Research Article  Open Access
A Combined Antijamming and Antispoofing Algorithm for GPS Arrays
Abstract
The Global Positioning System (GPS), with its accurate positioning and timing information, has become a commonly used navigation instrument for many applications. However, it is susceptible to intentional interference such as jamming and spoofing. The conventional antijamming GPS receiver fails to work in a combined jamming and spoofing attack scenario. To solve the problem, a combined antijamming and antispoofing algorithm for a GPS receiver based on an antenna array is proposed. In this method, the jamming is eliminated by subspace projection, and then a compressed sensing framework is adopted to obtain the direction of arrival (DOA) of the despreading satellite navigation signal and detect the spoofing signal. According to the DOA of the authentic and spoofing signals, the receiver uses adaptive multibeamforming to concurrently achieve the undistorted reception of the authentic satellite signal and the suppression of the spoofing. We analyse three aspects of algorithmic performance: the antenna array direction diagram, the spoofing detection and the acquisition results. The simulation results and their analysis preliminarily show that the proposed method can detect and suppress GPS jamming and spoofing effectively.
1. Introduction
The Global Navigation Satellite System (GNSS) is widely used in modern military and civil navigation and positioning systems. However, the satellite signal power at the ground is very low (approximately 130 dBm), which makes it vulnerable to interference. Research on satellite navigation system interference suppression technology has important practical application value. GNSS interference can be divided into jamming and spoofing. Jamming can block the receiver by transmitting strong interference so that the useful GNSS signal cannot be detected and acquired normally. A jammer with a power of 1 W can disable the civil Global Positioning System (GPS) within 25 kilometres [1]. On the other hand, spoofing cheats the receiver by sending fake signals similar to authentic signal parameters and results in incorrect location or time information. In 2013, Todd Humpherys from the University of Texas demonstrated that the use of a civilian spoofer can control and dominate the movement path of a UAV [2] and a deluxe yacht [3]. Baziar designed a novel GPS spoofing generation method based on a combination of authentic and delayed signals, without expensive hardware equipment and reduced the cost and complexity of spoofing implementation [4].
With the development of antijamming technology, a new generation of satellite navigation receivers has adopted a series of interference suppression measures, including the use of the Wavelet packet transform (WPT) [5], neural network cancellation [6], and the adaptive notch filter [7, 8] to suppress narrowband interferences, but these methods are not suitable for wideband interference suppression. Many antijamming receivers make use of the antenna array power inversion (PI) [9, 10] algorithm to nullify the wideband interference or the adaptive beamforming algorithm to improve the output signaltonoise ratio (SNR) of the array by nullifying the interference directions while forming the useful GNSS signal directional beam [11]. However, the degrees of freedom of antennas are limited by the number of antenna elements, and the spacetime adaptive processing (STAP) method increases the degrees of freedom without increasing the array elements. The method also has better antijamming performance in a highly dynamic environment [12–14]. Although spoofing is highly concealable and creates confusion, many scholars have proposed spoofing detection and suppression algorithms. The monitoring automatic gain control (AGC) proposed by [15] is the simplest and most effective spoofing detection method. However, this method can not suppress the spoofing, and the jamming will cause AGC value alteration. Todd proposed a powerdistortion detection algorithm based on the received power and the correlated peak distortion monitoring, which can distinguish multipath fading, spoofing, and jamming [16, 17]. A comprehensive spoofing detection method based on DempsterShafer theory was proposed by Mingquan Lu; this method fuses the power, tracking error, C/N0, and Doppler frequency shift and reduces the detection error rate [18]. Psiaki assumed that the spoofing signals come from the same direction and detected the existence of spoofing by the carrier phase difference characteristics of a dual antenna [19, 20]. Similarly, HK Chang detected the spoofing direction of arrival (DOA) through the extended Kalman filter [21]. LuWen Zhao proposed a tracking phase spoofing detection method in which spectrum analysis of the PLL loop phase output is conducted, and the lowfrequency residual signal in the spectrum can be used to identify the characteristics of spoofing [22]. Li and Mosavi took advantage of a multichannel correlator to filter the correlation results, thereby protecting GPS receivers from spoofing [23, 24]. The hypothesis test theory was applied to the open spoofing dataset TEXBAT to verify the detection correctness by Gamba [25]. Some researchers [26–28] proposed a spatial correlation detection algorithm under the motion of a singleantenna receiver to reduce the possibility of spoofing by dynamic receivers and proposed the spoofing cancellation algorithm. However, while the above methods based on singleantenna focus on spoofing detection, little work has been done on spoofing suppression.
