<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sam Pullen, Author at Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<atom:link href="https://insidegnss.com/author/sampullen/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Global Navigation Satellite Systems Engineering, Policy, and Design</description>
	<lastBuildDate>Wed, 24 Jul 2024 17:35:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://insidegnss.com/wp-content/uploads/2017/12/site-icon.png</url>
	<title>Sam Pullen, Author at Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Q: Are RAIM and Advanced RAIM useful for applications that take advantage of differential GNSS corrections for integrity?</title>
		<link>https://insidegnss.com/q-are-raim-and-advanced-raim-useful-for-applications-that-take-advantage-of-differential-gnss-corrections-for-integrity/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Wed, 24 Jul 2024 17:35:32 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=193597</guid>

					<description><![CDATA[<p>A: Receiver Autonomous Integrity Monitoring (RAIM) and Advanced RAIM (ARAIM; known more generally as Solution Separation RAIM, or SS-RAIM) were originally designed to...</p>
<p>The post <a href="https://insidegnss.com/q-are-raim-and-advanced-raim-useful-for-applications-that-take-advantage-of-differential-gnss-corrections-for-integrity/">Q: Are RAIM and Advanced RAIM useful for applications that take advantage of differential GNSS corrections for integrity?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>A:</strong> Receiver Autonomous Integrity Monitoring (RAIM) and Advanced RAIM (ARAIM; known more generally as Solution Separation RAIM, or SS-RAIM) were originally designed to detect, alert and (where possible) exclude faulty measurements caused by Signal-in-Space (SIS) failures. </p>



<span id="more-193597"></span>



<p>These include satellite clock and ephemeris faults and atmospheric (ionospheric and tropospheric) anomalies. Civil aviation has used RAIM for this purpose for many years in Area Navigation (RNAV) and Required Navigation Performance (RNP) operations. ARAIM improves upon the performance and availability of RAIM and will (in a few years) make it possible to conduct instrument approaches with vertical navigation without the need to receive corrections and integrity information from augmentation systems.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="1180" height="714" src="https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM.png" alt="Screenshot-2024-07-17-at-4.59.40 PM" class="wp-image-193598" srcset="https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM.png 1180w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-300x182.png 300w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-1024x620.png 1024w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-768x465.png 768w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2024/07/Screenshot-2024-07-17-at-4.59.40 PM-48x29.png 48w" sizes="(max-width: 1180px) 100vw, 1180px" /></figure>
</div>


<p><strong>Table 1</strong> shows the integrity performance commitments that GNSS service providers have made to civil aviation via the International Civil Aviation Organization (ICAO) [1]. These are used as inputs in the ARAIM user algorithm [2] and identify the additional protection ARAIM must provide to achieve the integrity risk of 10<sup>-7</sup> per operation or below for operations with failure consequences deemed “Hazardous,” as is the case for precision approach under restricted-visibility conditions. For example, GPS commits to a fault rate (R<sub>sat</sub>) no greater than 10<sup>-5</sup> per satellite per hour for faults affecting individual satellites that are not correlated across multiple satellites. ARAIM (or any other integrity subsystem) must reduce this probability to a small fraction of the integrity risk requirement by detecting and excluding such faults or alerting that use of GNSS is no longer safe within the 6-second time to alert (TTA) for CAT I precision approaches.</p>



<h3 class="wp-block-heading" id="h-adding-raim-and-araim-to-integrity-monitoring-nbsp"><strong>Adding RAIM and ARAIM to Integrity Monitoring&nbsp;</strong></h3>



<p>GNSS applications with the most demanding accuracy and integrity requirements normally employ augmentation systems such as Satellite-based and Ground-based Augmentation Systems (SBAS and GBAS, respectively). The corrections generated by these systems reduce user measurement errors, provide bounds on these errors, and indicate which measurements should not be used based on ground-system monitoring with multiple static reference receivers. This has the effect of reducing the <br>probabilities of undetected faults on satellites and other SIS anomalies to below 10<sup>-7</sup> per hour. As a result, users with access to either SBAS or GBAS corrections are likely to use them to simplify user integrity monitoring. For example, airborne users applying the SBAS or GBAS Minimum Operational Performance Requirements (MOPS) are encouraged to use RAIM when it is available, they are not required to, nor are they limited by the higher protection levels (PLs) generated by RAIM due to its need for redundant satellite measurements.</p>



<p><strong>This raises the question:</strong>&nbsp;Is RAIM or (particularly) ARAIM a useful addition to integrity monitoring for users who make use of augmentation system integrity monitoring? The answer depends on the operational environment of each user. For aircraft in flight with an excellent view of the sky and far from reflecting surfaces other than those of the aircraft itself, the probability of large errors generated at the aircraft itself due to multipath or radio frequency interference (RFI) is very low. However, for automobile, train, ship and unmanned aerial vehicles (UAVs) that are much closer to obstacles and reflecting surfaces (including the ground and the sea surface) and potential RFI or spoofing transmitters, local threats may be more likely than SIS failures that can be mitigated by augmentation systems. Under these conditions, ARAIM may be a necessary addition to external SIS monitoring.</p>



<p>Consider the use of augmented GNSS on a vehicle being driven autonomously and relying on GNSS and other sensors to stay within a lane of traffic. In rural areas, multipath errors will be relatively benign (albeit worse than on an aircraft), but as the vehicle approaches urban areas and especially “urban canyons,” very large multipath errors may occur due to the GNSS receiver tracking a reflected signal instead of the one directly from a satellite. ARAIM would thus be useful (and perhaps necessary) to exclude or at least detect such large errors on one or multiple satellites.&nbsp;</p>



<h3 class="wp-block-heading" id="h-working-with-araim"><strong>Working with ARAIM</strong></h3>



