An Open GNSS Spoofing Data Repository
An Open GNSS Spoofing Data Repository
https://doi.org/10.1007/s10291-024-01719-2
ORIGINAL ARTICLE
Received: 6 March 2024 / Accepted: 27 July 2024 / Published online: 12 August 2024
© The Author(s) 2024
Abstract
Spoofing is becoming a prevalent threat to the users of Global Navigation Satellite Systems (GNSS). It is important to deepen
our understanding of spoofing attacks and develop resilient techniques to effectively combat this threat. Detecting and miti-
gating these attacks requires thorough testing, typically conducted in a laboratory environment through the establishment
of a spoofing test-bed. The complexity, cost and resource demands of creating such a test-bed underscore the necessity of
utilizing openly available datasets. To address this need, this paper introduces a new GNSS spoofing data repository from
Finnish Geospatial Research Institute (FGI) named hereafter as ‘FGI-SpoofRepo’. This data repository consists of raw In-
phase and Quadrature (I/Q) data of live recordings of GPS L1 C/A, Galileo E1, GPS L5, and Galileo E5a signals. These
datasets encompass three distinct types of spoofing characteristics (synchronous, asynchronous, and meaconing), making
them very useful example candidates of open data for testing the performance of any anti-spoofing techniques (be it detec-
tion or mitigation). The inclusion of live signals in multiple GNSS frequencies and the presence of cryptographic signatures
in Galileo E1 signal make these datasets potential benchmarks for assessing the resilience performance of multi-frequency
multi-constellation receivers. The analysis of the datasets is carried out with an open-source MATLAB-based software-
defined receiver, FGI-GSRx. An updated version of FGI-GSRx, equipped with the necessary modifications for processing
and analyzing the new datasets, is released alongside the datasets. Therefore, the GNSS research community can utilize the
open-source FGI-GSRx or any third-party SDR to process the publicly available raw I/Q data for implementation, testing
and validation of any new anti-spoofing technique. The results show that time-synchronous spoofing seamlessly takes over
positioning solution, while time-asynchronous spoofing acts as noise or in some cases, completely prevent the receiver from
providing a positioning solution. Signal re-acquisition during an ongoing spoofing attack (cold start), the receiver tends to
lock onto the spoofing signal with the highest peak, posing a potential threat to GNSS receivers without assisted information.
Overall, this research aims to advance the understanding of complex spoofing attacks on GNSS signals, providing insight
into enhancing resilience in navigation systems.
Vol.:(0123456789)
176 Page 2 of 18 GPS Solutions (2024) 28:176
target receivers at the tracking stage without significantly complex test-bed typically requires significant budget, spe-
compromising the tracking characteristics (i.e., in terms of cialized software and hardware, expert professionals and
variation in phase or code tracking loops). Following this, time. Furthermore, achieving a code and carrier phase-
the landscape for commercial GNSS users underwent a nota- aligned coherent spoofing attack is extremely difficult and
ble change with the emergence of affordable GPS spoof- often requires repeated attempts.
ers, as discussed in Lin and Qing (2015). The affordability Therefore, a set of well-known open datasets emerges as a
of basic spoofing afterwards led to an upsurge in spoofing pragmatic solution to save money and time and to ease com-
incidents (EUSPA 2023b; GPSWorld 2023). In response to plexity. The Texas Spoofing Test Battery (TEXBAT) is one
these growing threats, research on spoofing detection and such dataset introduced by the University of Texas (Hum-
mitigation techniques has been ongoing since the introduc- phreys et al. 2012). For many years, researchers and profes-
tion of civilian GPS spoofers (Montgomery et al. 2009; sionals have been driven to the TEXBAT datasets to assess
Cavaleri et al. 2010; Broumandan et al. 2015; Magiera and the spoofing vulnerability of GPS receivers. Various statis-
Katulski 2015; Orouji and Mosavi 2021; Shang et al. 2022). tical spoofing detection and mitigation techniques are pro-
A comprehensive exploration of various spoofing genera- posed by using TEXBAT datasets including (Gamba et al.
