Abstract
Global Navigation Satellite System (GNSS) signals are highly vulnerable to spoofing attacks, which can cause positioning errors and pose serious threats to user receivers. Therefore, the development of efficient and reliable spoofing detection techniques has become an urgent requirement for ensuring GNSS security. In spoofing attacks, attackers introduce additional bias in the Doppler shift. However, detection methods that rely on extracting this deviation from raw measurements suffer from limited practicality, and existing alternative detection schemes based on position, velocity, and time (PVT) information exhibit poor adaptability to diverse scenarios. To address these limitations, this paper proposes a spoofing detection method based on the self-consistency verification of the receiver’s clock state (SCV-RCS). Its core statistic is the cumulative difference between the estimated clock bias and the bias obtained by integrating clock drift. By monitoring this consistency, SCV-RCS identifies anomalies in pseudorange and Doppler observations without complex bias extraction or auxiliary hardware, ensuring easy deployment. Simulation and experimental results demonstrate the method’s effectiveness across diverse spoofing scenarios. It achieves the fastest alarm delay of ≤2 s while providing continuous alerting capability in full-channel and partial-channel spoofing. This study provides a robust and reliable solution for GNSS receivers operating in complex spoofing environments.
Keywords: GNSS, spoofing detection, Doppler shift, pseudorange, clock bias, clock drift
1. Introduction
With the development and refinement of Global Navigation Satellite Systems (GNSSs), GNSSs can provide massive users with continuous, worldwide coverage of precise position, velocity, and time (PVT) information [1,2,3,4]. GNSSs play a vital role not only in military applications but also in critical civilian fields such as transportation, power grid inspection, emergency response, and smart logistics [5,6,7,8]. However, the extremely low signal strength and open signal structure of GNSS civilian signals make them an ideal entry point for malicious spoofing attacks [9,10,11]. Such attacks aim to manipulate the PVT solutions of target receivers without detection, thereby disrupting normal operations and posing serious threats to various GNSS users [12,13,14]. Consequently, conducting research on accurately detecting GNSS spoofing attacks has become a key issue for ensuring the security of navigation services and promoting the sustainable development of GNSS applications.
Doppler shift reflects the relative velocity between a satellite and a user’s receiver [15,16]. Under normal conditions, due to the high predictability of satellite orbits and the consistency of signal propagation paths, the Doppler shift in GNSS signals aligns with the receiver’s actual motion. In spoofing scenarios, however, it is difficult for attackers to estimate the user’s true state accurately and in real time [17]. As a result, the counterfeit signals they generate are affected by the relative motion between the spoofing device and the user, introducing unavoidable deviations in the observed Doppler shift. Therefore, Doppler bias modeling and analysis have emerged as effective methods to detect spoofing signals [18,19,20,21,22,23,24], particularly in dynamic scenarios.
In the common single-antenna spoofing scenario, the spoofed signal is transmitted from a single antenna and reaches the receiver through a shared propagation path [25]. Based on this setup, some methods attempt to detect spoofing by examining the correlation of Doppler shift across different channels [18,19]. To mitigate interference from satellite motion and receiver clock drift, some studies have attempted to extract implicit Doppler bias from raw measurement using interpolation [20]. However, this method assumes an initialization process under spoofing conditions and a stationary user, which limits its practical applicability. In addition, discrimination is achieved by computing the first-order difference in Doppler shift across channels [21]. In this approach, authentic signals exhibit nonlinear frequency difference due to the receiver motion, while spoofed signals appear linear as Doppler biases cancel out. Nevertheless, this technique requires significant nonlinear motion from the receiver and fails in partial spoofing scenarios where only a channel is affected. To improve detection performance, Doppler ripple has been proposed as a feature, which depends on vertical reciprocating motion of the receiver and may result in false alarms in typical scenarios such as smooth vehicle driving [22]. Although dual-difference methods [23] and multi-receiver architectures [24] have been developed to address these limitations, they often demand complex hardware setups, posing challenges for real-world deployment.
The above studies typically extract Doppler bias directly from raw measurements. As these deviations are deeply embedded in the original observations, additional processing is required for their extraction, which reduces the practical applicability. In fact, Doppler bias not only affect the Doppler measurements themselves but also interfere with the PVT solution [26]. Clock drift, a shared component of Doppler shift, has been proposed as an alternative detection metric by monitoring anomalies in its estimated values [27]. Additionally, the impact of spoofing on navigation integrity can be indirectly assessed by analyzing Doppler positioning residuals [28]. By comparing the Doppler velocity measurement with the rate of change in pseudorange [29], or the results of direct velocity determination and indirect velocity determination [17], inconsistencies introduced by spoofing in pseudorange and Doppler measurements can also be identified. However, these techniques have limited applicability and struggle to effectively address both full-channel and partial-channel spoofing scenarios. Furthermore, their detection performance is highly dependent on the relative velocity between the user and the spoofer. In low-speed or quasi-static environments, the detection probability may drop significantly.
Based on the above considerations, this paper proposes a spoofing detection technique grounded in the self-consistent verification of receiver’s clock state (SCV-RCS). The method detects anomalies introduced by spoofed signals in pseudorange and Doppler observations by monitoring the consistency between clock bias and clock drift. Under normal conditions, these clock parameters are governed by the physical characteristics of the receiver’s local oscillator and follow a stable intrinsic correlation. In this case, both pseudorange and Doppler observations accurately reflect the geometric relationship and relative motion between the user and the satellite, resulting in self-consistent clock parameter solutions. In contrast, under spoofing conditions, spoofed signals inject additional delay into the pseudorange measurement and induce abnormal bias in Doppler shift. This disrupts the inherent consistency between pseudorange and Doppler shift, leading to a breakdown in the correlation between clock bias and drift in the estimation process. Leveraging this characteristic, the proposed method constructs a self-consistency detection metric, SCV-RCS, for clock states to achieve effective spoofing detection. This method inherently bypasses the need for complex bias extraction from raw measurements and requires no auxiliary hardware, resulting in high practical applicability. Extensive evaluations were carried out through simulation, semi-hardware testing, and real-data experiments using the TEXBAT dataset. The results show that this method is applicable to various spoofing attack scenarios and does not rely on the motion state of the receiver. It has technical advantages such as low detection delay, stable performance and continuous detection. This provides a practical and efficient approach for enhancing the anti-spoofing capabilities of GNSS receivers.
