48 research outputs found

    On Fault Detection and Exclusion in Snapshot and Recursive Positioning Algorithms for Maritime Applications

    Get PDF
    Resilient provision of Position, Navigation and Timing (PNT) data can be considered as a key element of the e-Navigation strategy developed by the International Maritime Organization (IMO). An indication of reliability has been identified as a high level user need with respect to PNT data to be supplied by electronic navigation means. The paper concentrates on the Fault Detection and Exclusion (FDE) component of the Integrity Monitoring (IM) for navigation systems based both on pure GNSS (Global Navigation Satellite Systems) as well as on hybrid GNSS/inertial measurements. Here a PNT-data processing Unit will be responsible for both the integration of data provided by all available on-board sensors as well as for the IM functionality. The IM mechanism can be seen as an instantaneous decision criterion for using or not using the system and, therefore, constitutes a key component within a process of provision of reliable navigational data in future navigation systems. The performance of the FDE functionality is demonstrated for a pure GNSS-based snapshot weighted iterative least-square (WLS) solution, a GNSS-based Extended Kalman Filter (EKF) as well as for a classical error-state tightly-coupled EKF for the hybrid GNSS/inertial system. Pure GNSS approaches are evaluated by combining true measurement data collected in port operation scenario with artificially induced measurement faults, while for the hybrid navigation system the measurement data in an open sea scenario with native GNSS measurement faults have been employed. The work confirms the general superiority of the recursive Bayesian scheme with FDE over the snapshot algorithms in terms of fault detection performance even for the case of GNSS-only navigation. Finally, the work demonstrates a clear improvement of the FDE schemes over non-FDE approaches when the FDE functionality is implemented within a hybrid integrated navigation system

    Integrity Monitoring: From Airborne to Land Applications

    Get PDF
    Safety-critical applications in transportation require GNSS-based positioning with high levels of continuity, accuracy and integrity. The system needs to detect and exclude faults and to raise an alarm in the event of unsafe positioning. This capability is referred to as integrity monitoring (IM). While IM was considered until recently only in aviation, it is currently a key performance parameter in land applications, such as Intelligent Transport Systems (ITS). In this chapter the IM concepts, models and methods developed so far are compared. In particular, Fault Detection and Exclusion (FDE) and bounding of positioning errors methods borrowed from aviation (i.e. Weighted RAIM and ARAIM) are discussed in detail, in view of their possible adoption for land applications. Their strengths and limitations, and the modifications needed for application in the different context are highlighted. A practical demonstration of IM in ITS is presented

    Navigation Performance Enhancement Using IMM Filtering for Time Varying Satellite Signal Quality

    Get PDF
    A novel scheme using fuzzy logic based interacting multiple model (IMM) unscented Kalman filter (UKF) is employed in which the Fuzzy Logic Adaptive System (FLAS) is utilized to address uncertainty of measurement noise, especially for the outlier types of multipath errors for the Global Positioning System (GPS) navigation processing. Multipath is known to be one of the dominant error sources, and multipath mitigation is crucial for improvement of the positioning accuracy. It is not an easy task to establish precise statistical characteristics of measurement noise in practical engineering applications. Based on the filter structural adaptation, the IMM nonlinear filtering provides an alternative for designing the adaptive filter in the GPS navigation processing for time varying satellite signal quality. The uncertainty of the noise can be described by a set of switching models using the multiple model estimation. An UKF employs a set of sigma points by deterministic sampling, which avoids the error caused by linearization as in an extended Kalman filter (EKF). For enhancing further system flexibility, the fuzzy logic system is introduced. The use of IMM with FLAS enables tuning of appropriate values for the measurement noise covariance so as to obtain improved estimation accuracy. Performance assessment will be carried out to show the effectiveness of the proposed approach for positioning improvement in GPS navigation processing

    Signal processing techniques for GNSS anti-spoofing algorithms

    Get PDF
    The Global Navigation Satellite Systems (GNSS) usage is growing at a very high rate, and more applications are relying on GNSS for correct functioning. With the introduction of new GNSSs, like the European Galileo and the Chinese Beidou, in addition to the existing ones, the United States Global Positioning System (GPS) and the Russian GLONASS, the applications, accuracy of the position and usage of the signals are increasing by the day. Given that GNSS signals are received with very low power, they are prone to interference events that may reduce the usage or decrease the accuracy. From these interference, the spoofing attack is the one that has drawn major concerns in the GNSS community. A spoofing attack consist on the transmission of GNSS-like signals, with the goal of taking control of the receiver and make it compute an erroneous position and time solution. In the thesis, we focus on the design and validation of different signal processing techniques, that aim at detection and mitigation of the spoofing attack effects. These are standalone techniques, working at the receiver’s level and providing discrimination of spoofing events without the need of external hardware or communication links. Four different techniques are explored, each of them with its unique sets of advantages and disadvantages, and a unique approach to spoofing detection. For these techniques, a spoofing detection algorithm is designed and implemented, and its capabilities are validated by means of a set of datasets containing spoofing signals. The thesis focuses on two different aspects of the techniques, divided as per detection and mitigation capabilities. Both detection techniques are complementary, their joint use is explored and experimental results are shown that demonstrate the advantages. In addition, each mitigation technique is analyzed separately as they require specialized receiver architecture in order to achieve spoofing detection and mitigation. These techniques are able to decrease the effects of the spoofing attacks, to the point of removing the spoofing signal from the receiver and compute navigation solutions that are not controlled by the spoofer and lead in more accurate end results. The main contributions of this thesis are: the description of a multidimensional ratio metric test for distinction between spoofing and multipath effects; the introduction of a cross-check between automatic gain control measurements and the carrier to noise density ratio, for distinction between spoofing attacks and other interference events; the description of a novel signal processing method for detection and mitigation of spoofing effects, based on the use of linear regression algorithms; and the description of a spoofing detection algorithm based on a feedback tracking architecture