tion techniques, receiver vulnerabilities on spoofing, and 2017; Kuusniemi et al. 2017; Khan et al. 2020). The Oak
approaches for detection and mitigation are presented in Ridge Spoofing and Interference Test Battery (OAKBAT)
Jafarnia-Jahromi et al. (2012), including example spoofing was introduced following the framework of the TEXBAT
scenarios for real-world receiver testing. datasets (Albright et al. 2020). OAKBAT datasets contain
The spoofing detection can be preliminary categorized GPS L1 C/A and Galileo E1 signals while TEXBAT datasets
into four groups: signal power monitoring, multi-correla- contain only GPS L1 C/A signals. These datasets and studies
tor tracking (Jafarnia-Jahromi et al. 2012; Guo et al. 2018; have primarily focused on legacy GNSS signals and have
Turner et al. 2020), signal quality monitoring (Phelts 2001), demonstrated various approaches to identify and mitigate
and cryptographic signature validation (Anderson et al. spoofing. The current state of the art however reveals sev-
2017; Motella et al. 2021). Numerous other approaches have eral limitations, most existing spoofing datasets are limited
been proposed, such as spatial processing, time of arrival in scope, often focusing on simple spoofing scenarios and
discriminator, consistency checks with other navigation sys- lacking representation of modernized GNSS signals. Addi-
tems, code and phase rate consistency check, and received tionally, the available software tools for processing GNSS
ephemeris consistency check, among others. signals are limited, do not fully support the multi frequency
As the way of spoofing attacks and their characteristics diversity in the event of single frequency or constellation
continuously evolve alongside the modernization of GNSS spoofing. It is also crucial to test the spoofing vulnerability
signals, continuous research is vital for the development of of other GNSS signals from lower L-band such as GPS L5
effective detection and mitigation techniques. For instance, and Galileo E5a. Both datasets, on the other hand, are lack-
monitoring correlation peaks is one such technique, as mul- ing lower L-band signals. The authenticity testing of GNSS
tipath and spoofing both distort the peaks in the composite navigation messages is another key part of any resilient navi-
signal. If the code and carrier phase of the spoofing signal gation system. Galileo Open Service Navigation Message
closely align with the authentic signal, the correlation peak Authentication (OSNMA) is an authentication technique
monitoring based technique may erroneously detect the allowing a receiver to verify that the navigation message is
spoofing signal as multipath (Magiera and Katulski 2015). coming from a trusted source and has not been modified in
Therefore, thorough evaluation and testing of each spoofing the way (ESA 2021). Galileo OSNMA data bits, broadcast
detection or mitigation technique is essential to address the on the E1-B data channel since late 2020, are absent from
evolving and growing nature of spoofing threats. existing datasets, highlighting a key gap in the current land-
Evaluating the effectiveness of these techniques requires scape. Our research aims to fill these gaps by creating a com-
commonly used datasets resembling real-world situations. pletely new set of digitized GNSS In-phase and Quadrature
This is often accomplished by establishing a spoofing test- (I/Q) data that includes both legacy and modernized signals
bed consisting of one or more software/hardware simulator in sophisticated and realistic spoofing scenarios.
and other complex setups. One such test-bed is essential This paper is inspired by the authors’ recent work (Islam
for performing various vulnerability assessments, providing et al. 2023) where details of spoofing signal generation under
fine-grained control over crucial parameters. These tests aim a simulated environment and their impact on the different-
to evaluate the resilience of Position Navigation and Timing grade GNSS receivers are presented. Motivated by the limi-
(PNT) systems by determining how GNSS receivers react to tations of previously available datasets and the importance
potential spoofing attacks, applying mitigation techniques, of assessing modernized GNSS signals and contemporary
re-testing the improved system and adjusting parameters as spoofing events, this paper introduces a new GNSS spoofing
needed (Perdue et al. 2016). However, establishing such a data repository from Finnish Geospatal Research Institute
GPS Solutions (2024) 28:176 Page 3 of 18 176
(FGI) named as ’FGI-SpoofRepo’. This repository consist of both legacy and modernized signals in sophisticated spoof-
a set of raw I/Q data with live GNSS signals. GNSS spoof- ing scenarios. Adding real-world multi-frequency, multi-
ing attacks can be carried out in many ways depending on constellation signals, inherently including cryptographic
the expertise of the spoofers and available resources. FGI- signatures in the Galileo E1 signal and updated version of
SpoofRepo comprise a set of four digitized recordings of the software receiver has further empowered the novelty. By
live static datasets of GPS L1 C/A, Galileo E1, GPS L5 and utilizing these advancements in new datasets and software,
Galileo E5a signals. The new datasets contain three types researchers can develop and verify new techniques to detect
of spoofing scenarios: Targeted Spoofing (time and position and counteract GNSS spoofing, ultimately strengthening
synchronous), Untargeted Spoofing (time and or position the resilience and reliability of GNSS-based systems. The
asynchronous), and Meaconing (re-radiator). These datasets remainder of the paper progresses as follows. The experi-
integrate real-world live signals with simulated spoofing sig- mental setup reveals the spoofing generation procedure and
nals, admitting the inherent challenges of spoofing the live an overview of the used equipment. Following that, the
signal in a controlled environment. The real-world nature spoofing scenario definition section details the spoofing sce-
of the datasets incorporates environmental effects and cryp- narios and their characteristics. Afterwards, the data analysis
tographic signatures, such as OSNMA, portraying them as section thoroughly assesses the characteristics of each sce-
very good example candidates of open data for testing per- nario by the FGI-GSRx software receiver. Finally, the paper
formance of spoofing detection and mitigation techniques summarizes the results and outlines potential directions for
with multi-frequency multi-constellation receivers. future research activities.
