{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T07:09:32Z","timestamp":1774508972760,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T00:00:00Z","timestamp":1633996800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSFC project","award":["No.51827806"],"award-info":[{"award-number":["No.51827806"]}]},{"name":"the National Key Research and Development Program of China","award":["2016YFB0501201"],"award-info":[{"award-number":["2016YFB0501201"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Spoofing attacks are one of the severest threats for global navigation satellite systems (GNSSs). This kind of attack can damage the navigation systems of unmanned air vehicles (UAVs) and other unmanned vehicles (UVs), which are highly dependent on GNSSs. A novel method for GNSS spoofing detection based on a coupled visual\/inertial\/GNSS positioning algorithm is proposed in this paper. Visual inertial odometry (VIO) has high accuracy for state estimation in the short term and is a good supplement for GNSSs. Coupled VIO\/GNSS navigation systems are, unfortunately, also vulnerable when the GNSS is subject to spoofing attacks. The method proposed in this article involves monitoring the deviation between the VIO and GNSS under an optimization framework. A modified Chi-square test triggers the spoofing alarm when the detection factors become abnormal. After spoofing detection, the optimal estimation algorithm is modified to prevent it being deceived by the spoofed GNSS data and to enable it to carry on positioning. The performance of the proposed spoofing detection method is evaluated through a real-world visual\/inertial\/GNSS dataset and a real GNSS spoofing attack experiment. The results indicate that the proposed method works well even when the deviation caused by spoofing is small, which proves the efficiency of the method.<\/jats:p>","DOI":"10.3390\/s21206769","type":"journal-article","created":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T06:38:41Z","timestamp":1634107121000},"page":"6769","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["GNSS Spoofing Detection Based on Coupled Visual\/Inertial\/GNSS Navigation System"],"prefix":"10.3390","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6660-3723","authenticated-orcid":false,"given":"Nianzu","family":"Gu","sequence":"first","affiliation":[{"name":"Department of Precision Instrument, Tsinghua University, Beijing 100084, China"},{"name":"Beijing Innovation Center for Future Chips (ICFC), Beijing 100084, China"}]},{"given":"Fei","family":"Xing","sequence":"additional","affiliation":[{"name":"Department of Precision Instrument, Tsinghua University, Beijing 100084, China"}]},{"given":"Zheng","family":"You","sequence":"additional","affiliation":[{"name":"Department of Precision Instrument, Tsinghua University, Beijing 100084, China"},{"name":"Beijing Innovation Center for Future Chips (ICFC), Beijing 100084, China"}]}],"member":"1968","published-online":{"date-parts":[[2021,10,12]]},"reference":[{"key":"ref_1","unstructured":"Groves, P. (2007). Principles of GNSS, Inertial, and Multi-Sensor Integrated Navigation Systems, Artech House."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s11633-018-1137-8","article-title":"A New Approach to Estimate True Position of Unmanned Aerial Vehicles in an INS\/GPS Integration System in GPS Spoofing Attack Conditions","volume":"15","author":"Majidi","year":"2018","journal-title":"Int. J. Autom. Comput."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Cheng, X., Cao, K., Xu, J., and Li, B. (2009, January 24\u201326). Analysis on forgery patterns for GPS civil spoofing signals. Proceedings of the 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT \u201909), Seoul, Korea.","DOI":"10.1109\/ICCIT.2009.88"},{"key":"ref_4","unstructured":"(2021, May 31). Iran\u2019s Alleged Drone Hack: Tough, But Possible. Available online: http:\/\/www.wired.com\/dangerroom\/2011\/12\/iran-drone-hack-gps."},{"key":"ref_5","unstructured":"Shepard, D., Bhatti, J., and Humphreys, T. (2012, January 17\u201321). Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. Proceedings of the ION GNSS Meeting, Nashville, TN, USA."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1002\/rob.21513","article-title":"Unmanned Aircraft Capture and Control Via GPS Spoofing","volume":"31","author":"Kerns","year":"2014","journal-title":"J. Field Robot."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1002\/navi.183","article-title":"Hostile Control of Ships via False GPS Signals: Demonstration and Detection","volume":"64","author":"Bhatti","year":"2017","journal-title":"J. Inst. Navig."},{"key":"ref_8","first-page":"127072","article-title":"GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques","volume":"2012","author":"Broumandan","year":"2012","journal-title":"Int. J. Navig. Obs."},{"key":"ref_9","unstructured":"Jafarnia-Jahromi, A. (2013). GNSS Signal Authenticity Verification in the Presence of Structural Interference. [Ph.D. Dissertation, Department of Geomatics Engineering, University of Calgary]."