With the wide application of adaptive antenna array technology in antijamming receivers, it is currently very difficult to interfere with the receiver via only jamming or spoofing. However, in actual combat, the combination of jamming and spoofing makes the existing independent antijamming algorithms and antispoofing algorithms invalid. A combined GNSS jamming and spoofing suppression algorithm based on multiple antennas in [29] suffers from high calculation costs. To solve these problems, this paper presents a computationally nonintensive method for an antijamming and antispoofing algorithm for a GPS receiver. It first suppresses jamming by projecting the received signals in the orthogonal subspace of the jamming. Then, the receiver estimates the DOAs of satellites based on compressed sensing and detects spoofing via DOA information. Finally, the receiver uses multibeamforming to nullify the spoofing. We analyse the interference suppression performance of the receiver under combined attacks.
2. System Model
The received signal (M×1) is composed of authentic GPS signals, k jamming, n spoofing GPS signals, and noise:where is the steering matrix of the ith authentic GPS signal, is the steering matrix of the spoofing GPS signal, is the steering matrix of the jamming, and (M×1) is time domain waves of the ith authentic signal. () is the time domain waves of the jamming signal. The ith authentic GPS signal can be expressed as and the ith spoofing signal can be expressed as , where is ith C/A code amplitude, is the ith pseudorandom noise (PRN) code, is the ith PRN navigation message, is the angular frequency of L1 signal, is the signal phase [4], and the subscripts a and s, respectively, represent the authentic and spoofing signals. () is the Gaussian noise with zero mean and the variance . The spoofing in this paper is the singleantenna repeater spoofing. Specifically, the spoofer first receives several authentic satellite signals, and it then increases the power of the signals by approximately 3 dB, delays the signal, and broadcasts the spoofed signals in one direction. The power of spoofing is higher than that of an authentic satellite signal, but it is still far below the noise level. Figure 1 shows the severe environment with the spoofing and jamming model.
3. Combined Antijamming and Antispoofing Algorithm (AJAS)
Jamming and spoofing are two major threats to satellite navigation system safety. The current single type interference suppression methods become invalid when jamming and spoofing are jointly used to attack the receivers. The strong jamming reduces the SNR and makes the receiver unable to work, and the spoofing misleads the receiver to get the wrong positioning results. An antijamming receiver is easily misled by spoofing, and an antispoofing receiver will not be able to obtain the characteristics of the spoofing during the joint attack unless it removes the jamming first. Here, we propose a combined antijamming and antispoofing algorithm for a GPS receiver with antenna arrays. The details are presented in the following subsections.
3.1. Antijamming Based on Subspace Projection
Figure 2 shows the GPS receiver antijamming and antispoofing system, which suppresses the jamming based on subspace projection and detects the spoofing by the compressed sensing DOA estimation. If spoofing exists, the receiver uses multibeamforming to eliminate the spoofing and get the authentic position, velocity, and time (PVT).