This paper provides a thorough overview of the spoofing
dataset generation, accompanied by an in-depth analysis of
each dataset. Processing of the datasets has been carried out Experimental setup
by an open-source software-defined receiver named ’FGI-
GSRx’, released as open-source in 2022 (Kai et al. 2022). An This section encompasses several key components, each
updated open-source version of FGI-GSRx is released along contributing to the comprehensive datasets preparation pro-
with the datasets and software features including necessary cess. These components include a Software-Defined GNSS
modifications for processing and analyzing the new datasets. simulator, an external reference clock for precise timing, a
The novel contribution of this paper lies in the generation of receiving antenna for live signal reception, an amplifier to
a completely new set of digitized GNSS I/Q data involving compensate cable losses, an RF front-end for capturing I/Q
176 Page 4 of 18 GPS Solutions (2024) 28:176
data, and an open-source software-defined receiver for in- and Galileo satellites. When a RINEX file is imported,
depth analysis. The composition of these equipment ensures it overrides the existing information on orbits, perturba-
a controlled environment for the experiments. The experi- tions, clock, group delay, and health status. The broadcast
mental setup of spoofing datasets generation is presented ephemeris data in RINEX format can be sourced from
in Fig. 1. NASA’s Crustal Dynamics Data Information System
(CDDIS)(Noll 2010).
• Spoofing Signal Generation All the spoofing signals The simulation time is carefully synchronized with
in the datasets are generated using the Safran Skydel GPS time for targeted time synchronous scenarios, which
software-defined GNSS simulator (Safran 2023) in con- is obtained from a reference GNSS timing receiver. The
junction with external hardware. Skydel is an advanced timing receiver generates a 1 Pulse Per Second (1 PPS)
GNSS signal simulator known for its customizability and signal and a 10 MHz reference signal to the Universal
scalability, with integrated interference generation capa- Software Radio Peripheral (USRP) X310. This effec-
bilities across multiple frequencies and constellations. tively ensures that the USRP maintains timing synchro-
Most simulation parameters are controllable on the fly nization with the reference receiver.
while the simulation is running, a feature of particular The connectivity between Skydel and the USRP is
relevance in the context of jamming and spoofing experi- facilitated through a high-speed 10 Gigabit Ethernet link,
ments. ensuring real-time data transmission. Within the USRP,
It is crucial to initialize the simulator with the most the I/Q data is up-converted into an RF signal, operating
up-to-date broadcast GNSS ephemeris data for an accu- at a rate of 60 MS/s (mega samples per seconds) with
rate spoofing signal generation. Using outdated ephem- both the L1/E1 and L5/E5a frequency. Subsequently, the
eris information may result in unsuccessful spoofing RF signal is then combined with an authentic live-sky
attempt. Within the simulator, there is a provision to GNSS signal using a signal-mixer.
import Receiver Independent Exchange (RINEX) com- • External Clock Septentrio’s PolaRX5T is utilized as an
patible files, which are used to update the orbits of GPS external reference clock to discipline the USRP X310.
The PolaRx5TR is designed to achieve precise time syn-
chronization in applications involving time and frequency
Table 1 RF recording configuration of the NSL Stereo dual-band transfer. In such applications, the device receives a 10
GNSS front-end MHz reference signal and a 1 PPS signal from an exter-
Parameters Frequency bands Frequency bands nal clock source, which, in our case, is the PolaRX5T.
(L1/E1) (L5/E5a) • Receiver Antenna A reference antenna is used to fetch
Center frequency (MHz) 1569.03 1176.45
live GNSS signals. The same antenna is also used to con-
Sampling rate (MHz) 26 26
nect a reference receiver that provides a clock source
Data type Real Complex
to USRP. The live signal is obtained using Septentrio’s
Sample bit width 8 bit (I) 8 bit + 8 bit (I + Q)
PolaNt Choke Ring antenna, which is a high-precision
Bandwidth (MHz) 4.2 10.09
antenna that supports various GNSS signals (Septrentio
2023).
• Amplifier-Splitter A Low Noise Amplifier (LNA) plays Table 3 Summary of spoofing data repository
a crucial role in signal amplification and compensating Folder name File name Size (KB) Duration (s)
for cable losses between the rooftop antenna and the
receiver port. An Amplified Loaded DC Blocked Splitter Targeted_SFMC TGS_L1_E1.dat 9878528 373
(ALDCBS1X4) is employed featuring one active input TGS_L5_E5a.dat 19757056 373
and four RF outputs. In the context of data collection, one Targeted_DFMC TGD_L1_E1.dat 9728448 373
of the output port is connected to a reference receiver, TGD_L5_E5a.dat 19456896 373
denoted as the PolarRx5TR. An additional output port Untargeted_DFMC UTD_L1_E1.dat 9595136 377
from the amplifier is connected to a mixer. This mixer is UTD_L5_E5a.dat 19190272 377
responsible for combining spoofing signals with authen- Meaconing_DFMC MCD_L1_E1.dat 12216512 478
tic live-sky GNSS signals. MCD_L5_E5a.dat 24433024 478
• FGI-GSRx Multi-Frequency, Multi-Constellation
Receiver The FGI-GSRx is a MATLAB-based Software-
Defined Receiver (SDR) developed by the Finnish Geo- • RF Recording Device The raw I/Q data samples are
spatial Research Institute (FGI). The software receiver captured using the stereo dual-band GNSS front-end
plays a vital role in many national and international pro- developed by Nottingham Scientific Limited (NSL).