<p>ARAIM has a major advantage over traditional RAIM in that it can directly represent and monitor faults on multiple satellites. In ARAIM, each hypothesized fault on one or more measurements is represented by its own fault hypothesis, and every one of these hypotheses is checked by comparing the all-in-view position solution to the solution that would apply if the measurement(s) in that hypothesis were faulted. If this difference between these solutions is large compared to nominal conditions, the fault hypothesis in question is likely to be true, and ARAIM would then proceed to try to isolate the fault to that specific hypothesis or, failing that, alert the user that safe operations are no longer feasible.</p>



<p>However, if the probability of individual measurement faults is much larger than what is typical for SIS faults in&nbsp;<strong>Table 1,</strong>&nbsp;the number of multiple-measurement fault hypotheses will grow quickly and may exceed the ability of the user’s processor to update ARAIM every time new measurements are obtained. For example, if 16 satellites are in view from two constellations (e.g., GPS and Galileo), and each satellite has an independent probability of excessive multipath of 0.001, the probability of excessive multipath on any pair of satellites is (0.001)<sup>2</sup>=10<sup>-6</sup>, which is small but not negligible (and would be larger when multipath errors correlated among nearby satellites are included). Therefore, each of the 16-choose-2=120 independent satellite pairs must be monitored by ARAIM, creating a total of 16+120=136 hypotheses to be checked and updated every epoch (e.g., every second).&nbsp;</p>



<p>For users with powerful processors, ARAIM calculations with hundreds of fault hypotheses may be workable, but this is not the case for most off-the-shelf automotive and maritime user equipment today. The best alternative is to combine the various multiple-fault hypotheses into groups so the number of hypotheses that must be checked every epoch is limited to what the user’s processor can handle. One way of doing this is to group satellites in similar locations in the sky into single hypotheses [3]. Returning to the example above, if the 16 satellites in view can be grouped into four sets of four nearby satellites each, only four fault hypotheses would remain to be monitored. The disadvantage of this approach is resolution of faults in individual satellites is reduced, leading to significantly larger protection levels.</p>



<h3 class="wp-block-heading" id="h-conclusion"><strong>Conclusion </strong></h3>



<p>ARAIM is an important addition to integrity monitoring for augmented users when local faults from multipath or RFI are more likely to occur than the SIS faults mitigated by augmentation systems. When the number of satellites in view is large, hundreds of individual fault hypotheses may need to be monitored, but this number can be reduced by grouping individual measurements at the cost of losing fault resolution and therefore suffering higher protection levels. This is a key tradeoff to investigate when designing and procuring cost-effective user receiver and processor hardware.</p>



<h3 class="wp-block-heading" id="h-references">References </h3>



<p>[1] ICAO SARPS, Annex 10, Vol. I, Radio Navigation Aids, 8th Edition, July 2023.</p>



<p>[2] J. Blanch, T. Walter, et al., “Baseline Advanced RAIM User Algorithm: Proposed Updates,” Proceedings of ION ITM 2022, Long Beach, CA, January 2022.</p>



<p>[3] J. Blanch, T. Walter, et al., &#8220;Fixed Subset Selection to Reduce Advanced RAIM Complexity,&#8221; Proceedings of ION ITM 2018, Reston, VA, January 2018.</p>
<p>The post <a href="https://insidegnss.com/q-are-raim-and-advanced-raim-useful-for-applications-that-take-advantage-of-differential-gnss-corrections-for-integrity/">Q: Are RAIM and Advanced RAIM useful for applications that take advantage of differential GNSS corrections for integrity?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GNSS Spoofing and Jamming in Eastern Europe</title>
		<link>https://insidegnss.com/gnss-spoofing-and-jamming-in-eastern-europe/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Tue, 26 Mar 2024 15:26:43 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=192982</guid>

					<description><![CDATA[<p>Q: What do we know about recent observations of GNSS interference and spoofing in Eastern Europe? What lessons can we learn regarding civil...</p>
<p>The post <a href="https://insidegnss.com/gnss-spoofing-and-jamming-in-eastern-europe/">GNSS Spoofing and Jamming in Eastern Europe</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Q:</strong> What do we know about recent observations of GNSS interference and spoofing in Eastern Europe? What lessons can we learn regarding civil user mitigation of these threats? What can we learn from recent incidents and their impact on civil aviation?</p>



<span id="more-192982"></span>



<p><strong>ZIXI LIU, SHERMAN LO, JUAN BLANCH, YU-HSUAN CHEN, TODD WALTER AND SAM PULLEN</strong>, STANFORD UNIVERSITY</p>



<p><strong>A:</strong> GNSS serves safety-of-life applications in aviation (e.g., precision approach and landing operations), land vehicles and marine users. One threat to these applications is radio frequency interference (RFI). A variety of RFI events affecting GNSS signal bands have been observed over the many years of GNSS usage [1]. RFI leading to unexpected loss of GNSS navigation forces reliance on backup sensors and operational modes. While this is tolerable if sufficiently rare, equipping and planning for these events increases the cost and complexity of safety-critical navigation. Spoofing of GNSS signals also has been observed in the last few years and is more worrying because it could cause GNSS to output hazardously incorrect information and thus pose a direct threat to user safety.</p>



<p>Since the Russian invasion of Ukraine in February 2022, RFI and spoofing that appears to be both intentional and malicious has been observed in Eastern Europe [2, 3]. Most Western observers believe the Russian military is the source of these events, and its purpose is primarily military [2, 4]. However, these events also affect civil users and pose hazards that might not be intended but are no less real. This article examines what we have observed from recent RFI and spoofing in Eastern Europe, how it has affected civil aviation, and lessons for civil user safety and operational efficiency.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="1020" height="916" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-1.png" alt="Fig-1" class="wp-image-192984" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-1.png 1020w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-1-300x269.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-1-768x690.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-1-24x22.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-1-36x32.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-1-48x43.png 48w" sizes="(max-width: 1020px) 100vw, 1020px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-observation-using-ads-b-messages-nbsp"><strong>Observation Using ADS-B Messages&nbsp;</strong></h3>