The selfcorrelation matrix of the received signal can be depicted as follows [30]:where , , denote the selfcorrelation matrix of authentic signals, spoofing and jamming, respectively, and is the identity matrix. The spoofing power is 3 dB higher than the authentic signal, the power of the authentic signal is 20 dB below the noise, and the power of jamming is far higher than the noise. Thus, formula (2) can be approximated asIn case that the jamming and noise are independent of each other, we can estimate the jamming and noise subspaces with the eigendecomposition of the correlation matrix.where () are the eigenvalues of the array covariance matrix, , and is the eigenvector corresponding to the eigenvalue . Determining the jammers based on the eigenvalues and the jamming subspace is defined by the eigenvectors corresponding to the largest eigenvalues and the Mk smallest eigenvectors are defined as the noise subspace .Through the projection of the received signal vector of the arrays to the noise subspace, the jamming component can be effectively suppressed. The orthogonal complement space of jamming can be defined as follows:
As a result, the output vector does not contain jamming, but it may still contain spoofing. The power of an authentic signal and spoofing are still far below that of the noise. The receivers never know the DOA of the spoofing. The conventional DOA algorithm, such as multiple signal classification (MUSIC) [31], estimates the signal parameters via the rotation invariant technique (ESPRIT) [31], which results in incorrect estimates in very low SNRs. In addition, the spoofing is confusing. The spoofing DOA is easy to be regarded as the authentic DOA, which will mislead beamforming to form a main lobe in the direction of spoofing.
3.2. Spoofing Detection and Suppression
The current spoofers mostly use singleantenna transmission spoofing. This use makes the directions of the multiple spoofed signals arriving at the receiver antenna exactly the same, while the authentic signals arrive from totally different directions. The principle of the detection of spoofing involves using highprecision DOA estimation based on the compressed sensing theory to obtain the incoming information. The antijamming output is sent to the acquisition module, which applies correlation integral despreading to improve the SNR. Then, the compressed sensing theory can be used to solve the DOA estimation problem for the despreading signal. The advantages of compressed sensing theory are small snapshots, low SNR, and high resolution. There are numerous possible signal DOAs in space, but only a very limited proportion is in the direction of the actual signal coverage in the whole airspace. Therefore, it is considered that the signal has spatial sparsity. The compressed sensing theory can be used to reconstruct the source signal, and the support sets of the reconstructed signals correspond to the arrival angles of the source signals. A spoofing detection method based on the compressed sensing DOA is feasible.
Since the authentic satellite and spoofing share the same PRN, there are farfield narrowband signals for the ith satellite that arrive at the uniform linear array of elements. Generally speaking, P=2 in one spoofing and authentic satellite coexistence environment. Using them, we can get the antijamming and despreading received signal model. where is the despreading noise, is the sparsity manifold matrix, is the steering vector of uniform linear array, is the carrier frequency, is the speed of light, is the array spacing, and is the DOA of the pth signal. The space is divided into parts on average as . Suppose that each corresponds to a potential signal . Since , is the vector with sparsity. That is to say, there are only elements of signal locations that are nonzero; the rest of the NP elements are zero. Let be the information vector and be the orthogonal basis sparse dictionary. The compressed sensing theory points out that when the signal is compressible or sparse, it can be projected into a low dimensional space via a measurement matrix, and then a certain reconstruction algorithm is used to recover the signal. The compression observation of can be expressed as [31]where is sensing matrix. The information vector can be reconstructed accurately from using the despread received data and the norm optimization. The corresponding sparse reconstruction model can be written as follows:where is a parameter related to the noise level and denotes the norm. Since formula (10) is a convex optimization problem, it can be solved directly by the CVX toolbox [32]. The solutions of formula (10) are the DOAs of the target signal sources.
Assuming that the DOAs of spoofing and the authentic satellite are different, the proposed method can not recognize the spoofing and the real signal when their DOAs are the same. However, the case of the same DOA is a small probability event; even if the two DOAs are exactly the same, the real satellite is moving at all times; the authentic DOA is also changing over time; this method can restore normal work quickly.
Because the spoofer transmits multiple spoofing signals through a single antenna, multiple satellite signals from the same direction can be used as evidence of spoofing. If there is spoofing, the next step is to suppress the spoofing by using adaptive multibeamforming. The adaptive multibeamforming can form main lobes in multiple satellite directions at the same time. The linear constrained minimum variance (LCMV) criterion minimizes the contribution power of noise and any interference from undesired directions, but it can keep the signal in the expected directions. The constrained equation is as follows: is the beamforming weighted vector, is the covariance matrix after the antijamming, is the steering vector constrained matrix, and responds to the spatial filter in each constraint direction. The optimal weighting is
At this point, since the received signals first have gone through the antijamming unit and then the spoofing detection and suppression unit, the GPS receiver can work under a combined jamming and spoofing attack.