jects, serving as a key tool for testing and validating inno- The front-end comprises two distinct Radio Frequency
vative receiver processing algorithms (Söderholm et al. (RF) chains: the MAX2769B, responsible for covering
2016; Kai et al. 2022; Pany et al. 2024). In recent times, the upper L-band, also known as the L1 chain, and the
the GNSS community has been granted access to the MAX2112, which encompasses both upper and lower
FGI-GSRx as an open-source software under the General L-bands, collectively referred to as the L-band chain. The
Public License (FGI-NLS 2022). The architecture of this Local Oscillator (LO) associated with the L1 chain is
software allows the development and testing of new algo- tunable within the frequency range of 1550 MHz to 1610
rithms at any stage within the receiver processing chain, MHz, allowing for precise adjustment to GNSS signals
with minimal modifications to the original structure. within this spectrum. Similarly, the LO for the L-band
The current open-source version of FGI-GSRx can chain can be adjusted within the range of 900 MHz to
process GPS L1 C/A, Galileo E1, BeiDou B1, GLO- 2400 MHz, enabling the capture of any signals within the
NASS G1, and NavIC L5 signals. However, all the data- L-band. The configuration detailed in Table 1 is used for
sets in this manuscript also contain GPS L5 and Galileo capturing the raw I/Q data.
E5a signals. FGI has not yet made the GPS L5 and Gali- • Dataset Replay Validation Setup The recording setup
leo E5a signals based receiver implementation open to was validated by transmitting and recording again a
the public. Therefore, the authors utilize two separate scenario using USRP X310 and NSL Stereo front-end.
versions of FGI-GSRx for processing the datasets: i) The Usable sample rates for the USRP were calculated by
open-source FGI-GSRx, and ii) The in-house FGI-GSRx. dividing the device’s 200 MHz master clock rate with an
The users of FGI-GSRx open-source version will be able integer. The dataset had to therefore re-sampled from 26
to reproduce the results with the shared datasets for GPS MHz to 25 MHz which was done during pre-processing
L1 and Galileo E1 signals. The users will need to utilize using Scipy’s Signal package. The L1 band signals were
any other third party open-source SDR tool, for example, also down-converted from IF (Intermediate Frequency)
GNSS-SDR (Pany et al. 2024) in order to process GPS 1575.42 − 1569.03 = 6.39 MHz to baseband. The devel-
L5 and Galileo E5a datasets. However, the processing oped Python script is also made available alongside the
results for GPS L5 and Galileo E5a signals are anyway datasets allowing the users to replay the datasets for their
presented here with the in-house FGI-GSRx. own test and validation.
Table 2 Summary of spoofing Name Initial Initial Position switch Time shift Latest Spoofing signal(s)
scenarios position time ephemeris
Synch synch injected
GNU Radio companion was used to program the Spoofing scenario definition
USRP to transmit the re-sampled FGI-SpoofRepo data-
set. 60 dB attenuation was used between the USRP and The true receiver is stationary in all four scenarios. It’s posi-
the Stereo front-end to approximately match the trans- tion estimated by a geodetic-grade receiver is 60.182◦ N,
mitted RF power to live-sky. The recorded dataset was 24.828◦ E with an altitude of 47.248 m. The true receiver is
processed in FGI-GSRx using the same configurations connected with a rooftop antenna at the Otaniemi premises
as was used with the original dataset. A constant fre- of the Finnish Geospatial Research Institute (FGI). As the
quency offset of around 1.2 kHz was observed between recordings are made on live signals, the starting date and
the original and replayed-recorded dataset, but this effect time are always unique for each dataset. The initial 130 s
was compensated automatically by the acquisition mod- across all datasets are free from intentional interference,
ule and the carrier tracking loop of FGI-GSRx. making a clean baseline before the injection of the spoofing
The setup used for the replay validation is illustrated signals. It is worth noting that all live skyplots are gener-
in Fig. 2. The re-recorded FGI-SpoofRepo dataset was ated based on information from the navigation engine of
processed in FGI-GSRx to verify that the replayed and FGI-GSRx, with only those satellites utilized in the final
then re-recorded file could be useful without a significant Position, Velocity, and Timing (PVT) computation. On the
drop in signal-tracking performance. A similar valida- other hand, skyplots for the spoofing signals are generated
tion process was also attempted using a USRP X310 using log information provided by the simulator. The uni-
and commercial receivers i.e; u-blox M8T and F9P. The form replication of satellites, along with their corresponding
u-blox receivers (M8T) were able to receive both L1 C/A elevation and azimuth concerning live signals, holds signifi-
and E1 signals but not the L5 and E5a as the receivers do cant importance, particularly in scenarios involving targeted
not support the use of L5-only solution. or synchronous spoofing attacks.