<p>Automatic Dependent Surveillance (ADS)-B messages broadcast by aircraft are an important source of information regarding the timing and effects of GNSS RFI, and this information is now readily available online (e.g., at GPSJam, managed by John Wiseman [5], which uses data from ADS-B Exchange [6]).&nbsp;<strong>Figure 1</strong>&nbsp;from [5] shows an example view of GNSS RFI affecting ADS-B on February 21, 2024. The colors on the map indicate regions where at least 98% of aircraft report good ADS-B accuracy (green), where between 90% and 98% of aircraft report good accuracy (yellow), and where fewer than 90% of aircraft report good accuracy (red) based on the NACp parameter defined below. The locations in red on this map have seen frequent GNSS RFI and spoofing events.</p>



<p>Our research also uses data collected from the OpenSky network [7] and ADS-B Exchange [6]. It contains GNSS-derived position information from aircraft along with built-in accuracy and integrity indicators known as Navigation Accuracy Category—Position (NACp) and Navigation Integrity Category (NIC), which provide the transmitting aircraft’s estimate of its GNSS position quality. NACp gives the 2D horizontal error radius that is expected to bound the current horizontal position error with a probability of 95%, while NIC does the same for the much higher probability of 99.999%, meaning that no more than one error exceeding this radius should occur in 100,000 samples.&nbsp;</p>



<p><strong>Figure 2</strong>&nbsp;shows values for both NACp and NIC as defined by the RTCA ADS-B MOPS (DO-260C) [8]. Note that higher integer values correspond to smaller error bounds and thus better performance. The ADS-B equipment performance requirements defined in [9] state that, under normal circumstances, aircraft NIC values must be 7 or higher. As shown in&nbsp;<strong>Figure 2,</strong>&nbsp;a NIC of 7 corresponds to a horizontal containment radius of 370.4 meters, while a NACp of 7 corresponds to a 95% horizontal error bound of half that (185.2 meters). These error magnitudes are much larger than would be expected of the GPS Standard Positioning Service (SPS) under anything close to “normal” conditions [10]. Thus, NIC values lower than 7 suggest an anomaly is present, of which RFI denying GNSS service is the most likely cause in locations where we have already determined that RFI is occasionally present. While this information from ADS-B does not directly observe the presence of RFI, it shows the impact on civil aviation of the RFI that is present.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="1020" height="664" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-2.png" alt="Fig-2" class="wp-image-192985" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-2.png 1020w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-2-300x195.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-2-768x500.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-2-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-2-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-2-48x31.png 48w" sizes="(max-width: 1020px) 100vw, 1020px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1018" height="488" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a.png" alt="Fig-3a" class="wp-image-192986" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a.png 1018w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a-300x144.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a-768x368.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3a-48x23.png 48w" sizes="auto, (max-width: 1018px) 100vw, 1018px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="604" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-1024x604.png" alt="Fig-3b" class="wp-image-192987" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-1024x604.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-300x177.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-768x453.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-1536x906.png 1536w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b-48x28.png 48w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-3b.png 1550w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-rfi-events-in-the-baltic-sea-region"><strong>RFI Events in the Baltic Sea Region</strong></h3>



<p>An increase in interference to GPS signals in the Baltic Sea region was observed to begin on December 25, 2023, and is continuing at the time of writing.&nbsp;<strong>Figure 3</strong>&nbsp;shows examples of significantly affected days in which ADS-B messages suggest the presence of high-powered RFI. Each map shows the reported locations of aircraft sending ADS-B messages over the course of a day from midnight-to-midnight UTC. Most of these points have NIC values of 7 or higher (“High NIC”) and are shown in green, while the smaller set of points with NIC below 7 (“Low NIC”) are shown in red. As explained earlier, the points in red have containment radii far above typical for GPS SPS, suggesting the presence of RFI. The red points extend over a large region centered on the southern shore of the Baltic Sea from Gdansk (Poland) eastward to the Lithuanian border and include the Kaliningrad Oblast of Russia isolated between Poland and Lithuania. The lower-right map in&nbsp;<strong>Figure 3</strong>&nbsp;shows an earlier example day (December 6, 2023) that appears to have little or no RFI for comparison. The handful of scattered red points on this map suggest temporary navigation problems unique to particular aircraft.&nbsp;</p>



<p><strong>Figure 4</strong>&nbsp;shows bar charts of the number of High NIC (green) and Low NIC (red) samples during each one-hour interval for the same days shown in&nbsp;<strong>Figure 3.</strong>&nbsp;While some of these days (e.g., January 10 and 16 2024) have fractions of Low NIC observations that remain similar throughout most of the day, others (e.g., December 25, 2023, and January 19, 2024) have higher Low NIC ratios at different times of day (late afternoon on December 25, morning on January 19). These patterns, along with different behavior on different days, suggest the RFI causing these observations is tuned to specific activities and is not unintentional (which might cause it to be active continuously). Note the times indicated on the x-axis are in UTC, which is one hour behind local time in Poland and two hours behind in Lithuania and Kaliningrad.</p>