4. Simulation Results
To evaluate the performance of the method proposed in this paper, some simulation results are provided in this section. We take a uniform linear array with 9 elements as the multiantenna model. The array space is half of the GPS L1 wavelength, the jamming is wideband interference, the jammingtosignal ratio (JSR) is 40 dB, and the direction of the jamming is 20°. The GPS receiver needs at least four satellites to calculate a position. Therefore, four authentic and four spoofing PRNs are simulated. For example, receiver A receives 4 strong authentic PRNs, which are 18, 22, 24, and 25. The satellite simulator generates the spoofing with the same PRNs and transmits it through a single antenna. The power of the spoofing is 3 dB higher than that of the authentic PRNs. The spoofing PRNs are from the same direction 0°, and the receiver does not know the directions of the authentic and spoofing PRNs. The primary simulation parameters are shown in Table 1.

4.1. Adaptive Array Direction Diagram
As is shown in Figure 3, the red line is the adaptive array direction diagram of the proposed AJAS algorithm, the black line is the adaptive array direction diagram of the spoofing and jamming suppression method (SJSM) [28], and the blue line is the adaptive array direction diagram of the SP [30] antijamming algorithm. The coloured lines show the directions of the authentic PRNs, the spoofer, and the jammer. Since the four spoofing signals come from the same direction, the spoofing degree of freedom is one, the degree of freedom of jamming is one, and the four authentic satellites represent four degrees of freedom; thus, a total of six degrees of freedom are required. Therefore, it is theoretically feasible to use nine element arrays to process six degrees of freedom beamforming in the simulation. Both the AJAS and the SJSM can form a deep null steering beam in the directions of the jammer (approximately 40 dB) and the spoofer (approximately 36 dB) and multibeamform to the four authentic PRNs’ directions, but the SJSM has a small attenuation (approximately 2 dB) in the directions of PRN18 and PRN25 [28]. This attenuation occurs because the SJSM approximates the crosscorrelation matrix of the current signal and the delay signal and ignores the effects of navigation data bit jump. Fortunately, the AJAS does not have these shortcomings. Figure 3 shows that both the AJAS and the SJSM can suppress the combined jamming and spoofing attack, but the interference performance of the AJAS is better than that of the SJSM. The SP only has deep null steering in the direction of the jammer (approximately 41 dB), but its beam is in the spoofing direction. The SP can mitigate jamming, but it cannot detect the spoofing.
4.2. Spoofing Detection
Figure 4 shows the DOA estimates for PRN18, PRN22, PRN24, and PRN25 using the compressed sensing theory. The Xaxis represents the whole space, and the Yaxis represents the probability of the existence of signals in the space. Due to the highly similar navigation message structure between the spoofing and the authentic satellite signal, conventional receivers have difficulty detecting the spoofing. However, the receiver with the proposed AJAS algorithm in this paper detects two PRN18 satellites at 0° and 50°, two PRN22 satellites at 0° and −80°, two PRN24 satellites at 0° and −45°, and two PRN25 satellites at 0° and −45°. Since the spoofings come from the same direction and the directions of the authentic satellite signals are different, we can choose the number of signals at a direction as the spoofing detection threshold; if there are more than two signals at a direction, the receiver can detect the spoofing successfully. Moreover, it is deduced that the DOA of the spoofer is 0°, the DOA of the authentic PRN18 is 50°, the DOA of the authentic PRN22 is 80°, the DOA of the authentic PRN24 is −45°, and the DOA of the authentic PRN25 is −10°. The DOA estimates of the satellites are consistent with the parameters in Table 1, which validates the effectiveness of the DOA algorithm based on compressed sensing.