GPS Solutions (2024) 28:176 Page 7 of 18 176
Table 2 offers a detailed insight into the spoofing datasets each of which represents a different scenario. By accessing
and the associated techniques used to generate those data- the folders, users will have access to two files that are spe-
sets. The Targeted Single-Frequency Multi-Constellation cific to each signal. The table also includes the approximate
(SFMC) scenario is generated by synchronizing the initial size and duration of each file. It is to be noted that the dura-
time and position with the true receiver, along with the injec- tion provided in the table is truncated, and the actual files
tion of the latest available ephemeris. The intended spoofed may contain a couple of seconds of extra data.
location follows a circular trajectory. A similar process is
followed for the Targeted Dual-Frequency Multi-Constel- • Targeted SFMC
lation (DFMC) scenario. On the contrary, both Untargeted Both GPS L1 and Galileo E1 signals are spoofed in
DFMC and Meaconing DFMC scenarios do not maintain this scenario. The other RF chain comprising GPS L5
initial time and position synchronization with the true sig- and Galileo E5a signals are not spoofed throughout the
nal. In both scenarios, the intended spoof location remains test. This test is intended to assess the potential fallback
static. However, in the Untargeted case, the spoofed time is behaviour of modern GNSS receivers equipped with mul-
advanced by hours, while in Meaconing, the spoofed time tiple frequencies and constellations. The simulated spoof-
is delayed by minutes. Above all, the injection of the latest ing signals are generated using the most recent ephemeris
ephemeris is not applicable in both Untargeted and Meacon- data available from NASA’s CDDIS. The recordings are
ing cases. made on 2023-10-03 at 14:19:00 UTC over a 370 s dura-
A summary of the spoofing dataset repository is pre- tion. Figure 3 illustrates the skyplot for both spoofing
sented in Table 3. The repository contains several folders, and live signals on 2023-10-03 at 14:19:06 UTC. Eleven
176 Page 8 of 18 GPS Solutions (2024) 28:176
Fig. 11 Multi-correlator monitoring of GPS L1 signal’s PRN 7 to demonstrate the impact of spoofing on the receiver tracking
C∕N0 thresholds. Following the injection of the spoofing The tracking loop performance of a Galileo E5a sat-
signal, the initially set thresholds no longer meets the ellite is illustrated in Fig. 19. After the injection of the
criteria, thereby preventing the receiver from offering any meaconing signal, a slight degradation in signal power
PVT solution. becomes visible. Despite this, the Doppler, Frequency-
In summary, the FGI-GSRx successfully resisted Locked Loop (FLL), and Phase-Locked Loop (PLL)
spoofing attempts. It is also pertinent to mention here that maintained their locks.
although these non-coherent attacks result in an unsuc- The effect of meaconing attack may not be uniform
cessful spoofing attempt, they can still pose a threat by across all GNSS receivers; those with re-acquisition
mimicking jamming. This is inline with the other inten- capabilities may respond differently compared to receiv-
tion of the spoofer otherwise referred to as denial of ser- ers like FGI-GSRx. For instance, when re-transmission
vice. occurs with significantly high power, it can introduce
• Meaconing DFMC additional noise and eventually saturate the receivers.
Re-transmission of authentic signals often represents Afterwards, the affected receiver might attempt a re-
an asynchronous attack, wherein, in the worst-case sce- acquisition, potentially locking onto the spoofing signal.
nario, there might be a complete misalignment in posi- This phenomenon is of particular interest for observation
tion and time. The code and carrier mismatch in the with Commercial off-the-shelf (COTS) receivers (Islam
meaconing signal, resulting in a noise signal that essen- et al. 2023).
tially appears as a jamming signal. The impact of this Figures 21 and 22 shows the positioning performance
phenomenon can be observed in Fig. 20a–d, where the of FGI-GSRx during the meaconing attack. Contrary to
injection of meaconing leads to a drop in C∕N0 values for expectations, the receiver did not lock onto the spoofing
all satellites. signal, indicating that it remained unspoofed.