<p>We have looked at all days between December 25, 2023, and February 10, 2024, and found some spatial and temporal characteristics related to the Baltic disruption. First, most of the days were only affected during early morning (0000-0500 UTC) and late evening (2100-2400 UTC). Only some of the days shown in&nbsp;<strong>Figures 3 and 4</strong>&nbsp;have been affected for almost the entire day. This further suggests the motivation for this RFI could potentially be related to underlying (possibly military) activities limited to those hours or those days. Second, most of the jammed days have similar affected regions in terms of size, shape and location.&nbsp;<strong>Figure 5</strong>&nbsp;shows similar maps and bar charts for some example days with those characteristics.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="476" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a.png" alt="Fig-4a" class="wp-image-192988" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a-300x139.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a-768x357.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4a-48x22.png 48w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="605" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-1024x605.png" alt="Fig-4b" class="wp-image-192989" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-1024x605.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-300x177.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-768x453.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-1536x907.png 1536w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b-48x28.png 48w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-4b.png 1548w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="607" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-1024x607.png" alt="Fig-5" class="wp-image-192990" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-1024x607.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-300x178.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-768x455.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-1536x910.png 1536w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5-48x28.png 48w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-5.png 1556w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-localization-of-baltic-sea-rfi-events"><strong>Localization of Baltic Sea RFI Events</strong></h3>



<p>We have developed RFI transmitter localization techniques based on modeling the relationship between ADS-B reported NIC and received jamming power and then using iterative non-linear least-squares to estimate the location where the jamming is strongest (i.e., received GNSS signal weakest) given the locations of the reported NIC values [1, 11, 12]. This method&nbsp;relies on the assumptions of free-space propagation and that the source is a static, continuous, single element, omni-directional antenna.&nbsp;<strong>Figure 6</strong> shows a preliminary localization result over the Baltic Sea region between 1500 and 1600 UTC on December 25, 2023. A smooth gradient in estimated power appears on these plots and indicates a minimum near the southern Black Sea coast between Gdansk and Kaliningrad.&nbsp;</p>



<p>The uncertainty in this initial jammer location estimate can be refined by using “bootstrap” sub-sampling of the ADS-B data and by using data from a day where Low NIC observations are limited to a smaller region around the minimum-power location shown in&nbsp;<strong>Figure 6</strong>&nbsp;(January 4, 2024, from 0500 to 2100 UTC).&nbsp;<strong>Figure 7</strong>&nbsp;shows a map that, based on data from this day, includes an ellipse with a 95% probability of including the actual jammer location. The overland component of this ellipse includes the Kaliningrad Oblast of Russia, which is the headquarters of the Russian Baltic Fleet and is known to have an extensive array of modern Russian weaponry, including the latest aircraft and missiles [2].</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1024" height="550" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-6.png" alt="Fig-6" class="wp-image-192991" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-6.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-6-300x161.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-6-768x413.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-6-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-6-36x19.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-6-48x26.png 48w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="502" height="620" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-7.png" alt="Fig-7" class="wp-image-192992" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-7.png 502w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-7-243x300.png 243w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-7-19x24.png 19w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-7-29x36.png 29w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-7-39x48.png 39w" sizes="auto, (max-width: 502px) 100vw, 502px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-spoofing-events-in-the-black-sea-region"><strong>Spoofing Events in the Black Sea Region</strong></h3>



<p>Spoofing of GNSS positions reported by ADS-B has been observed over the Balkans and the Black Sea region.&nbsp;<strong>Figure 8</strong>&nbsp;shows an example spoofing event in which affected aircraft were spoofed onto a landing trajectory. The left-hand plot in&nbsp;<strong>Figure 8</strong>&nbsp;shows ADS-B positions and NIC values for aircraft passing to the southwest of Russia on December 6, 2023. The right-hand plot shows the location that aircraft were spoofed to. The reported spoofed locations are over the Crimean Peninsula in a small area corresponding to the location of Belbek Airport (33.6º E, 44.7º N), which is now a Russian military airfield that has been periodically attacked by Ukraine since the Russian invasion [4]. The motivation for spoofing vehicle positions to this location is unclear, but the target appears to be military rather than civilian aircraft.</p>



<p><strong>Figure 9</strong>&nbsp;shows aircraft positions before, during and after spoofing on December 6, 2023. The red star in both plots indicates the locations where aircraft were spoofed to, which were mostly over the runway of Belbek Airport as shown in&nbsp;<strong>Figure 8.</strong>&nbsp;The left-hand plot shows each aircraft’s last observed&nbsp;position before being spoofed, and the right-hand plot shows each aircraft’s first observed position after recovering. The color of each point shows the time difference between the before/after position and the spoofed position. This is due to the lack of ADS-B ground receiver coverage along the coast, as most of these flights were not observed by ground receivers while they were flying over the Black Sea. For instance, for points with gaps longer than 20 minutes (i.e., all points that are not shown in blue in the left-hand plot), aircraft are not being spoofed directly from the “before” position to the “spoofed” position. Instead, the “before” position was the last time the aircraft was seen before being spoofed.</p>



<p>We estimated the region affected by spoofing based on the locations before and after aircraft were spoofed. We&nbsp;focused on aircraft with short time gaps between “before,” “spoofed” and “after” locations to maximize accuracy.&nbsp;<strong>Figure 10</strong>&nbsp;illustrates the potential region affected by spoofing using red dashed lines. These are formed by connecting each aircraft’s flight paths before and after being spoofed. This relies on the assumption that the gap between the two components of the original flight trajectory is where the aircraft were actually flying while being spoofed. Therefore, spoofing is affecting the region that contains those gaps. The black dotted lines show the actual reported positions and how each flight jumped from its assumed path to the spoofed location at Belbek Airport.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1016" height="558" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-8.png" alt="Fig-8" class="wp-image-192993" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-8.png 1016w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-8-300x165.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-8-768x422.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-8-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-8-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-8-48x26.png 48w" sizes="auto, (max-width: 1016px) 100vw, 1016px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1016" height="476" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-9.png" alt="Fig-9" class="wp-image-192994" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-9.png 1016w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-9-300x141.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-9-768x360.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-9-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-9-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-9-48x22.png 48w" sizes="auto, (max-width: 1016px) 100vw, 1016px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="490" height="578" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-10.png" alt="Fig-10" class="wp-image-192995" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-10.png 490w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-10-254x300.png 254w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-10-20x24.png 20w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-10-31x36.png 31w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-10-41x48.png 41w" sizes="auto, (max-width: 490px) 100vw, 490px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-unusual-circle-spoofing-inside-russia"><strong>Unusual “Circle” Spoofing inside Russia</strong></h3>



