Author:
Gu Nianzu,Xing Fei,You Zheng
Abstract
Visual/Inertial/GNSS (VIG) integrated navigation and positioning systems are widely used in unmanned vehicles and other systems. This VIG system is vulnerable to of GNSS spoofing attacks. Relevant research on the harm that spoofing causes to the system and performance analyses of VIG systems under GNSS spoofing are not sufficient. In this paper, an open-source VIG algorithm, VINS-Fusion, based on nonlinear optimization, is used to analyze the performance of the VIG system under a GNSS spoofing attack. The influence of the visual inertial odometer (VIO) scale estimation error and the transformation matrix deviation in the transition period of spoofing detection is analyzed. Deviation correction methods based on the GNSS-assisted scale compensation coefficient estimation method and optimal pose transformation matrix selection are proposed for VIG-integrated system in spoofing areas. For an area that the integrated system can revisit many times, a global pose map-matching method is proposed. An outfield experiment with a GNSS spoofing attack is carried out in this paper. The experiment result shows that, even if the GNSS measurements are seriously affected by the spoofing, the integrated system still can run independently, following the preset waypoint. The scale compensation coefficient estimation method, the optimal pose transformation matrix selection method and the global pose map-matching method can depress the estimation error under the circumstances of a spoofing attack.
Subject
General Earth and Planetary Sciences
Reference35 articles.
1. Schreiber, M., Königshof, H., Hellmund, A., and Stiller, C. (2016, January 19–22). Vehicle localization with tightly coupled GNSS and visual odometry. Proceedings of the 2016 IEEE Intelligent Vehicles Symposium (IV), Gothenburg, Sweden.
2. Tightly Coupled Integration of GNSS and Vision SLAM Using 10-DoF Optimization on Manifold;Gong;IEEE Sens. J.,2019
3. GPS Vulnerability to Spoofing Threats and a Review of Antispoofing Techniques;Jafarnia-Jahromi;Int. J. Navig. Obs.,2012
4. GNSS spoofing and detection;Psiaki;Proc. IEEE,2016
5. Cyber threats facing autonomous and connected vehicles: Future challenges;Parkinson;IEEE Trans. Intell. Transp. Syst.,2017
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献