176 Page 14 of 18 GPS Solutions (2024) 28:176
• Summary Results
Table 4 provides a comprehensive overview of the
positioning solution acquired across various scenarios
and signal combinations by using both open-source and
in-house versions of FGI-GSRx. In this table, symbols
𝜀3D , 𝜀H , and 𝜀V represent 3-Dimensional Root-Mean-
Square (RMS), horizontal RMS, and vertical RMS in
meters respectively, while 𝜎H and 𝜎V denote horizontal
and vertical standard deviation in meters. In the Tar-
Fig. 24 Average C∕N0 difference between a replayed-recorded and geted SFMC scenario, GPS L5 and Galileo E5a signals
the originally recorded targeted DFMC data are not simulated to be spoofed. Therefore, the L1+E1
solution is seen to be much deviated compared to the
L5+E5a solution. It is vital to analyze the positioning
process at around 165th second, when both authentic performance under the combination of signals includ-
and spoofing signals are present. Under such a situ- ing both spoofing and unspoofing ones. Processing all
ation, a receiver is likely to pick up the signal with signals together yields superior results compared to pro-
the highest peak, unless any other assisted informa- cessing only spoofing signals, as evident in the Targeted
tion is available. Figure 23 illustrates the acquisition SFMC scenario. In the Targeted DFMC scenario, all four
search space for the PRN 15 of the GPS L1 signal. signals are spoofed, and the estimated positioning solu-
As both authentic and spoofing signals coexist dur- tion by FGI-GSRx reflects the spoofer’s intended loca-
ing the acquisition, the receiver picks up the spoofing tion in all the three combinations. For the Untargeted
signal with the highest peak. This susceptibility is DFMC and Meaconing DFMC scenarios, FGI-GSRx
particularly significant in untargeted and meacon- remains unspoofed across all combinations. However, in
ing attacks given their untargeted nature, assuming the Untargeted DFMC scenario, a denial of service is
a substantial offset in the code phase between the observed after 120 s due to the impact of the spoofing
spoofing and the authentic signals (Li et al. 2020). signal on the receiver that appeared as jamming for the
Although, as illustrated in Fig. 20a–d, the receiver receiver. With a C∕N0 threshold of 30 dB-Hz, there are
is not spoofed during the tracking stage, acquisition not enough satellite measurements available for position
or re-acquisition during ongoing spoofing events computation. Consequently, it can be said that in case of
may expose the GNSS receiver to potential threats Untargeted DFMC, the receiver is not compromised to
from meaconing and untargeted attacks. Therefore, the spoofer’s desired location, but it indeed experiences
the identification of multi-peaks during the acquisi- the denial of offering positioning service right after the
tion stage (Humphreys et al. 2008) is vital, especially injection of spoofing signal.
when the receiver lacks additional assisted informa- • Validation Results for Replayed I/Q data
tion. Figure 24 shows average observed loss in tracking
C∕N0 for a replayed-recorded targeted DFMC scenario.
The I/Q data was recorded using the setup defined in
176 Page 16 of 18 GPS Solutions (2024) 28:176
Sect. 2. The Galileo E5a signal showed a loss of around SK; Funding acquisition: ZB, SK; Resources: SI, ZB, ML, IP, SK;
1.5 dB-Hz compared to the original DFMC dataset, while Supervision: ZB. All authors commented on previous versions of the
manuscript.
no significant loss in C∕N0 was observed for Galileo E1.
The observed loss can be caused by a few reasons like Funding Open Access funding provided by National Land Survey of
added thermal noise and clock jitter from the process of Finland. This work has been supported by the Academy of Finland’s
transmitting and receiving the signal, or other inaccura- special funding for research into crisis preparedness and security of
supply (project REASON - Resilience and Security of Geospatial
cies in reproducing the digitized baseband signal back to Data for Critical Infrastructures) and the National Emergency Supply
RF. Different outcomes could be observed if parameters, Agency of Finland programme Digital Security 2030.
like signal bandwidth and sample rate, or different trans-
mitter and GNSS front-end were used. Availability of data and materials The four datasets, including the
updated version of the FGI-GSRx and auxiliary scripts for potential
replay, can be accessed at the following webpage (https://www.maanm
ittauslaitos.fi/en/research/research/gnss-specialists/fgi-gnss-jamming-
and-spoofi ng-dataset-repository-fgi-jsdr). Table 3 contains detailed
information about scenarios, folder names, and dataset sizes. The Finn-
ish Geospatial Research Institute (FGI) has made these datasets and
Conclusion and future work related scripts available to researchers and other interested stakehold-
ers. This initiative aims to enhance the robustness and effectiveness of
This paper presents raw GNSS spoofing datasets across receiver-based spoofing detection and mitigation techniques, thereby
four scenarios, analyzed with an updated version of FGI- strengthening overall security measures in satellite-based navigation
systems. All updates of the open-source FGI-GSRx receiver will be
GSRx software receiver. The new set of raw I/Q spoofing available along with the corresponding release notes. If there are any
data, comprising live-sky GNSS signals, fills a notable further inquiries, please feel free to contact FGI.
gap in existing datasets, enhancing the available resources
to the GNSS community. Notably, these datasets cover Declarations
multiple GNSS frequencies and incorporate cryptographic
Consent for publication All authors reviewed and approved the final
signatures (OSNMA) in Galileo E1-B data channel, posi- manuscript.
tioning them as potential benchmarks for evaluating the
resilience performance of multi-frequency multi-constel- Conflict of interest The authors declare no conflict of interest.
