{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T20:26:23Z","timestamp":1773779183502,"version":"3.50.1"},"reference-count":35,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T00:00:00Z","timestamp":1669334400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"the State Key Laboratory of Precision Measurement Technology and Instruments, Tsinghua University","award":["51827806"],"award-info":[{"award-number":["51827806"]}]},{"name":"the State Key Laboratory of Precision Measurement Technology and Instruments, Tsinghua University","award":["U21A6003"],"award-info":[{"award-number":["U21A6003"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Visual\/Inertial\/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks. Relevant research on the harm that spoofing causes to the system and performance analyses of VIG systems under GNSS spoofing are not sufficient. In this paper, an open-source VIG algorithm, VINS-Fusion, based on nonlinear optimization, is used to analyze the performance of the VIG system under a GNSS spoofing attack. The influence of the visual inertial odometer (VIO) scale estimation error and the transformation matrix deviation in the transition period of spoofing detection is analyzed. Deviation correction methods based on the GNSS-assisted scale compensation coefficient estimation method and optimal pose transformation matrix selection are proposed for VIG-integrated system in spoofing areas. For an area that the integrated system can revisit many times, a global pose map-matching method is proposed. An outfield experiment with a GNSS spoofing attack is carried out in this paper. The experiment result shows that, even if the GNSS measurements are seriously affected by the spoofing, the integrated system still can run independently, following the preset waypoint. The scale compensation coefficient estimation method, the optimal pose transformation matrix selection method and the global pose map-matching method can depress the estimation error under the circumstances of a spoofing attack.<\/jats:p>","DOI":"10.3390\/rs14235975","type":"journal-article","created":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T07:01:30Z","timestamp":1669618890000},"page":"5975","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Visual\/Inertial\/GNSS Integrated Navigation System under GNSS Spoofing Attack"],"prefix":"10.3390","volume":"14","author":[{"given":"Nianzu","family":"Gu","sequence":"first","affiliation":[{"name":"Department of Precision Instrument, Tsinghua University, Beijing 100084, China"},{"name":"State Key Laboratory of Precision Measurement Technology and Instruments, Tsinghua University, Beijing 100084, China"}]},{"given":"Fei","family":"Xing","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Precision Measurement Technology and Instruments, Tsinghua University, Beijing 100084, China"}]},{"given":"Zheng","family":"You","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Precision Measurement Technology and Instruments, Tsinghua University, Beijing 100084, China"},{"name":"Beijing Advanced Innovation Center for Integrated Circuits, Beijing 100084, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,11,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Schreiber, M., K\u00f6nigshof, H., Hellmund, A., and Stiller, C. (2016, January 19\u201322). Vehicle localization with tightly coupled GNSS and visual odometry. Proceedings of the 2016 IEEE Intelligent Vehicles Symposium (IV), Gothenburg, Sweden.","DOI":"10.1109\/IVS.2016.7535488"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"12105","DOI":"10.1109\/JSEN.2019.2935387","article-title":"Tightly Coupled Integration of GNSS and Vision SLAM Using 10-DoF Optimization on Manifold","volume":"19","author":"Gong","year":"2019","journal-title":"IEEE Sens. J."},{"key":"ref_3","first-page":"127072","article-title":"GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques","volume":"2012","author":"Broumandan","year":"2012","journal-title":"Int. J. Navig. Obs."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","article-title":"GNSS spoofing and detection","volume":"104","author":"Psiaki","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2898","DOI":"10.1109\/TITS.2017.2665968","article-title":"Cyber threats facing autonomous and connected vehicles: Future challenges","volume":"18","author":"Parkinson","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","unstructured":"Shepard, D., Bhatti, J., and Humphreys, T. (2012, January 17\u201321). Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Proceedings of the ION GNSS Meeting, Nashville, TN, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3309735","article-title":"Tractor beam: Safe-hijacking of consumer drones with adaptive GPS spoofing","volume":"22","author":"Noh","year":"2019","journal-title":"TOPS"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1002\/rob.21513","article-title":"Unmanned Aircraft Capture and Control Via GPS Spoofing","volume":"31","author":"Kerns","year":"2014","journal-title":"J. Field Robot."},{"key":"ref_9","unstructured":"Groves, P. (2007). Principles of GNSS, Inertial, and Multi-Sensor Integrated Navigation Systems, Artech House."},{"key":"ref_10","unstructured":"Aumayer, B. (2016). Ultra-tightly Coupled Vision\/GNSS for Automotive Applications. [Ph.D. Thesis, University of Calgary]."},{"key":"ref_11","unstructured":"Qin, T., Pan, J., Cao, S., and Shen, S. (2019). A General Optimization-based Framework for Local Odometry Estimation with Multiple Sensors. arXiv."},{"key":"ref_12","unstructured":"Cao, S., Lu, X., and Shen, S. (2021). GVINS: Tightly Coupled GNSS-Visual-Inertial Fusion for Smooth and Consistent State Estimation. arXiv."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Meng, L., Yang, L., Yang, W., and Zhang, L. (2022). A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens., 14.","DOI":"10.3390\/rs14194826"},{"key":"ref_14","unstructured":"Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O\u2019Hanlon, B.W., and Kintner, P.M. (2008, January 16\u201319). Assessing the Spoofing Threat: Development of a Portable GPS Civilian Spoofer. Proceedings of the International Technical Meeting of the Satellite Division of the Institute of Navigation, Savannah, GA, USA."