},{"key":"ref_10","unstructured":"Montgomery, P.Y., Humphreys, T.E., and Ledvina, B.M. (2009, January 26\u201328). Receiver-autonomous spoofing detection: Experimental results of a multi-antenna receiver defense against a portable civil GPS spoofer. Proceedings of the Institute of Navigation-International Technical Meeting, Anaheim, CA, USA."},{"key":"ref_11","unstructured":"McDowell, C.E. (2007). GPS Spoofer and Repeater Mitigation System using Digital Spatial Nulling. (7250903 B1), U.S. Patent."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/s10291-014-0407-3","article-title":"Spoofing detection, classification and cancelation (SDCC) receiver architecture for a moving GNSS receiver","volume":"19","author":"Broumandan","year":"2015","journal-title":"GPS Solut."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lo, S.C., and Enge, P.K. (2010, January 4\u20136). Authenticating aviation augmentation system broadcasts. Proceedings of the IEEE\/ION Position, Location and Navigation Symposium (PLANS \u201910), Indian Wells, CA, USA.","DOI":"10.1109\/PLANS.2010.5507223"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Cheng, X.J., Xu, J.N., Cao, K.J., and Jie, W. (2009, January 24\u201326). An authenticity verification scheme based on hidden messages for current civilian GPS signals. Proceedings of the 4th International Conference on Computer Sciences and Convergence Information Technology (ICCIT \u201909), Seoul, Korea.","DOI":"10.1109\/ICCIT.2009.91"},{"key":"ref_15","first-page":"58","article-title":"Authenticating GNSS: Proofs Against Spoofs Part 2","volume":"2","author":"Hein","year":"2007","journal-title":"GNSS Mag."},{"key":"ref_16","unstructured":"Levin, P., De Lorenzo, D., Enge, P., and Lo, S. (2011). Authenticating a Signal Based on an Unknown Component Thereof. U.S. Patent, 7969354 B2."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1002\/navi.44","article-title":"Real-time GPS spoofing detection via correlation of encrypted signals","volume":"60","author":"Psiaki","year":"2013","journal-title":"Navigation"},{"key":"ref_18","unstructured":"Scott, L. (2003, January 9\u201312). Anti-spoofing and authenticated signal architectures for civil navigation systems. Proceedings of the ION GPS\/GNSS, Portland, OR, USA."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1258","DOI":"10.1109\/JPROC.2016.2526658","article-title":"GNSS Spoofing and Detection","volume":"104","author":"Psiaki","year":"2016","journal-title":"Proc. IEEE"},{"key":"ref_20","unstructured":"Jafarnia Jahromi, A., Lin, T., Broumandan, A., Nielsen, J., and Lachapelle, G. (2012, January 30\u201331). Detection and mitigation of spoofing attack on a vector based tracking GPS receiver. Proceedings of the International Technical Meeting of The Institute of Navigation, Newport Beach, CA, USA."},{"key":"ref_21","unstructured":"Carroll, J., and Montgomery, K. (2008, January 1\u20134). Global positioning system timing criticality assessment preliminary performance results. Proceedings of the 40th Annual Precise Time and Time Interval(PTTI) Meeting, Reston, VA, USA."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2897166","article-title":"A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures","volume":"48","author":"Schmidt","year":"2016","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Qiao, Y.R., Zhang, Y.X., and Du, X. (2017, January 15\u201317). A Vision-Based GPS-Spoofing Detection Method for Small UAVs. Proceedings of the 13th International Conference on Computational Intelligence and Security (CIS), Hong Kong, China.","DOI":"10.1109\/CIS.2017.00074"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Geiger, A., Lenz, P., and Urtasun, R. (2012, January 11\u201315). Are we ready for autonomous driving? The kitti vision benchmark suite. Proceedings of the IEEE International Conference on Pattern Recognition, Tsukuba, Japan.","DOI":"10.1109\/CVPR.2012.6248074"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/TRO.2018.2853729","article-title":"VINS-Mono: A Robust and Versatile Monocular Visual-Inertial State Estimator","volume":"34","author":"Qin","year":"2018","journal-title":"IEEE Trans. Robot."},{"key":"ref_26","unstructured":"Qin, T., Pan, J., Cao, S., and Shen, S. (2019). A General Optimization-based Framework for Local Odometry Estimation with Multiple Sensors. arXiv."},{"key":"ref_27","unstructured":"Agarwal, S., and Mierle, K. (2021, October 05). Ceres Solver. Available online: http:\/\/ceres-solver.org."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6769\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T07:12:11Z","timestamp":1760166731000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/21\/20\/6769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,12]]},"references-count":27,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2021,10]]}},"alternative-id":["s21206769"],"URL":"https:\/\/doi.org\/10.3390\/s21206769","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,12]]}}}