to main content
Log in

Application of semi-circle law and Wigner spiked-model in GPS jamming confronting

  • Original Paper
  • Published:
Signal, Image and Video Processing Aims and scope Submit manuscript

Abstract

Detection and reduction of global positioning system (GPS) jamming threats are inevitable considering importance of satellite navigation in different applications such as fixed and moving platforms. Different methods utilizing statistical/spectral signal processing, time/frequency transforms and antenna array have been introduced. In this paper, a new method based on random matrix theory is proposed for detection and reduction of GPS jamming threat. By using the concept of Wigner matrix and introducing spiked matrix model, our proposed method is based on Karhunen–Loeve transform (KLT) by distinguishing eigen-values through systematic (analytic) thresholding. The authentic (cleaned) signal is reconstructed by projecting received signal on the eigen-functions domain where jamming components can be better removed. The objective is to detect the presence of jamming in the early stage of jamming attack (early warning) and then trying to reduce the jamming effect (mitigation). Different parameters including acquisition metric, position deviation, cross ambiguity function and run-time have been evaluated in simulation part to provide a good preview. According to the simulation results, the proposed method has better performance in comparison with some reference algorithms in terms of detection and false alarm probabilities and acquired satellites. At least 2.5 dB improvement in detection is achieved for the proposed algorithm. The run-time is reduced about 30% compared with wavelet packet coefficients transforms. Also, the overhead computational complexity for covariance matrix estimation (\(O\left( {m^{3} } \right)\)) is reduced compared to conventional covariance matrix estimation-based eigen-decomposition methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Egea-Roca, D., Arizabaleta-Diez, M., Pany, T., et al.: GNSS user technology: State-of-the-art and future trends. IEEE Access. 10, 39939–39968 (2022)

    Article  Google Scholar 

  2. Pardhasaradhi, B., Cenkeramaddi, L.R.: GPS spoofing detection and mitigation for drones using distributed radar tracking and fusion. IEEE Sens. J. 22(11), 11122–11134 (2022)

    Article  Google Scholar 

  3. Lakshminarayana, S., Kammoun, A., Debbah, M., et al.: Data-driven false data injection attacks against power grid: a random matrix approach. IEEE Trans. Smart Grid 12(1), 635–646 (2021)

    Article  Google Scholar 

  4. Tarongi, J.M., Camps, A.: Normality analysis for RFI detection in microwave radiometry. Remote Sens. 2(1), 191–210 (2010)

    Article  Google Scholar 

  5. Sharifi-Tehrani, O., Sabahi, M.F., Danee, M.R.: GNSS jamming detection of UAV ground control station using random matrix theory. ICT Exp. 7(2), 239–243 (2021)

    Article  Google Scholar 

  6. Silva Lorraine, K.J., Ramarakula, M.: A comprehensive survey on GNSS interferences and the application of neural networks for anti-jamming. IETE J. Res. 1–20 (2021)

  7. Chen, X., He, D., Yan, X., et al.: GNSS interference type recognition with fingerprint spectrum DNN method. IEEE Trans. Aerosp. Electron. Syst. (2022)

  8. Song, J., Wu, H., Guo, X., et al.: Credible navigation algorithm for GNSS attack detection using auxiliary sensor system. Appl. Sci. 11(14), 6321 (2021)

    Article  Google Scholar 

  9. Stenberg, N., Axell, E., Rantakokko, J., et al.: Results on GNSS Spoofing Mitigation Using Multiple Receivers. NAVIGATION: J. Ins. Navig. 69(1) (2022)

  10. Xiao, Y., Yin, J., Qi, H., et al.: MVDR algorithm based on estimated diagonal loading for beamforming. Math. Probl. Eng. 2017, 1–7 (2017)

    Google Scholar 

  11. Sharifi-Tehrani, O., Sabahi, M.F., Danaee, M.: Null broadened-deepened array antenna beamforming for GNSS jamming mitigation in moving platforms. ICT Exp. 8(2), 161–165 (2021)

    Article  Google Scholar 

  12. Wang, H., Chang, Q., Xu, Y.: Deception jamming detection based on beam scanning for satellite navigation systems. IEEE Commun. Lett. 25(8), 2703–2707 (2021)

