Advanced Search
Turn off MathJax
Article Contents
LI Yangping, HUANG Ling, WANG Ke, ZHAO Haifeng. A Geometric Reconstrction Method for Predicting Shape of Irregular Rocks under Moon’s Subsurface Using Lunar Penetrating Radar Based on a Deep Learning Algorithm[J]. Journal of Electronics & Information Technology, 2022, 44(4): 1222-1230. doi: 10.11999/JEIT211142
Citation: ZHUANG Xuebin, NIU Ben, LIN Zijian, ZHANG Linjie. A Multiparameter Spoofing Detection Method Based on Parallel CNN-Transformer Neural Network with Gating Mechanism[J]. Journal of Electronics & Information Technology. doi: 10.11999/JEIT240977

A Multiparameter Spoofing Detection Method Based on Parallel CNN-Transformer Neural Network with Gating Mechanism

doi: 10.11999/JEIT240977
Funds:  The Aeronautical Science Foundation (202300080M1001)
  • Received Date: 2024-10-31
  • Rev Recd Date: 2025-03-13
  • Available Online: 2025-03-25
  •   Objective  Global Navigation Satellite Systems (GNSS) provide location, velocity, and timing services globally and are widely used. However, their signals are highly susceptible to interference from natural environments or human factors, and existing single-parameter and multi-parameter detection methods have limitations. In an increasingly complex electromagnetic environment, satellite navigation systems face a growing risk of deception and interference. Therefore, it is essential to refine deception interference detection techniques to enhance the generality and adaptability of detection algorithms. This study proposes a multi-parameter deception interference detection algorithm that addresses the limitations of existing methods, ensures the secure and reliable operation of GNSS receivers, and contributes to the safety and stability of satellite navigation systems.  Methods  Extract key information from the receiver tracking phase. Select five observation metrics: code rate, discriminator result, Doppler shift, carrier-to-noise ratio, and SQM index. Due to the large fluctuations in the original values, apply sliding window processing using Moving Variance (MV) and Moving Mean (MA) to obtain nine feature parameters, forming a multidimensional time series sample. This approach better captures signal feature trends, reduces the effect of data fluctuations, and provides a stable and reliable data foundation for subsequent detection. Construct a Parallel CNN-Transformer Neural network (PCTN) based on a gating mechanism. The network consists of three convolutional neural network modules, eight Transformer encoder modules, and one gating module. The gating mechanism learns the weights of the two branches, fuses their outputs, and detects deception interference signals. Evaluate the model using the TEXBAT dataset and an actual dataset, comparing its performance with five existing algorithms.  Results and Discussions  The PCTN algorithm performs well on the TEXBAT dataset. As shown in Fig. 6, its classification accuracy for real signals reaches 99.222%, exceeding that of the five comparison algorithms. The ROC curve (Fig. 8) and evaluation metrics (Table 3) indicate that the PCTN algorithm achieves the highest AUC value and outperforms others in accuracy, precision, recall, and F1 score, demonstrating stable classification performance across various deception scenarios and effectively distinguishing deception signals from real signals. A deception interference collection platform collects actual data, and after fine-tuning, the model is tested. The PCTN algorithm maintains significant advantages, achieving the highest AUC value in the ROC curve (Fig. 10). As shown in Table 4, its detection accuracy remains above 94.5%, exceeding other algorithms. Compared with its performance on the TEXBAT dataset, the PCTN algorithm exhibits only a 5% decrease on the actual dataset, significantly lower than other algorithms. This demonstrates its robustness, strong generalization capability, and effectiveness in detecting deception interference in new scenarios.  Conclusions  This study proposes a multi-parameter deception interference detection algorithm based on Deep Learning (DL). The method extracts multiple parameter features from the receiver tracking stage, forms multidimensional time series samples, and employs the PCTN model for detection. Experimental results demonstrate that, compared with five existing algorithms, the proposed method offers significant advantages. On the TEXBAT dataset, it achieves high accuracy across various deception scenarios. On the actual dataset, it exhibits better generalization performance and effectively differentiates deceptive signals from real signals, even with new datasets. Future research can focus on deploying the algorithm on hardware platforms to enable real-time and accurate deception interference detection in practical satellite navigation scenarios. This will further enhance the security of satellite navigation systems and support the reliable application of satellite navigation technology in complex electromagnetic environments.
  • [1]
    HEIN G W. Status, perspectives and trends of satellite navigation[J]. Satellite Navigation, 2020, 1(1): 22. doi: 10.1186/s43020-020-00023-x.
    [2]
    王芝应, 聂俊伟, 李峥嵘, 等. BOC接收机捕获阶段转发式欺骗信号检测算法[J]. 全球定位系统, 2016, 41(5): 13–17. doi: 10.13442/j.gnss.1008-9268.2016.05.003.

    WANG Zhiying, NIE Junwei, LI Zhengrong, et al. A repeater spoofing signal detection algorithm in GNSS acquisition period of BOC modulation receiver[J]. GNSS World of China, 2016, 41(5): 13–17. doi: 10.13442/j.gnss.1008-9268.2016.05.003.
    [3]
    王文益, 王沛菡. 基于捕获结果的GNSS欺骗式干扰检测[J]. 信号处理, 2021, 37(8): 1460–1469. doi: 10.16798/j.issn.1003-0530.2021.08.013.

