Collaborative Processing of Distributed Receivers of Opportunity for Jamming and Spoofing Mitigation
The fast evolution of the Internet of Things (IoT), commercial Cloud platforms, and the future 5G standards are boosting development of new applications and technologies in the PNT field. Devices are expected to be increasingly connected to Internet in the next few years, storage and processing of data in the Cloud is already a reality, with 5G expected to bring very soon higher data rates and lower latencies to those devices than current 4G Long Term Evolution (LTE). Additionally, some mobile operating system provide an increasing access to raw measurements, including GNSS, WiFi and other sensors (as an example, Wi-Fi round-trip time is available in the first developer preview build of Android P).
In this context, the exploitation of GNSS signal snapshots and observables, together with other sensors’ measurements and peer-to-peer communications, seems to constitute a feasible approach to enable new signal processing techniques. In particular, the collaborative processing of distributed receivers of opportunity (RoO) in close-by locations is a promising research area that could play an important role in the near future to solve some of the limitations faced by current GNSS receivers in the presence of jamming and spoofing attacks.
The main objective of the proposed activity is to design, develop and demonstrate innovative collaborative processing techniques for mitigation of jamming and spoofing attacks. The signals from multiple receivers of opportunity in close-by locations, together with the available peer-to-peer communications between them, as well as other signals of opportunity of interest, can be jointly exploited for detection and mitigation of jamming and spoofing attacks. These techniques can be implemented and assessed under controlled jamming and spoofing attacks. Representative user technologies and propagation conditions can be considered.
The proposed activity focuses on study and design of innovative collaborative processing techniques for mitigation of jamming and spoofing attacks. The developed techniques can be implemented in a software concept demonstrator and assessed in controlled laboratory conditions.
The tasks to be performed will include:
- consolidation of the state-of-art on jamming and spoofing detection, mitigation and localization;
- consolidation of requirements for the targeted use cases, in particular those relating to IoT, LBS and autonomous driving applications;
- identification of promising techniques based on representative receiver technologies for different use cases, including trade-offs based on simulations;
- preliminary design, implementation and validation of a software concept demonstrator.
The results of the activity will provide:
- a complete understanding of achievable capabilities of the proposed techniques and related detection, mitigation and localization performance of the engineered solutions, supported by trade-off analyses;
- a vision of how a more systematic approach to mitigation could benefit from cooperative processing;
- a software concept demonstrator, with associated results and user manual.
Results from related GSA activities (e.g. ‘Advanced interference detection and robustness capabilities’, Fundamental Elements) will be duly considered and the activity coordinated, in particular focussing on innovative concepts for spoofing detection not yet addressed.