(a) PRN18 DOA
(b) PRN22 DOA
(c) PRN24 DOA
(d) PRN25 DOA
As shown in Figure 5, both the DOA REMS of compressed sensing and MUSIC decrease with increases in the snapshot and the SNR. The DOA accuracy of the compressed sensing is at least 0.5° better than that of MUSIC at the same SNR and snapshot, which directly affects the spoofing detection and the adaptive array direction diagram. The DOA method based on compressed sensing has the advantages of low computational costs and high accuracy. The complexity of the proposed AJAS algorithm increases more than that of the SP algorithm at a rate of O(ML)^{3}, where denotes the array number and denotes the snapshot. The snapshot is generally 100, and the estimated error is less than 0.1 degree in the experiment. Therefore, the additional computation cost of spoofing detection in AJAS is not high.
However, the SJSM does not mention how to detect the spoofing. It takes the DOA of spoofing as a priori information, which is not suitable for practical application scenario. In contrast, the proposed AJAS uses the compressed sensing method to estimate the DOAs and detect the spoofing. This method is simple, and the detection success rate is high.
4.3. Acquisition Results
Figures 6, 7, 8, and 9 show the twodimensional correlation accumulation acquisitions for PRN25. Figure 6 is the SP antijamming algorithm, Figure 7 is the antispoofing algorithm based on the tracking loop [24], Figure 8 is the proposed AJAS algorithm, and Figure 9 is the SJSM. As shown in Table 1, the Doppler of the spoofing PRN25 is 14 Hz, and the Doppler of the authentic PRN25 is 358 Hz. There are two clear correlation peaks in Figure 6, where the higher peak is spoofed and the other is an authentic signal according to the Doppler. The SP suppresses the jamming but cannot mitigate the spoofing. However, there is no obvious peak in Figure 7, which shows that the receiver only with antispoofing ability cannot capture the satellite under the combined attack of jamming and spoofing because the jamming dominates the correlation peaks. There is only one authentic peak in Figures 8 and 9, but the correlation peak of the AJAS (5.413 × 10^{7}) is higher than that of the SJSM (4.564 × 10^{7}), which means that the proposed AJAS algorithm can suppress the jamming and spoofing better than the SJSM.
Synthesizing the above analysis, we reach the following conclusions:
(I) The proposed AJAS algorithm can nullify the directions of spoofing and jamming and can beam the main lobe at the authentic directions at the same time. A class of algorithms that only suppress jamming (represented by the SP antijamming algorithm) will be spoofed by the spoofing. Other algorithms that can only suppress spoofing (represented by the antispoofing method based on tracking loop) will be dominated by the jamming;
(II) Comparing the proposed AJAS algorithm with the current spoofing and jamming suppression method (SJSM), a method of spoofing detection based on compressed sensing DOA estimation is proposed. The detection is convenient and accurate and has better interference suppression performance.
5. Conclusion
We propose a combined antijamming and antispoofing algorithm for a GPS receiver that can intelligently suppress jamming and spoofing and receive the authentic signal distortion free. The proposed method has convenient, accurate spoofing detection and has better interference suppression performance. It can be integrated into the software program of an adaptive array without the need to adjust the antijamming receiver hardware. Moreover, it does not rely on the attitude information provided by the attitude measuring elements, such as the IMU. The software update increases the low computational costs, but the conventional antijamming GPS receiver becomes an antijamming and antispoofing receiver.
Data Availability
The data used to support the findings of this study are currently under embargo while the research findings are commercialized. Requests for data, 6 months after publication of this article, will be considered by the corresponding author.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
Acknowledgments
This work was supported in part by the National Natural Science Foundation of China under Grants 61571370 and 61202394.