},{"key":"ref_15","unstructured":"Tanil, C., Khanafseh, S., and Pervan, B. (2015, January 20\u201323). The impact of wind gust on detectability of GPS spoofing attack using RAIM with INS coupling. Proceedings of the ION 2015 Pacific PNT Meeting, Honolulu, HI, USA."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"2006","DOI":"10.2514\/1.G002547","article-title":"Detecting global navigation satellite system spoofing using inertial sensing of aircraft disturbance","volume":"40","author":"Tanil","year":"2017","journal-title":"J. Guid. Control. Dyn."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1049\/iet-rsn.2019.0264","article-title":"Spoofing profile estimation-based GNSS spoofing identification method for tightly coupled. MEMS INS\/GNSS integrated navigation system","volume":"14","author":"Yimin","year":"2019","journal-title":"IET Radar Sonar Navig."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Broumandan, A., and Lachapelle, G. (2018). Spoofing Detection Using GNSS\/INS\/Odometer Coupling for Vehicular Navigation. Sensors, 18.","DOI":"10.3390\/s18051305"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Qiao, Y.R., Zhang, Y.X., and Du, X. (2017, January 15\u201317). A Vision-Based GPS-Spoofing Detection Method for Small UAVs. Proceedings of the 13th International Conference on Computational Intelligence and Security (CIS), Hong Kong, China.","DOI":"10.1109\/CIS.2017.00074"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Gu, N., Xing, F., and You, Z. (2021). GNSS Spoofing Detection Based on Coupled Visual\/Inertial\/GNSS Navigation System. Sensors, 21.","DOI":"10.3390\/s21206769"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Song, J., Wu, H., Guo, X.C., Jiang, D., Guo, X.Q., Lv, T., and Luo, H. (2022). GNSS Spoofing Identification and Smoothing Localization Method for GNSS\/Visual SLAM System. Appl. Sci., 12.","DOI":"10.3390\/app12031386"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Geiger, A., Lenz, P., and Urtasun, R. (2012, January 11\u201315). Are we ready for autonomous driving? The kitti vision benchmark suite. Proceedings of the IEEE International Conference on Pattern Recognition, Tsukuba, Japan.","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hong, E., and Lim, J. (2018). Visual-Inertial Odometry with Robust Initialization and Online Scale Estimation. Sensors, 18.","DOI":"10.20944\/preprints201809.0509.v1"},{"key":"ref_24","unstructured":"Surber, J., Teixeira, L., and Chli, M. (June, January 29). Robust Visual-Inertial Localization with Weak GPS Priors for Repetitive UAV Flights. Proceedings of the IEEE International Conference on Robotics and Automation (ICRA), Singapore."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Oleynikova, H., Burri, M., Lynen, S., and Siegwart, R. (2015, January 4\u20138). Real-time visual-inertial localization for aerial and ground robots. Proceedings of the IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS), Macau, China.","DOI":"10.1109\/IROS.2015.7353802"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/TRO.2018.2853729","article-title":"VINS-Mono: A Robust and Versatile Monocular Visual-Inertial State Estimator","volume":"34","author":"Qin","year":"2018","journal-title":"IEEE Trans. Robot."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1874","DOI":"10.1109\/TRO.2021.3075644","article-title":"ORB-SLAM3: An Accurate Open-Source Library for Visual, Visual\u2013Inertial, and Multimap SLAM","volume":"37","author":"Campos","year":"2021","journal-title":"IEEE Trans. Robot."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/TRO.2015.2463671","article-title":"ORB-SLAM: A Versatile and Accurate Monocular SLAM System","volume":"31","author":"Montiel","year":"2015","journal-title":"IEEE Trans. Robot."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1255","DOI":"10.1109\/TRO.2017.2705103","article-title":"Orb-slam2: An open-source slam system for monocular, stereo, and rgb-d cameras","volume":"33","year":"2017","journal-title":"IEEE Trans. Robot."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"118273","DOI":"10.1109\/ACCESS.2020.3000555","article-title":"SIMSF: A Scale Insensitive Multi-Sensor Fusion Framework for Unmanned Aerial Vehicles Based on Graph Optimization","volume":"8","author":"Dai","year":"2020","journal-title":"IEEE Access"},{"key":"ref_31","unstructured":"Agarwal, S., Mierle, K., and The Ceres Solver Team (2022, November 20). Ceres Solver. Available online: http:\/\/ceres-solver.org."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1188","DOI":"10.1109\/TRO.2012.2197158","article-title":"Bags of Binary Words for Fast Place Recognition in Image Sequences","volume":"28","author":"Tardos","year":"2012","journal-title":"IEEE Trans. Robot."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Rosten, E., and Drummond, T. (2006, January 7\u201313). Machine learning for high-speed corner detection. Proceedings of the European Conference on Computer Vision, Graz, Austria.","DOI":"10.1007\/11744023_34"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Calonder, M., Lepetit, V., Strecha, C., and Fua, P. (2010, January 5\u201311). BRIEF: Binary Robust Independent Elementary Features. Proceedings of the European Conference on Computer Vision, Crete, Greece.","DOI":"10.1007\/978-3-642-15561-1_56"},{"key":"ref_35","unstructured":"Arthur, D., and Vassilvitskii, S. (2007, January 7\u20139). K-means++: The advantages of careful seeding. Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, New Orleans, LA, USA."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/23\/5975\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:26:55Z","timestamp":1760146015000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/14\/23\/5975"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,25]]},"references-count":35,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["rs14235975"],"URL":"https:\/\/doi.org\/10.3390\/rs14235975","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,25]]}}}