    Article  Google Scholar 

  13. Querol, J., Perez, A., Camps, A.: A review of RFI mitigation techniques in microwave radiometry. Remote Sens. 11(24), 3042 (2019)

    Article  Google Scholar 

  14. Mosavi, M.R., Pashaian, M., Rezaei, M.J., et al.: Jamming mitigation in global positioning system receivers using wavelet packet coefficients thresholding. IET Signal Proc. 9(5), 457–464 (2015)

    Article  Google Scholar 

  15. Dovis, F., Musumeci, L.: Use of the Karhunen-Loève Transform for interference detection and mitigation in GNSS. ICT Express 2(1), 33–36 (2016)

    Article  Google Scholar 

  16. Borio, D., O’driscoll, C., Fortuny, J.: Tracking and mitigating a jamming signal with an adaptive notch filter. InsideGNSS 67–73 (2014)

  17. Borio, D., Gioia, C.: GNSS interference mitigation: A measurement and position domain assessment. NAVIGATION, J. Inst. Navig. 68(1), 93–114 (2021)

    Article  Google Scholar 

  18. Nunes, F.D., Sousa, F.M.: GNSS blind interference detection based on fourth-order autocumulants. IEEE Trans. Aerosp. Electron. Syst. 52(5), 2574–2586 (2016)

    Article  Google Scholar 

  19. Wu, Q., Zheng, J., Dong, Z., et al.: Interference detection algorithm based on adaptive subspace tracking and RAIM for GNSS receiver. IET Radar Sonar Navig. 12(9), 1028–1037 (2018)

    Article  Google Scholar 

  20. Paul, D., Aue, A.: Random matrix theory in statistics: A review. J. Stat. Plan. Inf. 150, 1–29 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  21. Sharifi-Tehrani, O., Sabahi, M.F., Danaee, M.R.: Efficient GNSS jamming mitigation using the Marcenko-Pastur law and Karhunen-Loeve decomposition. IEEE Trans. Aerosp. Electron. Syst. (2021)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen Ashourian.

Ethics declarations

Conflict of Interests

No Competing Interests and Funding.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix 1

Appendix 1

The test statistic of Chi2GoF is given by \(x_{hist} \left( m \right) = \mathop \sum \nolimits_{i = 1}^{{N_{b} }} \left( {O_{i}^{\left( m \right)} - E_{i} } \right)^{2} /E_{i}\) where \(N_{b}\) is the number of bins,\(O_{i}^{\left( m \right)}\) is the value of the \(i\) th bin of the measured histogram at snapshot \(m\) (each snapshot contains \(N{ }\) samples), and \(E_{i}\) is the value of the \({ }i\) th bin of the reference histogram, evaluated under \(H_{0}\). For large \({ }N\), the variable \(x_{hist} \left( m \right)\) under \(H_{0}\) is approximately chi-squared distributed with \(N_{b} - 1{ }\) degrees of freedom, whereas under \(H_{1}\) it departs from a central chi-square distribution. The KS test is based on the empirical distribution function (EDF). Given N ordered values of a sample \(X\), the EDF is defined as \(\hat{F}_{N} \left( x \right) = \frac{1}{N}\mathop \sum \nolimits_{i = 1}^{N} I\left( {X_{i} \le x} \right)\), where \(I\left( . \right)\) is the indicator function and \(X_{i}\) is the \(i\) th sample element to be tested (sorted from low to high). The basis of MVDET method is vectors distribution equality law, which means that the PDF of the received signal samples in battlefield is compared with the PDF of the reference one in clean environment. If significant deviation occurs, the decision on the existence of interference is confirmed. The test statistic can is considered as \( T_{{mn}}= ||\hat{\boldsymbol\mu }_{{D_{F} }}- \hat{\boldsymbol\mu }_{{D_{G} }}||\) in which, \( {\hat{\boldsymbol\mu }} \) are estimated mean vectors. If \(T_{mn}\) exceeds a predefined threshold, the null hypothesis is rejected.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ashourian, M., Sharifi-Tehrani, O. Application of semi-circle law and Wigner spiked-model in GPS jamming confronting. SIViP 17, 687–694 (2023). https://doi.org/10.1007/s11760-022-02276-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11760-022-02276-2

Keywords

Navigation