References
 X. Chen, G. Zhang, C. Jiang, and S. Wu, “GNSS augmentation by FM radio symbiosis,” IEEE Access, vol. 6, no. 99, pp. 5162–5169, 2018. View at: Publisher Site  Google Scholar
 M. L. Psiaki and T. E. Humphreys, “Attackers can spoof navigation signals without our knowledge. Here's how to fight back GPS lies,” IEEE Spectrum, vol. 53, no. 8, pp. 26–53, 2016. View at: Google Scholar
 A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys, “Unmanned aircraft capture and control via GPS spoofing,” Journal of Field Robotics, vol. 31, no. 4, pp. 617–636, 2014. View at: Publisher Site  Google Scholar
 A. R. Baziar, M. Moazedi, and M. R. Mosavi, “Analysis of single frequency GPS receiver under delay and combining spoofing algorithm,” Wireless Personal Communications, vol. 83, no. 3, pp. 1955–1970, 2015. View at: Publisher Site  Google Scholar
 M. R. Mosavi, M. J. Rezaei, M. Pashaian, and M. S. Moghaddasi, “A fast and accurate antijamming system based on wavelet packet transform for GPS receivers,” GPS Solutions, vol. 21, no. 2, pp. 415–426, 2017. View at: Publisher Site  Google Scholar
 M. R. Mosavi and F. Shafiee, “Narrowband interference suppression for GPS navigation using neural networks,” GPS Solutions, vol. 20, no. 3, pp. 341–351, 2016. View at: Publisher Site  Google Scholar
 C. H. Kang, S. Y. Kim, and C. G. Park, “A GNSS interference identification using an adaptive cascading IIR notch filter,” GPS Solutions, vol. 18, no. 4, pp. 605–613, 2014. View at: Publisher Site  Google Scholar
 Y.R. Chien, “Design of GPS antijamming systems using adaptive notch filters,” IEEE Systems Journal, vol. 9, no. 2, pp. 451–460, 2015. View at: Publisher Site  Google Scholar
 S. Daneshmand, T. Marathe, and G. Lachapelle, “Millimetre level accuracy GNSS positioning with the blind adaptive beamforming method in interference environments,” Sensors, vol. 16, no. 11, pp. 1824–1842, 2016. View at: Google Scholar
 Y. Wan, F. Chen, J. Nie, and G. Sun, “Optimum reference element selection for GNSS powerinversion adaptive arrays,” IEEE Electronics Letters, vol. 52, no. 20, pp. 1723–1725, 2016. View at: Publisher Site  Google Scholar
 J. Arribas, C. F. Prades, and P. Closas, “Multiantenna techniques for interference mitigation in GSS signal acquisition,” Eurasip Journal on Advances in Signal Processing, vol. 1, no. 1, pp. 143–152, 2013. View at: Google Scholar
 L.W. Chen and J.S. Zheng, “A broadened and deepened antijamming technology for highdynamic GNSS array receivers,” IEICE Transactions on Communications, vol. E99B, no. 9, pp. 2055–2061, 2016. View at: Publisher Site  Google Scholar
 B. Zhang, H. Ma, X.L. Sun, Q. Tan, and H. Pan, “Robust antijamming method for high dynamic global positioning system receiver,” IET Signal Processing, vol. 10, no. 4, pp. 342–350, 2016. View at: Publisher Site  Google Scholar
 F. Chen, J. Nie, B. Li, and F. Wang, “Distortionless spacetime adaptive processor for global navigation satellite system receiver,” IEEE Electronics Letters, vol. 51, no. 25, pp. 21382139, 2015. View at: Publisher Site  Google Scholar
 D. M. Akos, “Who's afraid of the spoofer? GPS/GNSS spoofing detection via automatic gain control (AGC),” NAVIGATION: Journal of the Institute of Navigation, vol. 59, no. 4, pp. 281–290, 2012. View at: Google Scholar
 K. D. Wesson, J. N. Gross, and T. E. Humphreys, “GNSS signal authentication via power and distortion monitoring,” IEEE Transactions on Aerospace & Electronic Systems, vol. 49, no. 2, pp. 1073–1090, 2017. View at: Google Scholar