The remainder of this paper is structured as follows: Section 2 describes the signal model. Section 3 presents the proposed detection method. Section 4 and Section 5 provide extensive simulation and experimental results along with analysis under various conditions. Finally, Section 6 concludes the paper.
2. Signal Model
This section presents a detailed analysis of how spoofed signals systematically corrupt pseudorange and Doppler measurements. To provide analytical clarity and facilitate geometric interpretation, all signal propagation and processing time delays referenced in this work are converted into equivalent spatial distances by multiplication with the speed of light, with results uniformly expressed in meters. To synchronize the analysis with clock bias variations, clock drift is similarly multiplied by the speed of light to obtain an equivalent velocity.
2.1. Spoofing Attack Model
Figure 1 shows a typical single-antenna GNSS spoofing scenario. In the absence of spoofing, the receiver processes authentic GNSS signals, resulting in a correct PVT solution that reflects the real state. However, under the spoofing attacks, the spoofer processes GNSS signals (e.g., deliberate delay, power amplification) and retransmits the spoofing signals to the target receiver [30]. Since the spoofed signals introduce biased pseudorange and Doppler measurements, and target receiver cannot readily distinguish them from authentic ones, the receiver computes an erroneous PVT solution, thereby entering a manipulated false state.
Figure 1.
A typical GNSS spoofing scenario.
2.2. Doppler Under Spoofing Attack
For the i-th real GNSS signal, the Doppler shift generated by the relative motion between the satellite and the receiver can be is given by
| (1) |
where ,, , and represent the satellite position, satellite speed, receiver position and receiver speed, respectively. is the carrier frequency and is the speed of light. The superscript i indicates the i-th signal.
Considering the influence of clock drift and noise , the actual measured Doppler shift becomes
| (2) |
The Doppler frequency shift corresponding to the false state can be expressed as
| (3) |
where and , respectively, denote the position and velocity of the receiver under false state. and , respectively, denote the position and velocity of the spoofed satellite by spoofer. is defined as the relative velocity of the ith spoofed satellite and the false state.
The transmitted carrier frequency of the spoofing signal is subsequently adjusted according to ; that is,
| (4) |
Taking into the relative motion between the spoofer and the receiver, the relationship between the resulting Doppler shift and broadcast frequency can be formulated as
| (5) |
where and , respectively, denote the position and velocity of the spoofer. is defined as the relative velocity of the spoofer and receiver.
In summary, the actual Doppler shift measured by the receiver under spoofing attacks can be expressed as
| (6) |
The Doppler measurement in Equation (6) comprises three distinct components: the Doppler shift induced by the false state, the contribution from receiver clock drift , and the additional Doppler bias introduced by the spoofing signal, which is defined as
| (7) |
This Doppler bias originates from the relative motion between the spoofer and the receiver. The magnitude of this bias is directly proportional to the relative speed between them.
2.3. Pseudorange Under Spoofing Attack
Similarly, the reception-and-retransmission mechanism inherent to the spoofer inevitably introduces additional bias into the pseudorange measurement.
For the i-th authentic GNSS signal, its pseudorange can be expressed as follows [31]:
| (8) |
where , , , , and represent the clock bias, satellite drift, ionospheric delay, tropospheric delay and measurement noise, respectively.
Under spoofing conditions, the pseudorange of the i-th spoofing signal is given by
| (9) |
where is the additional processing delay intentionally introduced by the spoofer to mislead the receiver.
Equation (9) can be reformulated to explicitly reveal the introduced pseudorange bias:
| (10) |
where the pseudorange bias is defined as
| (11) |
This bias stems from the geometric path difference introduced by the spoofer position and the additional processing delay. By systematically injecting bias into the pseudorange measurement for each satellite, the spoofing signals can cause deviation in the receiver’s PVT solution, thereby achieving the objective of manipulating the receiver into outputting a false state.
3. Spoofing Detection Methodology
Based on the analysis of spoofing attack impacts on pseudorange and Doppler observables presented in Section 2, this section formalizes the underlying mechanism by which spoofing disrupts the inherent consistency between receiver’s clock bias and clock drift. Leveraging this theoretical foundation, a spoofing detection scheme grounded in the self-consistency verification of the receiver’s clock state is proposed. After discussing the detection principle in this section, a specific detection statistic, SCV-RCS, is constructed and its detection threshold and theoretical performance are analyzed.
3.1. Influence of Consistency Between Receiver’s Clock Bias and Clock Drift
As established in the preceding analysis, spoofing introduces systematic biases into both Doppler and pseudorange measurements. These biases are inherently embedded within the raw observables, posing a significant challenge to conventional direct monitoring techniques. In fact, the impact of these biases is directly manifested in the receiver’s PVT solution, leading to the inconsistency between the estimated clock bias and clock drift.
From Equations (2) and (8), taking into account pseudorange correction, under normal conditions, we have
| (12) |
The pseudorange and Doppler shift measurements both reflect the receiver’s real kinematic state, leading to a consistent PVT solution. Therefore, a fundamental self-consistency is established between the estimated clock bias dt and clock drift df.
From Equations (6) and (9), under spoofing attacks, we have
| (13) |
where the introduced Doppler bias , geometric offset, and the spoofer’s processing delay disrupt the intrinsic geometric model. This corruption breaks the self-consistency relationship between dt and df that holds under authentic conditions, providing a direct theoretical basis for detecting the spoofing-induced anomaly. The explicit form of this relationship between dt and df will be derived below.
Assume corresponds to , eflecting the spoofer’s reception of the real GNSS signal) and the term corresponds to df, consistently reflects the receiver’s clock state. The fundamental issue then lies with the remaining terms: the geometric range , the processing delay , and the induced Doppler bias exhibit an inherent mismatch. Even if the additional processing delay is disregarded, the relationship between the geometric distance and the corresponding Doppler shift is not self-consistent in the receiver’s estimation model.
