Factor Graph-based Spoofing Mitigation using the Chimera Signal Enhancement
Ashwin V. Kanhere, Tara Mina, Akshay Shetty and Grace Gao
ION GNSS+ 2022
Civilian GNSS Signals are Vulnerable to Spoofing Attacks
1
[2] Above Us Only Stars, C4ADS 2019
[1] Report on PNT capabilities of GPS, US DHS 2017
Civilian GPS signals are used in critical infrastructure such as communication, finance, emergency services and the power grid
[3] Goward, GPS World 2020
Documented instances of “circle spoofing” across the world, spoofed to Western North American coast[3]
Chimera Signal Enhancement would�Provide Security to Civilian Signals[4]
2
[4] Anderson et al., ION GNSS+ 2017
Slow channel
Fast channel
Markers
Markers
Key from data signal
Authentication every �3 mins
Key from external signal
Authentication every �1.5 or 6 secs
Self-Contained Odometry can Augment �Low Latency GPS Measurements
3
True trajectory
Odometry-only trajectory
Odometry + GPS trajectory
Spoofed GPS trajectory
Self-Contained Odometry Sensors can�Mitigate Attacks Between Authentication
4
True trajectory
Odometry-only trajectory
Odometry + authentic GPS �trajectory
Spoofed GPS trajectory
Unauthenticated GPS
Authenticated GPS
[5] Esswein et al., ION GNSS+ 2021
[6] Mina et al., ION GNSS+ 2021
Spoofed GPS and odometry deviate
This work: Combine self-contained odometry with Chimera-enhanced GPS measurements to mitigate effect of spoofing attacks between authentication
Filtering and Optimization Approaches�to Mitigate Spoofing
Session F6: GNSS Receivers Robust to Vulnerabilities
GPS Spoofing-Resilient Filtering with Chimera and Self-Contained Odometry
Tara Mina, Ashwin V. Kanhere, Akshay Shetty and Grace Gao
We explored both filtering and batch optimization approaches this summer:
Session B6b: Spectrum: Protection and Optimization
Factor-Graph-based Spoofing Mitigation using Chimera Signal Enhancement
Ashwin V. Kanhere, Tara Mina, Akshay Shetty and Grace Gao
5
THIS PRESENTATION
Contributions
6
Factor Graph-based Spoofing Mitigation �using the Chimera Signal Enhancement
7
Factor Graphs Perform Batch�Optimization For State Estimation
8
Factor Graphs Perform Batch�Optimization For State Estimation
9
Iteration:
0
1
2
Factor Graphs Perform Batch�Optimization For State Estimation
10
New measurements received
Old states and measurements removed
Factor Graph Optimization (FGO) �Loss Functions
11
[8] Sunderhauf, PhD Thesis(2012)
[7] Wen et al. NAVIGATION (2021)
Add over all graph edges in window
Received measurement
Expected measurement
Measurement covariance
Error vector
Switchable constraint value
Regularization function
Factor Graph With Switchable �Constraint
12
Factor Graph-based Spoofing Mitigation �using the Chimera Signal Enhancement
13
FGO-based Spoofing Mitigation with �Chimera: Formulation
14
FGO-based Spoofing Mitigation with �Chimera: States
15
FGO-based Spoofing Mitigation with �Chimera: Measurements
16
[9] Lupton et al. IEEE TRO, 2012
FGO-based Spoofing Mitigation with�Chimera: Authentication Loop Closure
17
FGO-based Spoofing Mitigation with�Chimera: Loss Function
Naïve loss formulation
18
IMU odometry loss term
Wheel encoder odometry loss term
GPS position loss term
FGO-based Spoofing Mitigation with�Chimera: Loss Function
Spoofing robust loss formulation
19
IMU odometry loss term
Wheel encoder odometry loss term
Weighted GPS position loss term
Switching constraint regularization
Penalize multiple switches
Factor Graph-based Spoofing Mitigation �using the Chimera Signal Enhancement
20
Simulation Setup And Parameters
21
Sensor | Update Rate | |
GPS | | |
IMU | | |
Wheel Encoder | | |
[9] Lupton et al. IEEE TRO, 2012
Simulation Setup And Parameters
22
Accuracy Comparison: �Robust FGO vs. Naïve FGO
23
Method/Trajectory | Mean Error�(in meters) | Max error�(in meters) |
Robust FGO/Nominal | | |
Robust FGO/Spoofed | | |
Naïve FGO/Nominal | | |
Naïve FGO/Spoofed | | |
Spoofing start
Robust FGO mitigates spoofing, improving accuracy over naïve FGO
Switching Constraint Value Under�Nominal And Spoofed Conditions
24
Authentication propagates to previous times in window on authentication
Lack of Chimera authentication during spoofing prevents loop closure
Spoofing start
Performance with and without Chimera Authentication for Nominal Trajectory
25
Method/Trajectory | Mean Error�(in meters) | Max error�(in meters) |
Robust FGO/Nominal�With Chimera | | |
Robust FGO/Nominal Without Chimera | | |
Using Chimera authentication results in accuracy improvement
Factor Graph-based Spoofing Mitigation �using the Chimera Signal Enhancement
26
Summary
27
Acknowledgments
28
Summary
29