lation receivers. An updated open-source version of FGI-
GSRx is provided alongside the datasets with the neces- Open Access This article is licensed under a Creative Commons Attri-
sary features for processing and analyzing the new data. bution 4.0 International License, which permits use, sharing, adapta-
tion, distribution and reproduction in any medium or format, as long
This research aims to deepen our understanding of com- as you give appropriate credit to the original author(s) and the source,
plex spoofing attacks on GNSS signals, offering insights provide a link to the Creative Commons licence, and indicate if changes
into the challenges and opportunities for improving resil- were made. The images or other third party material in this article are
ience in navigation systems. The datasets and analyses included in the article’s Creative Commons licence, unless indicated
otherwise in a credit line to the material. If material is not included in
presented here provide a foundation for future research on the article’s Creative Commons licence and your intended use is not
GNSS technologies against evolving spoofing threats, thus permitted by statutory regulation or exceeds the permitted use, you will
contributing to the ongoing effort to safeguard satellite need to obtain permission directly from the copyright holder. To view a
navigation systems worldwide. copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
The authors are currently working towards implementa-
tion of Galileo’s OSNMA-based spoofing detection in FGI-
GSRx. In addition, the authors plan to implement a robust
GNSS anomaly detection technique based on a combination References
of different receiver parameters. These include Automatic
Albright A, Powers S, Bonior J, Combs F (2020) Oak ridge spoofing
Gain Control (AGC) variation at the front-end level, phase and interference test battery (OAKBAT) - GPS. In: Proceedings
and Doppler change rate detection at the tracking level, and of the 33rd international technical meeting of the satellite division
the authentication status flag based on navigation message of the institute of navigation (ION GNSS+ 2020), pp 3697–3712.
https://doi.org/10.13139/ORNLNCCS/1664429
authentication at the navigation level.
Anderson JM, Carroll KL, DeVilbiss NP, Gillis JT, Hinks JC,
O’Hanlon BW, Rushanan JJ, Scott L, Yazdi RA (2017) Chips-
Acknowledgements Special acknowledgement goes to the Safran
message robust authentication (chimera) for GPS civilian signals.
MINERVA academic programme for donating the Skydel simulator.
In: Proceedings of the 30th international technical meeting of
the satellite division of the institute of navigation (ION GNSS+
Author Contributions Conceptualization: SI and ZB; Methodology:
2017), pp 2388–2416
SI and ZB; Data curation: SI, IP, ML; Formal analysis and investiga-
Broumandan A, Jafarnia-Jahromi A, Lachapelle G (2015) Spoofing
tion: SI, ZB, ML, IP; Software: SI, ZB, ML, IP; Writing - original
detection, classification and cancelation (SDCC) receiver archi-
draft preparation: SI; Writing - review and editing: SI, ZB, ML, IP,
tecture for a moving GNSS receiver. GPS Solut 19:475–487
GPS Solutions (2024) 28:176 Page 17 of 18 176
Cavaleri A, Motella B, Pini M, Fantino M (2010) Detection of spoofed LabSat (2023) LabSat 3 Wideband Record and Replay Device
GPS signals at code and carrier tracking level. In: 2010 5th ESA [Accessed on 12 03, 2023]. https://www.labsat.co.uk/index.php/
workshop on satellite navigation technologies and European work- en/products/labsat-3-wideband
shop on GNSS signals and signal processing (NAVITEC), pp 1–6 Li J, Zhu X, Ouyang M, Li W, Chen Z, Dai Z (2020) Research on
ESA (2021) Galileo Open Service Navigation Message Authentication multi-peak detection of small delay spoofing signal. IEEE Access
(OSNMA) 8:151777–151787. https://doi.org/10.1109/ACCESS.2020.30169
EUSPA (2023a) European GNSS (Galileo) Services Open Ser- 71
vice Quarterly Performance Report October–December 2022 Lin H, Qing Y (2015) GPS spoofing low-cost GPS simulator. In: Pro-
[Accessed on 12 03, 2023]. https://www.gsc-europa.eu/sites/ ceedings of the DEF CON, 23
default/files/sites/all/files/Galileo-OS-Quarterly-Perfor mance_ Magiera J, Katulski R (2015) Detection and mitigation of GPS spoof-
Report-Q4-2022.pdf ing based on antenna array processing. J Appl Res Technol
EUSPA (2023b) The ultimate response to maritime spoofing attacks 13(1):45–57
[Accessed on 11 27, 2023]. https://www.euspa.europa.eu/newsr Montgomery PY, Humphreys TE, Ledvina BM (2009) Receiver-auton-
oom/news/asgard-ultimate-response-maritime-spoofi ng-attacks omous spoofing detection: experimental results of a multi-antenna
FGI-NLS (2022) FGI-GSRx software receiver [Accessed on 12 10, receiver defense against a portable civil GPS spoofer. In: Proceed-