Specifically, after spoofing attacks occur, as the receiver moves, the geometric range changes from to , where is the distance traveled by the receiver and the resulting Doppler bias can be regarded as consistent with Δr. The inherent geometric distance between the spoofer and the receiver constitutes the ineliminable inconsistency between the pseudorange and the Doppler measurements, which is the fundamental cause. As long as the spoofer and receiver are not co-located, this bias persists.
In a full-channel spoofing scenario, the common delay and geometric range between the spoofer and the receiver is superimposed onto the pseudorange of each satellite. This common-mode offset is absorbed by the estimator as an equivalent clock bias, causing the estimated bias to shift from its authentic value to a spoofed value . Concurrently, the Doppler shift induced by the relative motion between the spoofer and the receiver is also added to each satellite’s measurement. This common Doppler component is likewise absorbed as an equivalent clock drift, shifting the estimated drift from to /. This inconsistency will be fully reflected in the clock bias and clock drift.
In a partial-channel spoofing scenario, where some signals are from spoofed satellites and others from authentic ones, the PVT solution minimizes the sum of squared residuals. Consequently, the result does not correspond to either the real or false state but instead converges to a compromised solution. This occurs because the contradiction between the true and spoofed signals cannot be resolved, forcing the estimator to compromise in the PVT solution. As a result, the estimated clock bias and clock drift deviate from their physical relationship. Furthermore, since the Doppler measurement is sensitive to the rate of change in delay rather than to a fixed delay, only the pseudorange is affected, not the Doppler shift. This further exacerbates the inconsistency between clock bias and drift.
3.2. Proposed Spoofing Detection Methodology SCV-RCS
Building upon the theoretical analysis in Section 3.1, we propose a spoofing detection metric based on the self-consistency between the estimated receiver clock bias and the clock drift, as shown in Figure 2. Under normal conditions, both pseudorange and Doppler measurements originate from consistent satellite–receiver geometry and are jointly used for PVT solutions.
Figure 2.
Flowchart of the proposed detection method SCV-RCS.
The corrected pseudorange equation system is as follows:
| (14) |
This is expressed in a matrix as
| (15) |
where the residual vector , geometric matrix and parameter correction amount are defined as
| (16) |
| (17) |
| (18) |
where is the state vector of the initial point.
By applying the least-squares method to solve the matrix Equation (15), we can obtain
| (19) |
The final estimated receiver clock bias is
| (20) |
where (4) and (4) denote the fourth element of the state vector and the correction vector , respectively, both corresponding to the clock bias component.
Similarly, the clock drift df can likewise be obtained by solving the Doppler observation equation system via the least-squares method. The system, analogous to Equation (14) but formulated for Doppler measurements , uses the same geometric matrix in Equation (15). It can be expressed in matrix form as , where contains the velocity and clock drift updates and is the Doppler residual vector. Its least-squares solution is given by . The final estimated receiver clock drift df is , where is the velocity state vector of the initial point.
As a result, the estimated clock bias dt and the clock drift df reflect the physical characteristics of the receiver’s local oscillator and follow a stable intrinsic correlation, resulting in self-consistent clock bias and the clock drift. However, in the presence of spoofing attacks, due to the geometric distance between the spoofer and the receiver, the injected bias in pseudorange and the Doppler shift break this consistency.
To detect this inconsistency, we propose a detection statistic based on the difference between the directly estimated clock bias dt and the clock bias obtained by integrating the estimated clock drift df over time. The statistic in the time epoch k is expressed as
| (21) |
where is the integrated clock bias by clock drift df, indicated as
| (22) |
where is the epoch interval, with a typical range of 0.05 s to 1 s. In the subsequent study of this paper, the value = 0.1 s is selected to balance dynamic adaptability of commercial receivers, fulfillment of real-time spoofing detection requirements, and comparability with existing studies.
Therefore, the spoofing detection problem can be modeled as a hypothesis test:
| (23) |
where is the spoofing-free condition, and represents the spoofing condition. and denote the combined influence of Doppler and pseudorange measurement noise under the different conditions. is an inconsistent bias introduced by spoofing attacks, which is related to the distance between the spoofer and the receiver, the additional processing delay , and the state of the spoofing channel configuration (partial or full). Their estimated values can be modeled as
| (24) |
Under spoofing-free conditions, the receiver’s dt and df is governed by a stable oscillator, and the two estimates should be consistent. is only affected by measurement noise. However, under spoofing conditions, the injected geometric and kinematic biases cause a systematic deviation between the two clock bias estimates.
To reduce false alarms, we accumulate instantaneous inconsistencies in a sliding window of V epochs to construct a cumulative test statistic:
| (25) |
The probability distribution of T satisfies
| (26) |
where and are the central and noncentral chi-squared distribution with V degrees of freedom, respectively. is the noncentral parameter, defined as
| (27) |
3.3. Detection Threshold and Detection Performance
By presetting the false alarm probability (Pfa), the detection threshold is obtained as follows:
| (28) |
where is the inverse function of the right-tail probability of the chi-square distribution.
Subsequently, the corresponding detection probability can be derived:
| (29) |
where is the right-tail probability of the noncentral chi-square distribution.
Figure 3 presents the theoretical receiver operating characteristic (ROC) curves of the detector under various values of λ. It can be observed that, for a fixed false alarm probability Pfa, a larger non-centrality parameter λ results in a higher detection probability, making it easier to detect spoofed signals.
Figure 3.
ROC curves with different values of λ.
4. Simulation Verification
This section describes how simulation-based verification of the proposed algorithm was conducted under numerous diverse spoofing scenarios, including partial-channel spoofing, full-channel spoofing, and time synchronization attack (TSA) scenarios. TSA is a special deception scenario that affects the clock difference rather than the position by introducing a common delay on the pseudorange of each satellite. Throughout the process, authentic GNSS signals were simulated and combined with spoofing signals featuring various replaying delays and channel configurations before being sampled. The resultant IF signals were subsequently processed using the FGI-GSRx-2.0.1 software receiver [32], with codes downloaded from https://github.com/nlsfi/FGI-GSRx (accessed on 15 July 2025).