    WANG Wenyi and WANG Peihan. GNSS spoofing interference detection based on acquisition results[J]. Journal of Signal Processing, 2021, 37(8): 1460–1469. doi: 10.16798/j.issn.1003-0530.2021.08.013.
    [4]
    SHANG Shunshun, LI Hong, WEI Yimin, et al. GNSS spoofing detection and identification based on clock drift monitoring using only one signal[C]. 2020 International Technical Meeting of the Institute of Navigation, San Diego, USA, 2020: 331–340. doi: 10.33012/2020.17147.
    [5]
    YUAN Dingbo, LI Hong, WANG Fei, et al. A GNSS acquisition method with the capability of spoofing detection and mitigation[J]. Chinese Journal of Electronics, 2018, 27(1): 213–222. doi: 10.1049/cje.2017.11.001.
    [6]
    FANG Jingxiaotao, YUE Jiang, XU Bing, et al. A post-correlation graphical way for continuous GNSS spoofing detection[J]. Measurement, 2023, 216: 112974. doi: 10.1016/j.measurement.2023.112974.
    [7]
    王璐, 张林杰, 吴仁彪. 功率监测与SQM融合的GNSS欺骗干扰检测[J]. 信号处理, 2023, 39(3): 505–515. doi: 10.16798/j.issn.1003-0530.2023.03.013.

    WANG Lu, ZHANG Linjie, and WU Renbiao. GNSS spoofing detection based on power monitoring combined with SQM[J]. Journal of Signal Processing, 2023, 39(3): 505–515. doi: 10.16798/j.issn.1003-0530.2023.03.013.
    [8]
    许睿, 岳帅, 唐瑞琪, 等. 欺骗环境下GNSS信号估计与定位修正技术[J]. 航空学报, 2020, 41(10): 323930. doi: 10.7527/S1000-6893.2020.23930.

    XU Rui, YUE Shuai, TANG Ruiqi, et al. GNSS signal estimation and position correction algorithm under spoofing attacks[J]. Acta Aeronautica et Astronautica Sinica, 2020, 41(10): 323930. doi: 10.7527/S1000-6893.2020.23930.
    [9]
    贾琼琼, 朱传胜. 基于多通道SQM指标联合的矢量接收机多径干扰检测方法[J]. 全球定位系统, 2023, 48(3): 110–119. doi: 10.12265/j.gnss.2023037.

    JIA Qiongqiong and ZHU Chuansheng. Multipath interference detection method for vector receivers based on joint multi-channel SQM metrics[J]. GNSS World of China, 2023, 48(3): 110–119. doi: 10.12265/j.gnss.2023037.
    [10]
    ROTHMAIER F, CHEN Y H, LO S, et al. A framework for GNSS spoofing detection through combinations of metrics[J]. IEEE Transactions on Aerospace and Electronic Systems, 2021, 57(6): 3633–3647. doi: 10.1109/TAES.2021.3082673.
    [11]
    LI Jing, CHEN Zhengkun, RAN Zixuan, et al. The GNSS spoofing detection method based on AdaBoost[C]. The 2023 6th International Symposium on Autonomous Systems, Nanjing, China, 2023: 1–6. doi: 10.1109/ISAS59543.2023.10164411.
    [12]
    REN Yingying, RESTIVO R D, TAN Wenkai, et al. Knowledge distillation-based GPS spoofing detection for small UAV[J]. Future Internet, 2023, 15(12): 389. doi: 10.3390/fi15120389.
    [13]
    LI Lixuan, SUN Chao, ZHAO Hongbo, et al. GNSS spoofing detection using moving variance of signal quality monitoring metrics and signal power[C]. The 14th EAI International Conference on Communications and Networking in China, Shanghai, China, 2020: 537–548. doi: 10.1007/978-3-030-41114-5_40.
    [14]
    HU Jie, LI Shen, and SUN Gang. Squeeze-and-excitation networks[C]. 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, USA, 2018: 7132–7141. doi: 10.1109/CVPR.2018.00745.
    [15]
    VASWANI A, SHAZEER N, PARMAR N, et al. Attention is all you need[C]. The 31st International Conference on Neural Information Processing Systems, Long Beach, USA, 2017: 6000–6010.
    [16]
    LEMMENES A, CORBELL P, and GUNAWARDENA S. Detailed analysis of the TEXBAT datasets using a high fidelity software GPS receiver[C]. The 29th International Technical Meeting of the Satellite Division of the Institute of Navigation, Portland, USA, 2016: 3027–3032. doi: 10.33012/2016.14668.
    [17]
    HUMPHREYS T E, BHATTI J A, SHEPARD D, et al. The Texas spoofing test battery: Toward a standard for evaluating GPS signal authentication techniques[R]. Austin: The University of Texas at Austin, 2012.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(4)

    Article Metrics

    Article views (101) PDF downloads(22) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return