2023]. https://www.maanmittauslaitos.fi/en/fgi-gsrx-os ings of the 2009 international technical meeting of the institute of
Gamba MT, Truong MD, Motella B, Falletti E, Ta TH (2017) Hypoth- navigation, pp 124–130
esis testing methods to detect spoofing attacks: a test against the Motella B, Nicola M, Damy S (2021) Enhanced gnss authentica-
TEXBAT datasets. GPS Solut 21:577–589 tion based on the joint chimera/osnma scheme. IEEE Access
GPSWorld (2023) Increasing GNSS interference: UK and EU warn 9:121570–121582
aviation [Accessed on 11 27, 2023]. https://www.gpsworld.com/ Noll CE (2010) The crustal dynamics data information system: a
increasing-gnss-interference-uk-and-eu-warn-aviation/ resource to support scientific analysis using space geodesy. Adv
Guo Y, Miao L, Zhang X (2018) Spoofing detection and mitigation in Space Res 45(12):1421–1440
a multi-correlator GPS receiver based on the maximum likelihood Orouji N, Mosavi M (2021) A multi-layer perceptron neural network
principle. Sensors 19(1):37 to mitigate the interference of time synchronization attacks in sta-
Hegarty C, O’Hanlon B, Odeh A, Shallberg K, Flake J (2019) Spoof- tionary GPS receivers. GPS Solut 25:1–15
ing detection in GNSs receivers through cross-ambiguity function Pany T, Akos D, Arribas J, Bhuiyan MZH, Closas P, Dovis F, Fernan-
monitoring. In: Proceedings of the 32nd international technical dez-Hernandez I, Fernández–Prades C, Gunawardena S, Hum-
meeting of the satellite division of The Institute of Navigation phreys T et al (2024) Gnss software-defined radio: history, current
(ION GNSS+ 2019), pp 920–942 developments, and standardization efforts. NAVIGATION J Inst
Homeland S (2022) Resilient Positioning, Navigation, and Timing Navig 71(1)
(PNT) Conformance Framework Perdue L, Sasaki H, Boime G, Sicsik-Paré E (2016) 1.4 - Testing GNSS
Humphreys TE, Bhatti JA, Shepard DP, Wesson KD (2012) The Texas receivers robustness against spoofing attempts, pp 33–39. https://
spoofing test battery: toward a standard for evaluating GPS signal doi.org/10.5162/etc2016/1.4
authentication techniques. https://api.semanticscholar.org/Corpu Phelts RE (2001) Multicorrelator techniques for robust mitigation of
sID:113952187 threats to GPS signal quality. Stanford University
Humphreys TE, Ledvina BM, Psiaki ML, O’Hanlon BW, Kintner PM Safran (2023) Safran Skydel GNSS Software Simulator [Accessed on
et al (2008) Assessing the spoofing threat: development of a port- 12 10, 2023]. https://www.safran-group.com/products-services/
able GPS civilian spoofer. In: Proceedings of the 21st Interna- skydel-gnss-simulation-software
tional technical meeting of the satellite division of the institute of Septrentio (2023) High-precision geodetic full GNSS spectrum choke
navigation (ION GNSS 2008), pp 2314–2325 ring antenna [Accessed on 12 10, 2023]. https://www.septentrio.
Islam S, Bhuiyan MZH, Pääkkönen I, Saajasto M, Mäkelä M, com/en/products/antennas/polant-chokering
Kaasalainen S (2023) Impact analysis of spoofing on different- Shang X, Sun F, Zhang L, Cui J, Zhang Y (2022) Detection and mitiga-
grade GNSS receivers. (2023) IEEE/ION Position. Location and tion of GNSS spoofing via the pseudorange difference between
Navigation Symposium (PLANS), pp 492–499. https://d oi.o rg/1 0. epochs in a multicorrelator receiver. GPS Solut 26:1–14
1109/PLANS53410.2023.10139934 Söderholm S, Bhuiyan MZH, Thombre S, Ruotsalainen L, Kuusniemi
Jafarnia-Jahromi A, Broumandan A, Nielsen J, Lachapelle G (2012) H (2016) A multi-GNSS software-defined receiver: design, imple-
GPS vulnerability to spoofing threats and a review of antispoofing mentation, and performance benefits. Ann Telecommun. https://
techniques. Int J Navig Observ doi.org/10.1007/s12243-016-0518-7
Kai B, Ignacio F-H, José A, L-S, Bhuiyan MZH (2022) GNSS software Turner M, Wimbush S, Enneking C, Konovaltsev A (2020) Spoofing
receivers. Cambridge University Press. https://doi.org/10.1017/ detection by distortion of the correlation function. In: 2020 IEEE/
9781108934176 ION position, location and navigation symposium (PLANS), pp
Khan AM, Iqbal N, Khan AA, Khan MF, Ahmad A (2020) Detection 566–574
of intermediate spoofing attack on global navigation satellite sys-
tem receiver through slope based metrics. J Navig 73:1052–1068 Publisher's Note Springer Nature remains neutral with regard to
Kuusniemi H, Blanch J, Chen Y-H, Lo SC, Innac A, Ferrara GN, jurisdictional claims in published maps and institutional affiliations.
Honkala S, Bhuiyan MZH, Thombre S, Söderholm S, Walter T,
Phelts RE, Enge PK (2017) Feasibility of fault exclusion related to
advanced RAIM for GNSS Spoofing detection. https://api.seman
ticscholar.org/CorpusID:67182166
176 Page 18 of 18 GPS Solutions (2024) 28:176