4.1. Partial-Channel Spoofing Simulation
This section details 12 distinct scenarios (case 1 to case 12), defined by combinations of receiver status and spoofing signal replaying delay. The spoofing attack begins at 14 s, when the spoofer is positioned 100 m from receiver. Key configuration parameters are detailed in Table 1, and Figure 4 illustrates the satellite skyplot at the simulation’s commencement.
Table 1.
Simulation parameters for partial-channel spoofing scenario.
| Parameters | Settings | ||
|---|---|---|---|
| Date and Time | 10 July 2015 00:00 | ||
| Utilized PRNs | 2, 3, 6, 9, 10, 12, 17, 20, 23, 28 | ||
| Receiver Position | 28.15625° N, 112.937° E, 100 m | ||
| Spoofer Position | 28.15641° N, 112.93606° E, 65 m | ||
| Receiver Status | Case 1~case 8: Static Case 9~case 12: Uniform linear motion (vx = 2 m/s) |
||
| Carrier Frequency | 1575.42 MHz (GPS L1 C/A) | ||
| Duration/Spoofing Attack Moment | 34 s/14 s | ||
| Spoofing PRNs and Groups | G1: PRN 2, 3 G2: PRN 6, 9 G3: PRN 2, 3, 6, 9 |
||
| Replaying Delay | case 1: 0 m (G3) case 2: 100 m (G3) case 3: 150 m (G3) case 4: 300 m (G3) |
case 5: 0 m (G1), 150 m (G2) case 6: 0 m (G1), 200 m (G2) case 7: 150 m (G1), 200 m (G2) case 8: 200 m (G1), 300 m (G2) |
case 9: 0 m (G3) case 10: 50 m (G3) case 11: 100 m (G3) case 12: 200 m (G3) |
Figure 4.
Skyplot for the used GPS satellites.
Figure 5 uses the clean scenario and case 9 as examples to compare the relationship between the receiver clock bias dt and dt integrated by the clock drift df. The results indicate that in the clean scenario, the two clock bias values are highly consistent. In the spoofing scenario, however, this consistency is significantly disrupted after the attack begins, exhibiting a clear deviation. This deviation characteristic can serve as an effective feature for identifying GNSS spoofing.
Figure 5.
Clock states in different scenarios: (a) clock drift in clean scenario; (b) clock bias and integrated clock bias in clean scenario; (c) clock drift in case 9; (d) clock bias and integrated clock bias in case 9.
Figure 6 shows the difference between dt and integrated dt in the spoofing scenarios of case 1 to case 12. Prior to the onset of spoofing, their difference approximates zero, which indicates normal system operation. Following the initiation of the spoofing attack, however, a significant and immediate deviation emerges between dt and integrated dt, with the magnitude of change varying across the different scenarios.
Figure 6.
Difference between the dt and integrated dt in different scenarios: (a) case 1 to case 8; (b) case 9 to case 12.
To further evaluate the spoofing detection performance of the proposed method, Figure 7 presents the temporal variation in the test statistic SCV-RCS across case 1 to case 12. Prior to the spoofing attack (i.e., before 14 s), the statistic in every scenario remains below the predefined threshold (red dashed line), indicating normal system operation. Following the attack’s initiation, the statistic in all scenarios rises rapidly, significantly exceeding the threshold within 2 s. The resulting abrupt change enables the detector to accurately identify an attack shortly after its onset, providing timely warning. This demonstrates a high sensitivity and a pronounced response to spoofing.
Figure 7.
Test statistic SCV-RCS of different scenarios from case 1 to case 12.
The simulation results confirm that the proposed detection method exhibits favorable response characteristics under various configurations in the partial-channel spoofing scenarios. It is capable of rapidly issuing an assessment after an attack begins, demonstrating both good real-time performance and accuracy.
4.2. Full-Channel Spoofing Simulation
This section presents the simulation verification of full-channel spoofing scenarios, including 8 different scenarios (cases 1 to 8), with all spoofing signals in each scenario having a replaying delay added. Table 2 details the configuration parameters that differ from those in Table 1.
Table 2.
Simulation parameters for full-channel spoofing scenario.
| Parameters | Settings | ||
|---|---|---|---|
| Utilized PRNs | 2, 3, 6, 9, 10, 12, 17, 20, 23, 28 | ||
| Receiver Status | Cases 1~4: Uniform circular motion (v = 6 m/s) Cases 5~8: Uniform linear motion (vx = 3 m/s) |
||
| Spoofing PRNs and Groups | G1: PRN 2, 3, 6, 9, 10 G2: PRN 12, 17, 20, 23, 28 G3: All |
||
| Replaying Delay | Case 1: 0 m (G3) Case 2: 100 m (G3) |
Case 3: 0 m (G1), 100 m (G2) Case 4: 100 m (G1), 200 m (G2) |
Case 5: 0 m (G3) Case 6: 50 m (G3) Case 7: 100 m (G3) Case 8: 150 m (G3) |
Figure 8 shows the difference between dt and integrated dt in the spoofing scenarios of case 1 to case 8. In all scenarios except cases 3 and case 4, each satellite is subjected to an identical added delay. This delay, combined with the geometric range between the spoofer position and the receiver, is jointly absorbed into the clock bias dt without affecting the clock drift df. The resulting differences align with the theoretical analysis presented in Section 2, exhibiting the expected stepwise increase that corresponds to the incrementally applied delays.
Figure 8.
Difference between the dt and integrated dt in different scenarios: (a) case 1 to case 4; (b) case 5 to case 8.
Simulation results for the full-channel spoofing scenario confirm that the detection performance of the proposed method is consistent with that observed in partial-channel scenarios. The method rapidly detects an attack upon its occurrence, with an alarm time of less than 2 s, demonstrating that both its real-time performance and accuracy meet application requirements.
4.3. TSA Simulation
Figure 9 presents the difference between dt and integrated dt for TSA scenarios under different time pushes with 1.5 to 3.0 chips, along with the corresponding temporal variation in the detection statistic.
Figure 9.