<p>Another apparent spoofing of GNSS positions reported by ADS-B has been observed over Smolensk Oblast, Russia, in which aircraft were spoofed into circular trajectories. This type of spoofing was previously observed in receivers onboard ships near China and Iran (using AIS data) [13] and more recently observed in aviation by Zach Clements at UT Austin [3].&nbsp;<strong>Figure 11</strong>&nbsp;shows an example circle spoofing event on December 25, 2023. The reason for spoofing in circles is unclear, but [13] theorizes that (a) this is intended to confuse observers into believing the spoofer is near the center of the circle when it may not be, and (b) reducing the radius of the spoofed circular path can avoid triggering user alerts based on estimating Horizontal Position Error (HPE).&nbsp;</p>



<p><strong>Figure 12</strong>&nbsp;shows similar plots of aircraft positions before, during and after spoofing on December 25, 2023. Compared with spoofing events in the Black Sea region, this circle spoofing affects aircraft from different locations that are far away from each other, which can be observed by comparing the&nbsp;<br>locations of points colored in blue, red and green. This further suggests there could be multiple spoofers performing similar attacks at the same time. This motivates us to estimate the region affected by spoofing using a different method.&nbsp;</p>



<p><strong>Figure 13</strong>&nbsp;shows the estimated region affected by spoofing based on interpolated aircraft trajectories. Rather than connecting the apparent gaps in each aircraft’s flight path, we estimated where each aircraft was actually flying while being spoofed. We used this interpolated trajectory to identify each aircraft position immediately before being spoofed (in black) and immediately after recovering from spoofing (in blue). By connecting those two interpolated position points, we can estimate the location of the affected region more accurately by filling in the gap from loss of reports due to lack of ADS-B ground reception. The red lines in&nbsp;<strong>Figure 13&nbsp;</strong>indicate the estimated regions affected by spoofing. The black lines identify how aircraft jumped from their intended flight paths to the spoofed location and how they recovered back to their original flight paths.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="345" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-1024x345.png" alt="Fig-11" class="wp-image-192996" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-1024x345.png 1024w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-300x101.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-768x259.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-1536x518.png 1536w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11-48x16.png 48w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-11.png 1542w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1018" height="514" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-12.png" alt="Fig-12" class="wp-image-192997" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-12.png 1018w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-12-300x151.png 300w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-12-768x388.png 768w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-12-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-12-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-12-48x24.png 48w" sizes="auto, (max-width: 1018px) 100vw, 1018px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="496" height="578" src="https://insidegnss.com/wp-content/uploads/2024/03/Fig-13.png" alt="Fig-13" class="wp-image-192998" srcset="https://insidegnss.com/wp-content/uploads/2024/03/Fig-13.png 496w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-13-257x300.png 257w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-13-21x24.png 21w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-13-31x36.png 31w, https://insidegnss.com/wp-content/uploads/2024/03/Fig-13-41x48.png 41w" sizes="auto, (max-width: 496px) 100vw, 496px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-summary-and-conclusions"><strong>Summary and Conclusions</strong></h3>



<p>This article describes what the authors currently know about instances of both RFI (jamming) and spoofing observed in Eastern Europe within or near the borders of Russia. We have observed spoofing directed to a small set of locations at Belbek Airport in the Crimea and into circular movement patterns near Smolensk. These events appear to be caused by deliberate Russian military action based on what we have observed and what others have reported [2, 3]. The purpose of this spoofing is unclear but appears to be targeting opposing (e.g., Ukrainian) military operations.</p>



<p>These events are unavoidably affecting civil aviation, as demonstrated by the degradation of ADS-B NACp and NIC parameters that make them observable to us. At least some civil transport aircraft in the regions affected by spoofing report dramatically incorrect locations. Fortunately, to date, civil transport airplanes appear to be able to live with these threats while still operating safely, as they are merely passing over the affected regions.</p>



<h3 class="wp-block-heading" id="h-acknowledgments"><strong>Acknowledgments</strong></h3>



<p>The authors would like to thank the FAA for its support of this research as well as the other members of our laboratory and Prof. Dennis Akos of the University of Colorado for contributing to this research. We also thank the OpenSky Network [7] and the ADS-B Exchange [6] for providing ADS-B data for this study.</p>



<h3 class="wp-block-heading" id="h-references"><strong>References</strong></h3>



<p><strong>(1)&nbsp;</strong>Z. Liu, S. Lo, et al., “GNSS Interference: Getting to the Source,”&nbsp;<em>Inside GNSS,</em>&nbsp;Vol. 18, No. 3, May/June 2023, pp. 46-51.&nbsp;</p>



<p><strong>(2)&nbsp;</strong>S. Willis, “Kaliningrad: Impregnable Fortress or ‘Russian Alamo’?,”&nbsp;<em>CNA in-depth</em>&nbsp;blog, May 15, 2023. https://www.cna.org/our-media/indepth/2023/05/kaliningrad-impregnable-fortress-or-russian-alamo</p>



<p><strong>(3)&nbsp;</strong>D. Goward, “Circle Spoofing Comes to Aviation—first the Baltic, now the Mediterranean,” The Resilient Navigation and Timing Foundation, Jan. 7, 2024. https://rntfnd.org/2024/01/07/circle-spoofing-comes-to-aviation-first-the-baltic-now-the-mediterranean/</p>



<p><strong>(4)&nbsp;</strong>E. Cook, “Crimea Airbase Attacked as Russians Bemoan Fighter Jet, Troop Losses,”&nbsp;<em>Newsweek,&nbsp;</em>Feb. 1, 2024. https://www.newsweek.com/crimea-airbase-attacks-ukraine-missile-storm-shadow-fighter-jets-russia-losses-1865896</p>



