Skip to main content

REVIEW article

Front. Phys.
Sec. Space Physics
Volume 12 - 2024 | doi: 10.3389/fphy.2024.1425084
This article is part of the Research Topic Frontiers in Multi-Source Positioning, Navigation and Timing (PNT) View all 3 articles

Development status and challenges of anti-spoofing technology of GNSS/INS integrated navigation

Provisionally accepted
  • 1 School of Electronic Science, National University of Defense Technology, Changsha, China
  • 2 Key Laboratory of Satellite Navigation Technology, Changsha, China

The final, formatted version of the article will be published soon.

    The threat of spoofing interference has posed a severe challenge to the security application of Global Navigation Satellite System (GNSS). It is particularly urgent and critical to carry out indepth defense research on spoofing interference. When combined with the inertial navigation system (INS), the GNSS/INS integrated navigation system offers distinct advantages in the field of antispoofing technology research, which has garnered significant attention in recent years. To summarize the current research achievements of GNSS/INS integrated navigation anti-spoofing technology, it is necessary to provide an overview of the three core technical aspects of spoofing attack principles and implementation strategies, spoofing detection, and spoofing mitigation. First, the principles and implementation strategies of spoofing interference attacks are introduced, and different classifications of spoofing interference attacks are given. Then, the performance characteristics and technical points of different spoofing detection and spoofing mitigation methods are compared and analyzed, and the shortcomings and challenges in the current development of GNSS/INS antispoofing technology are pointed out. Finally, based on the summary and shortcomings of the existing technology, a prospect for the future development of GNSS/INS integrated navigation anti-spoofing technology is discussed.

    Keywords: anti-spoofing, GNSS/INS integrated navigation, Spoofing interference, Spoofing detection, Spoofing mitigation

    Received: 29 Apr 2024; Accepted: 23 Sep 2024.

    Copyright: © 2024 Wang, Chen, Li, Liu, Li and Lu. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

    * Correspondence: Baiyu Li, School of Electronic Science, National University of Defense Technology, Changsha, China

    Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.