Difference between the dt and integrated dt and test statistic with different time pushes under TSA scenarios: (a) Difference between the dt and integrated dt. (b) Test statistic, SCV-RCS.
The time pull begins in the 9th s; the difference in Figure 9a rapidly diverges from the clean reference, and the difference exhibits sustained accumulation and shows a positive correlation with time. This is because when designing the TSA scenario, the spoofing rate was configured to have a linear relationship with time. Concurrently, the detection statistic SCV-RCS in Figure 9b rises rapidly after the attack begins, exceeding the predefined threshold in all cases and thus successfully triggering a spoofing detection. These results indicate that the proposed method possesses favorable sensitivity and detection performance against TSAs.
5. Experimental Results and Analysis
To further validate the effectiveness and applicability of the proposed spoofing detection algorithm in practical scenarios, this section presents both semi-hardware simulation and real-world data testing. These experiments were designed to evaluate the performance of the method under hardware-in-the-loop conditions and authentic spoofing environments. Meanwhile, through comparative analysis with existing mainstream algorithms, the superiority of the proposed method is highlighted.
5.1. Semi-Hardware Simulation
A semi-hardware experimental platform was built to emulate realistic spoofing conditions with high controllability. As shown in Figure 10a, the platform consists of a GNSS signal simulator, a spoofing console, RF front-end hardware components (including a low-noise amplifier and power divider), a development board, and a playback device. The spoofing signal is generated in real time by the control console, replayed with configurable parameters, and combined with authentic GNSS signals for testing. The control console serves as the core of the signal generation system, providing a user interface for system interaction. It controls the generation of both authentic and spoofing signals, including spoofing satellite numbers, location, and power settings. The simulator generates authentic GNSS signals and spoofing signals the preset ephemeris, respectively, and combines the two signals. The combined signal is output the navigation signal recording and playback device for high-fidelity data sampling and storage. The IF signal stored in the navigation signal recording and playback equipment will be transmitted to the software receiver for processing and spoofing detection. The function of the development board is to verify if the spoofing signal complies with the specified requirements.
Figure 10.
Experimental platform environment. (a) Experimental platform. (b) Skyplot for the used GPS satellites.
To simulate a realistic partial-channel spoofing environment (Group 1), several satellites were designated as spoofed or authentic, as illustrated in Figure 10b. Group 2 is a full-channel spoofing scenario, meaning that all signals received after the spoofing attack begins are spoofing signals. Other key simulation parameters are summarized in Table 3.
Table 3.
Simulation parameters for semi-hardware simulation.
| Parameters | Settings | |
|---|---|---|
| Date and Time | 11 February 2025 08:00 | |
| Utilized PRNs | PRN 4, 7, 8, 11, 17, 20, 27, 28, 32 | |
| Receiver Position | 28.15625° N, 112.937° E, 100 m | |
| Spoofer Position | 28.15633° N, 112.93653° E, 82.82 m | |
| Receiver Status | Case 1~case 4: Uniform circular motion (v = 6 m/s) Case 5~case 8: Uniform linear motion (vx = 2 m/s) |
|
| Carrier Frequency | 1575.42 MHz (GPS L1 C/A) | |
| Duration/Spoofing Attack Moment | 60 s/37 s | |
| Spoofing PRNs and Groups | Group 1: All (full channel) Group 2: PRN 4, 7, 8, 11 (partial channel) |
|
| Replaying Delay | Case 1: 0 m (Group 1) Case 2: 50 m (Group 1) Case 3: 100 m (Group 1) Case 4: 150 m (Group 1) |
Case 5: 0 m (Group 2) Case 6: 50 m (Group 2) Case 7: 100 m (Group 2) Case 8: 150 m (Group 2) |
Take case 1 and case 5 in the two groups as examples to compare the test results. Case 1 represents a uniform circular motion, while case 5 corresponds to a uniform linear motion along the x-axis. At the onset of spoofing, the receiver is positioned 50 m from the spoofer position. Subsequently, under the full-channel spoofing configuration, the receiver’s position solution rapidly converges on the location of the spoofer position, as shown in Figure 11a,d.
Figure 11.
Comparison of the test results of case 1 and case 5. (a) Positioning change of case 1. (b) SCV-RCS statistic of case 1. (c) CDM statistic of case 1. (d) Positioning change of case 5. (e) SCV-RCS statistic of case 5. (f) CDM statistic of case 5.
Figure 11c,f present the temporal variation in the detection statistic based on the clock drift monitoring (CDM) technique [27]. The results indicate that in both scenarios, the CDM statistic responds to the spoofing attack, with the statistic exceeding the predefined threshold, thereby demonstrating a capability for spoofing detection. However, the statistical response in case 1 is more pronounced and sustained. Multiple distinct peaks occur after the attack, indicating good detectability, though instances of missed detection are also present. For case 5, while the statistic exceeds the threshold at certain points, its overall fluctuation is minor and its amplitude limited. Consequently, some attack segments fail to trigger an effective detection. These results demonstrate that the CDM metric is highly dependent on receiver motion state and the spoofing scenario, with case 5 exhibiting a significantly higher risk of both missed and false detection compared with case 1.
The performance of the SCV-RCS statistic for the same two cases is shown in Figure 11b,e. The SCV-RCS statistic remains below the threshold before the attack, confirming robustness under normal conditions. Upon spoofing activation, it rises sharply and stably exceeds the threshold in both scenarios. In full-channel spoofing (case 1), the statistic increases by several orders of magnitude and maintains a consistently high level. Even in the low-dynamic and partial-channel spoofing (case 5), the SCV-RCS statistic still exhibits a rapid and stable rise, reliably identifying the spoofing event.
These results demonstrate that the proposed SCV-RCS method delivers stable, accurate detection across different channel and motion patterns, significantly outperforming the conventional CDM technique in reliability and robustness.
Figure 12 further evaluates the performance of the proposed SCV-RCS method across all spoofing scenarios from case 1 to case 8. As shown in Figure 12a,c, the difference between the raw clock bias and the integrated clock drift remains close to zero before the spoofing attack, indicating a high degree of internal consistency under normal conditions. After the attack begins (around 37 s), all cases exhibit a rapid and stable divergence in this difference, serving as a strong indicator of spoofing-induced inconsistencies.