    A Meta-Review of Indoor Positioning Systems

    Get PDF
    An accurate and reliable Indoor Positioning System (IPS) applicable to most indoor scenarios has been sought for many years. The number of technologies, techniques, and approaches in general used in IPS proposals is remarkable. Such diversity, coupled with the lack of strict and verifiable evaluations, leads to difficulties for appreciating the true value of most proposals. This paper provides a meta-review that performed a comprehensive compilation of 62 survey papers in the area of indoor positioning. The paper provides the reader with an introduction to IPS and the different technologies, techniques, and some methods commonly employed. The introduction is supported by consensus found in the selected surveys and referenced using them. Thus, the meta-review allows the reader to inspect the IPS current state at a glance and serve as a guide for the reader to easily find further details on each technology used in IPS. The analyses of the meta-review contributed with insights on the abundance and academic significance of published IPS proposals using the criterion of the number of citations. Moreover, 75 works are identified as relevant works in the research topic from a selection of about 4000 works cited in the analyzed surveys

    Automatic Flight Control Systems

    Get PDF
    The history of flight control is inseparably linked to the history of aviation itself. Since the early days, the concept of automatic flight control systems has evolved from mechanical control systems to highly advanced automatic fly-by-wire flight control systems which can be found nowadays in military jets and civil airliners. Even today, many research efforts are made for the further development of these flight control systems in various aspects. Recent new developments in this field focus on a wealth of different aspects. This book focuses on a selection of key research areas, such as inertial navigation, control of unmanned aircraft and helicopters, trajectory control of an unmanned space re-entry vehicle, aeroservoelastic control, adaptive flight control, and fault tolerant flight control. This book consists of two major sections. The first section focuses on a literature review and some recent theoretical developments in flight control systems. The second section discusses some concepts of adaptive and fault-tolerant flight control systems. Each technique discussed in this book is illustrated by a relevant example

    Advanced RFI detection, RFI excision, and spectrum sensing : algorithms and performance analyses