 T. E. Humphreys, “Detection strategy for cryptographic gnss antispoofing,” IEEE Transactions on Aerospace and Electronic Systems, vol. 49, no. 2, pp. 1073–1090, 2013. View at: Publisher Site  Google Scholar
 H. Tao, H. Li, and M. Lu, “A method of detections’ fusion for GNSS antispoofing,” Sensors, vol. 16, no. 12, pp. 883–904, 2016. View at: Publisher Site  Google Scholar
 M. L. Psiaki, S. P. Powell, and B. W. O'Hanlon, “GNSS spoofing detection: Correlating carrier phase with rapid antenna motion,” GPS World, vol. 24, no. 1, pp. 53–58, 2013. View at: Google Scholar
 M. L. Psiaki, B. W. OHanlon, S. P. Powell et al., “GNSS spoofing detection using twoantenna differential carrier phase,” in Proceedings of the 27th ITM ION, pp. 2776–2800, Florida, USA, 2014. View at: Google Scholar
 C. H. Kang, S. Y. Kim, and C. G. Park, “Adaptive complexEKFbased DOA estimation for GPS spoofing detection,” IET Signal Processing, vol. 12, no. 2, pp. 174–181, 2018. View at: Publisher Site  Google Scholar
 L. W. Zhao, Z. M. Miao, and B. J. Zhang, “A novel spoofing attack detection method in satellite navigation tracking phase,” The Journal of Astronautics, vol. 36, no. 10, pp. 1172–1177, 2015. View at: Google Scholar
 J. Li, J. Zhang, S. Chang, and M. Zhou, “Performance evaluation of multimodal detection method for GNSS intermediate spoofing,” IEEE Access, vol. 4, pp. 9459–9468, 2016. View at: Publisher Site  Google Scholar
 M. R. Mosavi, Z. Nasrpooya, and M. Moazedi, “Advanced antispoofing methods in tracking loop,” Journal of Navigation, vol. 69, no. 4, pp. 883–904, 2016. View at: Publisher Site  Google Scholar
 M. Troglia Gamba, M. D. Truong, B. Motella, E. Falletti, and T. H. Ta, “Hypothesis testing methods to detect spoofing attacks: a test against the TEXBAT datasets,” GPS Solutions, vol. 21, no. 2, pp. 1–13, 2017. View at: Publisher Site  Google Scholar
 A. Broumandan, A. JafarniaJahromi, and G. Lachapelle, “Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver,” GPS Solutions, vol. 19, no. 3, pp. 1–13, 2015. View at: Publisher Site  Google Scholar
 F. Wang, H. Li, and M. Lu, “GNSS spoofing countermeasure with a single rotating antenna,” IEEE Access, vol. 5, no. 99, pp. 8039–8047, 2017. View at: Publisher Site  Google Scholar
 Y. Hu, S. Bian, B. Li, and L. Zhou, “A novel arraybased spoofing and jamming suppression method for GNSS receiver,” IEEE Sensors Journal, vol. 18, no. 7, pp. 2952–2958, 2018. View at: Publisher Site  Google Scholar
 S. Han, L. Chen, W. Meng, and C. Li, “Improve the security of GNSS receivers through spoofing mitigation,” IEEE Access, vol. 5, no. 99, pp. 21057–21069, 2017. View at: Publisher Site  Google Scholar
 L. Wang, R. Wu, W. Wang, D. Lu, and Q. Jia, “Joint GNSS interference mitigation approach for jamming and spoofing based on multiantenna array,” Journal of Electronics and Information Technology, vol. 38, no. 9, pp. 2344–2350, 2016. View at: Google Scholar
 Q. Shen, W. Liu, W. Cui, and S. Wu, “Underdetermined DOA estimation under the compressive sensing framework: a review,” IEEE Access, vol. 4, no. 99, pp. 8865–8878, 2016. View at: Publisher Site  Google Scholar
 H. Li, C. Wang, and X. Zhu, “Compressive sensing for highresolution directionofarrival estimation via iterative optimization on sensing matrix,” International Journal of Antennas and Propagation, vol. 2015, Article ID 713930, 5 pages, 2015. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2019 Qiong Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.