Figure 12.
Difference between dt and integrated dt and SCV-RCS statistic under different scenarios: (a) Difference between dt and integrated dt of case 1 to case 4. (b) SCV-RCS statistic of case 1 to case 4. (c) Difference between dt and integrated dt of case 5 to case 8. (d) SCV-RCS statistic of case 5 to case 8.
Correspondingly, Figure 12b,d present the SCV-RCS detection statistic over time. Across all scenarios, the statistic consistently remains below the detection threshold prior to the attack and rapidly rises above the threshold immediately after spoofing is initiated. The test statistic not only surpasses the threshold within 2 s in every case but also stabilizes at a high level, clearly distinguishing spoofed conditions from normal ones.
These results demonstrates that the proposed SCV-RCS approach maintains robust spoofing detection capability across a variety of receiver motion patterns and spoofing configurations, including circular and linear motion, partial-channel and full-channel spoofing, and various replaying delays.
5.2. TEXBAT Test
To further evaluate the performance of the proposed method under real-world TSA condition, the publicly available TEXBAT dataset is utilized [33]. Specifically, the ds3 scenario is selected, which represents a challenging spoofing case with gradual takeover. Four typical spoofing detection statistics are compared: Q-energy [34,35], MSCD [36], VSQM [37], and the proposed SCV-RCS.
To quantitatively compare the detection speed and stability, we examine both the first stable alarm and the detectable time segment. As shown in Figure 13, all evaluated metrics respond to the spoofing events to some degree. The MSCD (b) and VSQM (c) statistics show first stable alarms with delays of approximately 58 s and 10 s after the spoofing onset (~110 s), respectively. The Q-energy statistic (a) achieves a faster initial alarm (delay of ~1 s). However, its detection is not sustained, as the statistic frequently falls below the threshold thereafter, indicating high instability and a significant risk of missed detection. In fact, these three benchmark metrics exhibit distinct peaks during the 150–250 s interval, but they also exhibit a certain period of missed detection (i.e., after 250 s). They fail to reach the detection threshold during several attack segments. In contrast, the proposed SCV-RCS statistic (d) remains stable before the attack, rises rapidly and steadily after the spoofing begins, and first crosses the detection threshold stably at around 117 s, resulting in a consistent alarm delay of approximately 7 s. More importantly, once stably triggered, the SCV-RCS statistic maintains its alarm state with far greater persistence than the benchmark methods. While minor fluctuations are observed within the first ~60 s, the statistic quickly stabilizes and then maintains sustained, continuous exceedance above the threshold for the remainder of the spoofing duration, achieving near-complete coverage of the attack period with no missed detection. This comparative analysis clearly indicates the superior robustness and sensitivity of SCV-RCS, which offers not only a competitively fast response but also a drastically reduced risk of missed detection compared to the existing methods.
Figure 13.
Comparison of the test statistics under ds3 scenario (red dashed line is detection threshold). (a) Q-energy statistic. (b) MSCD statistic. (c) VSQM statistic. (d) SCV-RCS statistic.
To further quantify the detection performance, Figure 14 compares the temporal evolution of the detection probability for each method. The proposed SCV-RCS statistic achieves a detection probability of 60% within 10 s of the spoofing onset (110 s) and maintains a level above 80% after 50 s, approaching 100% within 60 s and sustaining it thereafter. In comparison, the VSQM statistic demonstrates a competitive response, reaching approximately 70% probability shortly after the attack begins. However, its performance degrades significantly after 50 s, exhibiting instability in the latter phase. Similarly, the MSCD statistic shows considerable fluctuation throughout the attack duration. The Q-energy statistic, in contrast, exhibits generally poor sensitivity with the lowest detection probability among all methods. Overall, SCV-RCS provides the most stable, reliable, and sustained high detection probability across the entire spoofing interval.
Figure 14.
Comparison of the detection probability under ds3 scenario.
The ROC curves in Figure 15 provide a comprehensive quantitative comparison of the detection performance, illustrating the fundamental trade-off between detection probability and false alarm rate for all four methods. As shown in Figure 15, the ROC curve of the proposed SCV-RCS method consistently dominates those of the benchmark methods across the entire range of Pfa. This signifies that, for any given acceptable level of false alarms, SCV-RCS achieves a significantly higher probability of correctly detecting the spoofing attack. A concrete example illustrates this advantage: at a Pfa of 10%, SCV-RCS attains a detection probability of 95.03%, vastly outperforming VSQM (77.31%), MSCD (54.63%), and Q-energy (37.09%). This ROC analysis provides consolidated quantitative evidence that SCV-RCS offers a superior detection capability.
Figure 15.
Comparison of ROC curves under ds3 scenario.
These results demonstrate that the proposed SCV-RCS method significantly outperforms conventional techniques under realistic spoofing conditions, offering enhanced detection reliability and robustness in real-world deployment scenarios.
6. Conclusions
A GNSS spoofing detection method based on self-consistent verification of the receiver’s clock state is proposed in this paper. By analyzing the consistency between clock bias and clock drift, the method effectively captures anomalies introduced by spoofing in both pseudorange and Doppler measurements. Unlike conventional approaches that require complex bias extraction or auxiliary hardware, SCV-RCS is lightweight, easily integrable, and practical for real-world deployment.
The method was extensively validated through simulation, semi-hardware testing, and real-world experiments using the TEXBAT dataset. Tests across diverse spoofing scenarios demonstrated that SCV-RCS consistently outperforms existing methods in detection sensitivity, robustness, and sustained alerting capability. It achieves the fastest alarm latency (<2 s) in partial-channel and full-channel spoofing while maintaining a low false alarm rate and performs reliably across varying receiver motion states and attack configurations.
In summary, SCV-RCS provides a robust, real-time, and readily implementable defensive mechanism for GNSS receivers operating in adversarial signal environments. Future work will extend its applicability to more sophisticated spoofing models, such as multi-antenna attacks.