    Get PDF
    Because of intentional and unintentional man-made interference, radio frequency interference (RFI) is causing performance loss in various radio frequency operating systems such as microwave radiometry, radio astronomy, satellite communications, ultra-wideband communications, radar, and cognitive radio. To overcome the impact of RFI, a robust RFI detection coupled with an efficient RFI excision are, thus, needed. Amongst their limitations, the existing techniques tend to be computationally complex and render inefficient RFI excision. On the other hand, the state-of-the-art on cognitive radio (CR) encompasses numerous spectrum sensing techniques. However, most of the existing techniques either rely on the availability of the channel state information (CSI) or the primary signal characteristics. Motivated by the highlighted limitations, this Ph.D. dissertation presents research investigations and results grouped into three themes: advanced RFI detection, advanced RFI excision, and advanced spectrum sensing. Regarding advanced RFI detection, this dissertation presents five RFI detectors: a power detector (PD), an energy detector (ED), an eigenvalue detector (EvD), a matrix-based detector, and a tensor-based detector. First, a computationally simple PD is investigated to detect a brodband RFI. By assuming Nakagami-m fading channels, exact closed-form expressions for the probabilities of RFI detection and of false alarm are derived and validated via simulations. Simulations also demonstrate that PD outperforms kurtosis detector (KD). Second, an ED is investigated for RFI detection in wireless communication systems. Its average probability of RFI detection is studied and approximated, and asymptotic closed-form expressions are derived. Besides, an exact closed-form expression for its average probability of false alarm is derived. Monte-Carlo simulations validate the derived analytical expressions and corroborate that the investigated ED outperforms KD and a generalized likelihood ratio test (GLRT) detector. The performance of ED is also assessed using real-world RFI contaminated data. Third, a blind EvD is proposed for single-input multiple-output (SIMO) systems that may suffer from RFI. To characterize the performance of EvD, performance closed-form expressions valid for infinitely huge samples are derived and validated through simulations. Simulations also corroborate that EvD manifests, even under sample starved settings, a comparable detection performance with a GLRT detector fed with the knowledge of the signal of interest (SOI) channel and a matched subspace detector fed with the SOI and RFI channels. At last, for a robust detection of RFI received through a multi-path fading channel, this dissertation presents matrix-based and tensor-based multi-antenna RFI detectors while introducing a tensor-based hypothesis testing framework. To characterize the performance of these detectors, performance analyses have been pursued. Simulations assess the performance of the proposed detectors and validate the derived asymptotic characterizations. Concerning advanced RFI excision, this dissertation introduces a multi-linear algebra framework to the multi-interferer RFI (MI-RFI) excision research by proposing a multi-linear subspace estimation and projection (MLSEP) algorithm for SIMO systems. Having employed smoothed observation windows, a smoothed MLSEP (s-MLSEP) algorithm is also proposed. MLSEP and s-MLSEP require the knowledge of the number of interferers and their respective channel order. Accordingly, a novel smoothed matrix-based joint number of interferers and channel order enumerator is proposed. Performance analyses corroborate that both MLSEP and s-MLSEP can excise all interferers when the perturbations get infinitesimally small. For such perturbations, the analyses also attest that s-MLSEP exhibits a faster convergence to a zero excision error than MLSEP which, in turn, converges faster than a subspace projection algorithm. Despite its slight complexity, simulations and performance assessment on real-world data demonstrate that MLSEP outperforms projection-based RFI excision algorithms. Simulations also corroborate that s-MLSEP outperforms MLSEP as the smoothing factor gets smaller. With regard to advanced spectrum sensing, having been inspired by an F–test detector with a simple analytical false alarm threshold expression considered an alternative to the existing blind detectors, this dissertation presents and evaluates simple F–test based spectrum sensing techniques that do not require the knowledge of CSI for multi-antenna CRs. Exact and asymptotic analytical performance closed-form expressions are derived for the presented detectors. Simulations assess the performance of the presented detectors and validate the derived expressions. For an additive noise exhibiting the same variance across multiple-antenna frontends, simulations also corroborate that the presented detectors are constant false alarm rate detectors which are also robust against noise uncertainty

    Interference Mitigation and Localization Based on Time-Frequency Analysis for Navigation Satellite Systems

    Get PDF
    Interference Mitigation and Localization Based on Time-Frequency Analysis for Navigation Satellite SystemsNowadays, the operation of global navigation satellite systems (GNSS) is imperative across a multitude of applications worldwide. The increasing reliance on accurate positioning and timing information has made more serious than ever the consequences of possible service outages in the satellite navigation systems. Among others, interference is regarded as the primary threat to their operation. Due the recent proliferation of portable interferers, notably jammers, it has now become common for GNSS receivers to endure simultaneous attacks from multiple sources of interference, which are likely spatially distributed and transmit different modulations. To the best knowledge of the author, the present dissertation is the first publication to investigate the use of the S-transform (ST) to devise countermeasures to interference. The original contributions in this context are mainly: • the formulation of a complexity-scalable ST implementable in real time as a bank of filters; • a method for characterizing and localizing multiple in-car jammers through interference snapshots that are collected by separate receivers and analysed with a clever use of the ST; • a preliminary assessment of novel methods for mitigating generic interference at the receiver end by means the ST and more computationally efficient variants of the transform. Besides GNSSs, the countermeasures to interference proposed are equivalently applicable to protect any direct-sequence spread spectrum (DS-SS) communication

    Authentication and Integrity Protection at Data and Physical layer for Critical Infrastructures

    Get PDF
    This thesis examines the authentication and the data integrity services in two prominent emerging contexts such as Global Navigation Satellite Systems (GNSS) and the Internet of Things (IoT), analyzing various techniques proposed in the literature and proposing novel methods. GNSS, among which Global Positioning System (GPS) is the most widely used, provide affordable access to accurate positioning and timing with global coverage. There are several motivations to attack GNSS: from personal privacy reasons, to disrupting critical infrastructures for terrorist purposes. The generation and transmission of spoofing signals either for research purpose or for actually mounting attacks has become easier in recent years with the increase of the computational power and with the availability on the market of Software Defined Radios (SDRs), general purpose radio devices that can be programmed to both receive and transmit RF signals. In this thesis a security analysis of the main currently proposed data and signal level authentication mechanisms for GNSS is performed. A novel GNSS data level authentication scheme, SigAm, that combines the security of asymmetric cryptographic primitives with the performance of hash functions or symmetric key cryptographic primitives is proposed. Moreover, a generalization of GNSS signal layer security code estimation attacks and defenses is provided, improving their performance, and an autonomous anti-spoofing technique that exploits semi-codeless tracking techniques is introduced. Finally, physical layer authentication techniques for IoT are discussed, providing a trade-off between the performance of the authentication protocol and energy expenditure of the authentication process
    corecore