<p><strong>(5)&nbsp;</strong>J. Wiseman, “GPSJam: Daily Maps of GPS Interference,” https://gpsjam.org/</p>



<p><strong>(6)&nbsp;</strong>“ADS-B Exchange: World&#8217;s largest source of unfiltered flight data,” https://www.adsbexchange.com/</p>



<p><strong>(7)&nbsp;</strong>M. Schäfer, M. Strohmeier, V. Lenders, I. Martinovic, M. Wilhelm, “Bringing up OpenSky: A large-scale ADS-B sensor network for research,”&nbsp;<em>Proc. 13th Int’l. Symp. on Information Processing in Sensor Networks,</em>&nbsp;Berlin, Germany, April 2014.&nbsp;</p>



<p><strong>(8)&nbsp;</strong><em>Minimum Operational Performance Standards for 1090 MHz Extended Squitter Automatic Dependent Surveillance—Broadcast (ADS-B) and Traffic Information Services—Broadcast (TIS-B).&nbsp;</em>Washington, DC, RTCA DO-260C, Dec. 17, 2020.</p>



<p><strong>(9)&nbsp;</strong><em>Title 14 of the Code of Federal Regulations—14 CFR Part 91.</em>&nbsp;Office of the Federal Register, National Archives and Records Administration, Washington, DC, updated 16 Feb. 2024. https://www.ecfr.gov/current/title-14/chapter-I/subchapter-F/part-91?toc=1</p>



<p><strong>(10)&nbsp;</strong><em>GPS Standard Positioning Service (SPS) Performance Standard (GPS SPS PS),&nbsp;</em>Washington DC, U.S. Dept. of Defense, 5th Edition, April 2020. https://www.gps.gov/technical/ps/2020-SPS-performance-standard.pdf</p>



<p><strong>(11)&nbsp;</strong>Z. Liu, S. Lo, et al., “Real-time Detection and Localization of GNSS Interference Source,”<em>&nbsp;Proceedings of ION GNSS+ 2022,&nbsp;</em>Denver, CO, Sept. 2022, pp. 3731-3742.</p>



<p><strong>(12)&nbsp;</strong>Z. Liu, S. Lo, et al., “Locating GNSS Interference Sources using ADS-B with Non-linear Least Squares,” Submitted to&nbsp;<em>Navigation</em>&nbsp;(forthcoming).&nbsp;</p>



<p><strong>(13)&nbsp;</strong>G. Buesnel, “‘Circle Spoofing’ Is on the Rise,”&nbsp;<em>Spirent</em>&nbsp;blog, Aug. 17, 2020. https://www.spirent.com/blogs/circle-spoofing-is-on-the-rise</p>



<h3 class="wp-block-heading" id="h-authors"><strong>Authors</strong></h3>



<p><strong>Zixi Liu</strong>&nbsp;is a Ph.D. candidate at the GPS Laboratory at Stanford University. She received her B.Sc. degree from Purdue University in 2018 and her M. Sc. degree from Stanford University in 2020.</p>



<p><strong>Sherman Lo</strong>&nbsp;is a senior research engineer at the Stanford GPS Laboratory and the executive director of the Stanford Center for Position Navigation and Time. He received his Ph.D. in Aeronautics and Astronautics from Stanford University in 2002. He has and continues to work on navigation robustness and safety, often supporting the FAA. He has conducted research on Loran, alternative navigation, SBAS, ARAIM, GNSS for railways and automobiles. He also works on spoof and interference mitigation for navigation. He has published over 100 research papers and articles. He was awarded the ION Early Achievement Award.</p>



<p><strong>Juan Blanch</strong>&nbsp;is a senior research engineer at Stanford University, where he works on integrity algorithms for Space-based Augmentation Systems and on Receiver Autonomous Integrity Monitoring. A graduate of Ecole Polytechnique in France, he holds an MS in Electrical Engineering and a Ph.D. in Aeronautics and Astronautics from Stanford University. He received the 2004 ION Parkinson Award for his Ph.D. dissertation and the 2010 ION Early Achievement Award.</p>



<p><strong>Yu-Hsuan Chen</strong>&nbsp;is a research engineer in the GPS laboratory at Stanford University. He received his Ph.D. in electrical engineering from National Cheng Kung University in 2011.</p>



<p><strong>Todd Walter</strong>&nbsp;is a Research Professor in the Department of Aeronautics and Astronautics at Stanford University. He is also a member of the National Space-Based Positioning, Navigation, and Timing (PNT) Advisory Board. His research focuses on implementing satellite navigation systems for safety-of-life applications. He has received the Institute of Navigation (ION) Thurlow and Kepler awards. He is also a fellow of ION and has served as its president.</p>
<p>The post <a href="https://insidegnss.com/gnss-spoofing-and-jamming-in-eastern-europe/">GNSS Spoofing and Jamming in Eastern Europe</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Q: How can GNSS augmentation services be combined to simultaneously support multiple user classes with demanding but varied requirements?</title>
		<link>https://insidegnss.com/q-how-can-gnss-augmentation-services-be-combined-to-simultaneously-support-multiple-user-classes-with-demanding-but-varied-requirements/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Mon, 24 Jul 2023 13:20:56 +0000</pubDate>
				<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[Home Slider]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=191575</guid>