Acknowledgments
This research was assisted by Changsha Jinwei Integrated Circuit Co., Ltd. and Hunan Weidao Information Technology Co., Ltd. through simulation data.
Author Contributions
All authors contributed to the manuscript and discussed the results. All authors together developed the idea that led to this paper. Y.C. and Y.J. (Yonghang Jiang) designed the algorithm and conducted experiments. C.W., Y.L. and L.W. designed the structure of the article. X.H., Y.J. (Yunxiang Jiang), X.P. and X.L. contributed to the expression and the design of programs. R.Y. and J.Y. provided critical comments and contributed to the final revision of the paper. Y.C. and Y.J. (Yonghang Jiang) wrote the manuscript, and all the authors participated in amending the manuscript. All authors have read and agreed to the published version of the manuscript.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
TEXBAT is a public dataset, generated by team Humphreys, where the TEXBAT can be downloaded from the website https://rnl-data.ae.utexas.edu/datastore/texbat/ (accessed on 12 December 2025).
Conflicts of Interest
Authors Yan Liu, Yunxiang Jiang, Xiangyang Peng and Jiong Yi were employed by the company Changsha Jinwei Integrated Circuit Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Funding Statement
This research was funded by the National Key Research and Development Program of China (Grant Nos. 2020YFA0713502 and 2022YFB4400100), the National Natural Science Foundation of China (Grant Nos. 92477102 and 62122084), Science and Technology Innovation Plan of Hunan Province (Grant Nos. 2023GK2054 and 2024JK2060), and the Open Research Fund of Songshan Lake Materials Laboratory (Grant No. 2023SLABFK09).
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Kerns A.J., Shepard D.P., Bhatti J.A., Humphreys T.E. Unmanned Aircraft Capture and Control via GPS Spoofing. J. Field Robot. 2014;31:617–636. doi: 10.1002/rob.21513. [DOI] [Google Scholar]
- 2.Bhatti J., Humphreys T.E. Hostile Control of Ships via False GPS Signals: Demonstration and Detection. J. Navig. 2017;64:51–66. doi: 10.1002/navi.183. [DOI] [Google Scholar]
- 3.Dovis F., Ruotsalainen L., Toledo-Moreo R., Kassas Z.Z.M., Gikas V. Recent Advancement on the Use of Global Navigation Satellite System-Based Positioning for Intelligent Transport Systems [Guest Editorial] IEEE Intell. Transp. Syst. Mag. 2020;12:6–9. doi: 10.1109/MITS.2020.2994923. [DOI] [Google Scholar]
- 4.Hu Y., Bian S., Cao K., Ji B. GNSS Spoofing Detection Based on New Signal Quality Assessment Model. GPS Solut. 2018;22:28. doi: 10.1007/s10291-017-0693-7. [DOI] [Google Scholar]
- 5.Radoš K., Brkić M., Begušić D. Recent Advances on Jamming and Spoofing Detection in GNSS. Sensors. 2024;24:4210. doi: 10.3390/s24134210. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 6.Yang H., Jin R., Xu W., Che L., Zhen W. Satellite Navigation Spoofing Interference Detection and Direction Finding Based on Array Antenna. Sensors. 2023;23:1604. doi: 10.3390/s23031604. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 7.Barmpounakis E., Geroliminis N. On the New Era of Urban Traffic Monitoring with Massive Drone Data: The pNEUMA Large-scale Field Experiment. Transp. Res. Part C Emerg. Technol. 2020;111:50–71. doi: 10.1016/j.trc.2019.11.023. [DOI] [Google Scholar]
- 8.Wu Y.-H., Zheng M.-H., He W., Chen Z.-M., Hua B. Intelligent vehicle safety system based on BeiDou satellite navigation system. IET Intell. Transp. Syst. 2019;13:967–974. doi: 10.1049/iet-its.2018.5407. [DOI] [Google Scholar]
- 9.Huang T., Wu H., Tao X., Wei Z. Prediction-Based Trajectory Anomaly Detection in UAV System Under GPS Spoofing Attack. Chin. J. Aeronaut. 2025;38:103478. doi: 10.1016/j.cja.2025.103478. [DOI] [Google Scholar]
- 10.Meng L., Yang L., Yang W., Zhang L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022;14:4826. doi: 10.3390/rs14194826. [DOI] [Google Scholar]
- 11.Psiaki M.L., Humphreys T.E. GNSS Spoofing and Detection. Proc. IEEE. 2016;104:1258–1270. doi: 10.1109/JPROC.2016.2526658. [DOI] [Google Scholar]
- 12.Gui S., Dai L., Shi M., Wang J., Tang C., Wu H., Zhao J. GNSS Receiver Fingerprinting Based on Time Skew of Embedded CSAC Clock. Sensors. 2024;24:4897. doi: 10.3390/s24154897. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 13.Psiaki M.L., Humphreys T.E., Stauffer B. Attackers Can Spoof Navigation Signals Without Our Knowledge. Here’s How To Fight Back GPS Lies. IEEE Spectr. 2016;53:26–53. doi: 10.1109/MSPEC.2016.7524168. [DOI] [Google Scholar]
- 14.Mao P., Yuan H., Chen X., Gong Y., Li S., Li R., Luo R., Zhao G., Fu C., Xu J. A GNSS Spoofing Detection and Direction-Finding Method Based on Low-Cost Commercial Board Components. Remote Sens. 2023;15:2781. doi: 10.3390/rs15112781. [DOI] [Google Scholar]
- 15.Zhou Z., Li H., Chen Z., Zhong M., Lu M. GNSS Spoofing Discrimination Based on Doppler Residual Monitoring; Proceedings of the International Technical Meeting of the Institute of Navigation; Long Beach, CA, USA. 25–27 January 2022. [Google Scholar]
- 16.Chu F., Li H., Lu M. A GNSS Spoofing Detection Method Based on the Consistency of Measured and Calculated Carrier Dopplers; Proceedings of the ION 2017 Pacific PNT Meeting; Honolulu, HI, USA. 1–4 May 2017. [Google Scholar]