					<description><![CDATA[<p>SAM PULLEN STANFORD UNIVERSITY, FRANCESCO RISPOLI,&#160;ALESSIA VENNARINI, ARIANNA PERSIA, RADIOLABS&#160;, ALESSANDRO NERI, ROMA TRE UNIVERSITY AND RADIOLABS, ROBERTO CAPUA SOGEI A: Many augmentations...</p>
<p>The post <a href="https://insidegnss.com/q-how-can-gnss-augmentation-services-be-combined-to-simultaneously-support-multiple-user-classes-with-demanding-but-varied-requirements/">Q: How can GNSS augmentation services be combined to simultaneously support multiple user classes with demanding but varied requirements?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>SAM PULLEN</strong> STANFORD UNIVERSITY, <strong>FRANCESCO RISPOLI,&nbsp;<br>ALESSIA VENNARINI, ARIANNA PERSIA</strong>, RADIOLABS&nbsp;, <strong>ALESSANDRO NERI</strong>, ROMA TRE UNIVERSITY AND RADIOLABS, <strong>ROBERTO CAPUA</strong> SOGEI</p>



<p><br><strong>A: </strong>Many augmentations of GNSS satellite navigation have been developed and fielded since the GPS constellation was completed and declared fully operational in 1995. The best known of these are satellite-based and ground-based augmentation systems (SBAS and GBAS), which are public systems designed to support civil aviation.</p>



<span id="more-191575"></span>



<p> The corrections and integrity information broadcast by SBAS and GBAS are available to all GNSS users with the necessary equipment, but relatively few users beyond aviation have incorporated them into their applications (although this is slowly changing). In addition, many private augmentation systems&nbsp;now provide precise point positioning (PPP) and/or real-time kinematic (RTK) corrections to support other applications requiring sub-meter accuracy. Examples of these applications include surveying, mining and intelligent agriculture.</p>



<p>A growing subset of GNSS applications have demanding safety requirements in addition to needing sub-meter accuracy. These include railway, maritime, automobile and unmanned aerial vehicle (UAV) applications in which passengers and other people are potentially at risk. Specialized GNSS augmentation systems are needed to meet these requirements, and in many cases, multiple different types and sources of augmentation must be combined.</p>



<p>This article describes one example of a “multi-tier” GNSS augmentation system known as the High Integrity EGNSS Layer for Multimodal Eco-friendly Transportation, or HELMET [1] (EGNSS stands for “European Global Navigation Satellites System, although HELMET is not limited to European applications). HELMET is designed to support multiple Service Levels (SLs), where each SL satisfies a set of requirements linked to specific rail and automotive applications. Depending on the SL for a particular user class, HELMET applies different combinations of corrections and user algorithms to maximize performance and availability.</p>


<div class="wp-block-image">
<figure class="alignleft size-large"><img loading="lazy" decoding="async" width="1024" height="475" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-1024x475.png" alt="Screen-Shot-2023-07-14-at-11.40.42-AM" class="wp-image-191576" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-1024x475.png 1024w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-300x139.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-768x357.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-1536x713.png 1536w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM-48x22.png 48w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.42-AM.png 1538w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>

<div class="wp-block-image">
<figure class="alignleft size-full is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM.png" alt="Screen-Shot-2023-07-14-at-11.40.51-AM" class="wp-image-191577" style="width:794px;height:477px" width="794" height="477" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM.png 1004w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM-300x180.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM-768x462.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.40.51-AM-48x29.png 48w" sizes="auto, (max-width: 794px) 100vw, 794px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-requirements-for-rail-and-automotive-navigation"><strong>Requirements for Rail and Automotive Navigation&nbsp;</strong></h3>



<p><strong>Table 1</strong>&nbsp;summarizes the requirements and corresponding rail, automotive and UAV applications for four different SLs defined for HELMET. These requirements are specified in terms of 95% accuracy in along-track (AT) and cross-track (CT) position axes, integrity alert limits (ALs), tolerable hazard rates (THRs) of loss of integrity (LOI), and times to alert (TTAs) within which anomalies potentially leading to LOI are alerted or (preferably) detected and excluded. LOI occurs when the specified ALs are exceeded in one or more position axes without fault exclusion or annunciation within the TTA. THRs represent the maximum tolerable probability of LOI per exposure interval.</p>



<p><strong>Figure 1</strong>&nbsp;illustrates one of the key railway applications supported by HELMET SLs 1 and 2, which is known as the European Rail Traffic Management System (ERTMS), within which lies the European Train Control System (ETCS) [1,2,3]. ERTMS uses balises placed at known locations along a pre-surveyed track. When a train passes over a balise or a group of closely-spaced balises (provided for redundancy), it receives the balise transmission and obtains its precise location along the track from a database that includes the identifiers and locations of all balises. In between balise groups, the train uses odometry to estimate how far it has progressed along the track. The confidence interval on 1-D train position used to ensure safe separation of trains along the track grows predictably between balise groups and resets itself to a small value when the next balise group is encountered.</p>



<p>While ERTMS is certified and is in operation today, the expense of fielding and maintaining balise groups every few hundred meters along ERTMS-equipped tracks motivated the search for a less expensive variation that uses augmented GNSS to replace physical balises with virtual ones. A GNSS-equipped train knows when it has reached a virtual balise when its GNSS-based location matches its existing database of balise locations. In this way, GNSS can be introduced into ERTMS without otherwise changing the way ERTMS works today or the communication protocols between trackside controllers and individual trains. The Railway High Integrity Navigation Overlay System (RHINOS) project demonstrated the practicality of this approach to GNSS-enabled ERTMS in 2017 [4], and HELMET extends it to additional rail applications (such as track identification) along with automotive and UAV applications.</p>



<p>The existence of high-integrity systems like ERTMS in the rail domain means requirements for GNSS-based rail navigation can be derived from existing standards. The same is not yet true for automotive applications such as driver assistance or autonomous driving. The automotive requirements shown for SLs 3 and 4 in&nbsp;<strong>Table 1</strong>&nbsp;are not yet standardized but serve as a guide to the eventual requirements on GNSS augmentation in support of vehicle navigation [5].</p>