- 17.Zhou Z., Li H., Chen Z., Lu M. Velocity Consistency Checking Based GNSS Spoofing Detection Method for Vehicles. IEEE Trans. Veh. Technol. 2024;73:1974–1990. doi: 10.1109/TVT.2023.3321522. [DOI] [Google Scholar]
- 18.Li J., Zhu X., Ouyang M., Shen D., Chen Z., Dai Z. GNSS Spoofing Detection Technology Based on Doppler Frequency Shift Difference Correlation. Meas. Sci. Technol. 2022;33:095109. doi: 10.1088/1361-6501/ac672a. [DOI] [Google Scholar]
- 19.Qi W., Zhang Y., Liu X. A GNSS Anti-Spoofing Technology Based on Doppler Shift in Vehicle Networking; Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC); Paphos, Cyprus. 5–9 September 2016. [Google Scholar]
- 20.Broumandan A., Jafarnia-Jahromi A., Lachapelle G. Spoofing Detection, Classification and Cancellation (SDCC) Receiver Architecture for a Moving GNSS Receiver. GPS Solut. 2015;19:475–487. doi: 10.1007/s10291-014-0407-3. [DOI] [Google Scholar]
- 21.Tu J., Zhan X., Zhang X., Zhang Z., Jing S. Low-complexity GNSS Anti-Spoofing Technique Based on Doppler Frequency Difference Monitoring. IET Radar Sonar Navig. 2018;12:1058–1065. doi: 10.1049/iet-rsn.2018.5151. [DOI] [Google Scholar]
- 22.Li H., Li H., Lu M. Global Navigation Satellite System Spoofing-Detection Technique Based on the Doppler Ripple Caused by Vertical Reciprocating Motion. IET Radar Sonar Navig. 2019;13:1655–1664. doi: 10.1049/iet-rsn.2019.0058. [DOI] [Google Scholar]
- 23.Wang Z., Li H., Wen J., Lu M. GNSS Spoofing Discrimination Method Based on Doppler Frequency Double Difference for Multiple Independent Moving Receivers; Proceedings of the 2021 International Technical Meeting of the Institute of Navigation; Online. 25–28 January 2021. [Google Scholar]
- 24.He L., Li H., Lu M. Dual-Antenna GNSS Spoofing Detection Method Based on Doppler Frequency Difference of Arrival. GPS Solut. 2019;23:78. doi: 10.1007/s10291-019-0868-5. [DOI] [Google Scholar]
- 25.Nielsen J., Broumandan A.L.I., Lachapelle G. GNSS Spoofing Detection for Single Antenna Handheld Receivers. J. Navig. 2011;58:335–344. doi: 10.1002/j.2161-4296.2011.tb02590.x. [DOI] [Google Scholar]
- 26.Truong V., Vervisch-Picois A., Rubio Hernan J., Samama N. Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias. Sensors. 2023;23:2735. doi: 10.3390/s23052735. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 27.Zhou Z., Li H., Deng Y., Lu M. Clock Drift Monitoring Based GNSS Spoofing Detection Method for Autonomous Vehicles; Proceedings of the 37th International Technical Meeting of the Satellite Division of the Institute of Navigation; Baltimore, MD, USA. 16–20 September 2024. [Google Scholar]
- 28.Zhou Z., Li H., Lu M. Doppler-Based RAIM for GNSS Spoofing Detection in Vehicular Applications. IEEE Trans. Veh. Technol. 2025;74:10306–10320. doi: 10.1109/TVT.2025.3543612. [DOI] [Google Scholar]
- 29.Tao H., Wu H., Li H., Lu M. GNSS Spoofing Detection Based on Consistency Check of Velocities. Chin. J. Electron. 2019;28:437–444. doi: 10.1049/cje.2019.01.006. [DOI] [Google Scholar]
- 30.Ma T., Zhang X. A Physics-Informed Residual and Particle Swarm Optimization Framework for Physics-Informed UAV GPS Spoofing Detection. Sensors. 2025;25:6925. doi: 10.3390/s25226925. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 31.Liu K., Wu W., Wu Z., He L., Tang K. Spoofing Detection Algorithm Based on Pseudorange Differences. Sensors. 2018;18:3197. doi: 10.3390/s18103197. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 32.Liaquat M., Bhuiyan M.Z.H., Islam S., Pääkkönen I., Kaasalainen S. An Enhanced FGI-GSRx Software-Defined Receiver for the Execution of Long Datasets. Sensors. 2024;24:4015. doi: 10.3390/s24124015. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 33.Humphreys T.E., Bhatti J.A., Shepard D.P., Wesson K.D. The Texas Spoofing Test Battery: Toward a Standard for Evaluating GPS Signal Authentication Techniques; Proceedings of the International Technical Meeting of the Satellite Division of the Institute of Navigation; Nashville, TN, USA. 17–21 September 2012. [Google Scholar]
- 34.Wang J., Tang X., Ma P., Wu J., Ma C., Sun G. GNSS Spoofing Detection Using Q Channel Energy. Remote Sens. 2023;15:5337. doi: 10.3390/rs15225337. [DOI] [Google Scholar]
- 35.Humphreys T.E. TEXBAT Data Sets 7 and 8. [(accessed on 7 March 2025)]. Available online: https://rnl-data.ae.utexas.edu/datastore/texbat/texbat_ds7_and_ds8.pdf.
- 36.Jin X., Zhang X., Li S., Hu Z., Zheng S., Ma R. GNSS Anti-Spoofing: A Sliding Composite Delta Metric Using Maximum Likelihood Estimation. IEEE Sens. J. 2023;23:24885–24894. doi: 10.1109/JSEN.2023.3310494. [DOI] [Google Scholar]
- 37.Wang W., Hou Y. GNSS Induced Spoofing Detection Based on Dynamic 3-D Correlation Function. IEEE Trans. Instrum. Meas. 2024;73:8507918. doi: 10.1109/TIM.2024.3472768. [DOI] [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
TEXBAT is a public dataset, generated by team Humphreys, where the TEXBAT can be downloaded from the website https://rnl-data.ae.utexas.edu/datastore/texbat/ (accessed on 12 December 2025).
