<div class="wp-block-image">
<figure class="alignleft size-full is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM.png" alt="Screen-Shot-2023-07-14-at-11.41.00-AM" class="wp-image-191578" style="width:754px;height:500px" width="754" height="500" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM.png 1012w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM-300x199.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM-768x510.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM-36x24.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.00-AM-48x32.png 48w" sizes="auto, (max-width: 754px) 100vw, 754px" /></figure>
</div>


<h3 class="wp-block-heading"><strong>HELMET Multi-Service Architecture</strong></h3>



<p><strong>Figure 2</strong>&nbsp;shows a system-level depiction of HELMET that simultaneously supports rail, automotive and UAV applications. A key architectural feature is that GNSS augmentation used within HELMET is broken down into two tiers. The first tier represents SBAS, which is both provided to users via the datalinks built into HELMET (so users are no longer dependent on SBAS corrections transmitted from Geosynchronous satellites) and used as inputs to HELMET’s own integrity monitoring in its Augmentation and Integrity Monitoring Network (AIMN), which is part of the second tier. AIMN consists of a network of reference receivers at fixed sites in the manner of SBAS but with typical separations between receivers of several tens of kilometers instead of hundreds of kilometers.</p>



<p>The second tier of augmentation in&nbsp;<strong>Figure 2</strong>&nbsp;also includes separate “adaptation layers” for rail, automotive and UAVs. These layers convert the GNSS corrections and integrity information provided by AIMN into messages specifically designed for different types of users. For example, ERTMS supporting rail applications has existing subsystems such as Radio Block Centers (RBCs) and communication protocols that will be retained. UAV and automobile users are expected to need adaptation to support future messaging and control protocols created for these domains.</p>



<p>Using GNSS augmentation to support multiple user classes is a key HELMET feature and is motivated by economics and efficiency. To meet the requirements of HELMET SLs beyond SL 1, local or regional differential corrections and integrity monitoring provided by the second tier are required. This requires a network of reference receiver sites designed for very high integrity, continuity and availability. Deploying and maintaining these sites and the communications from them to the Reference Station Operating Center (RSOC) shown in&nbsp;<strong>Figure 2</strong>&nbsp;represents a significant expense that can and should be shared with multiple user classes.</p>



<p>The functions performed by AIMN within HELMET’s second tier are shown in&nbsp;<strong>Figure 3.</strong>&nbsp;AIMN applies the reference station measurements collected by the RSOC to calculate code-phase (DGNSS) and carrier-phase corrections (RTK/NRTK/PPP) to support multiple service levels. In parallel, the reference station measurements and SBAS information from the first tier are combined to detect and exclude reference station measurement faults and any remaining Signal-in-Space (satellite and atmospheric) faults not already detected by SBAS. In particular, the smaller separations between HELMET reference stations aids detection of anomalous gradients in ionospheric and tropospheric delays that can create significant errors in DGNSS, PPP and RTK corrections. The resulting corrections are broadcast using RTCM SC-104 and (pending) SC-134 message formats to users and to the adaptation layers that format this information for different user classes.</p>



<p>The subsystems and functions of the train’s on-board units (OBUs) are shown in&nbsp;<strong>Figure 4.</strong>&nbsp;Sensors include augmented GNSS as well as inertial measurement units (IMUs) and cameras and/or LiDAR to provide an independent representation of the track ahead and the terrain to the sides. GNSS fault detection and exclusion (FDE), including advanced (solution-separation-based) RAIM (ARAIM), occurs before the surviving measurements are combined (“fused”) with those from the other sensors, followed by a second FDE stage in which the redundancy created by multiple sensors is exploited to check for unusual errors in any individual sensor.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM.png" alt="Screen-Shot-2023-07-14-at-11.41.10-AM" class="wp-image-191579" style="width:763px;height:416px" width="763" height="416" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM.png 1012w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM-300x164.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM-768x419.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.10-AM-48x26.png 48w" sizes="auto, (max-width: 763px) 100vw, 763px" /></figure>


<div class="wp-block-image">
<figure class="alignleft size-full is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM.png" alt="Screen-Shot-2023-07-14-at-11.41.16-AM" class="wp-image-191580" style="width:780px;height:366px" width="780" height="366" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM.png 1008w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM-300x141.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM-768x361.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.16-AM-48x23.png 48w" sizes="auto, (max-width: 780px) 100vw, 780px" /></figure>
</div>


<h3 class="wp-block-heading"><strong>Proof-of-Concept Test Results</strong></h3>



<p>Several trials of a proof-of-concept (PoC) HELMET architecture have been conducted to evaluate performance and demonstrate the feasibility of HELMET supporting rail and automotive applications. The first one described in this article was conducted in April 2022 along the track and nearby road between central Rome and Leonardo da Vinci-Fiumicino International Airport (FCO) [1]. As shown in&nbsp;<strong>Figure 6,</strong>&nbsp;a highway (A51) runs along the same route roughly parallel to the track. This allows for testing the user algorithms in the automobile shown in&nbsp;<strong>Figure 7</strong>&nbsp;rather than on an active train, which is harder to equip and collect data from. In this PoC architecture, the first tier of augmentation is provided by EGNOS (the European SBAS), and the second tier is made up of eight reference stations in central Italy that are part of the GNSS R&amp;D Network (GRDNet) deployed and operated by SOGEI, the technology partner of the Italian Ministry of Economy and Finance.</p>



<p>While, in general, automotive and rail OBUs are likely to use different elements of the GNSS corrections provided by AIMN, the automotive OBU for this test was designed to emulate along-track rail navigation as much as possible. For example, automobile OBUs cannot make use of the knowledge of the surveyed track location exploited by train OBUs. To remove this limitation, the automobile OBU was provided with a digital map of the road lane centerlines constructed separately using post-processed RTK measurements. The automobile was kept as close as possible to the center of the lane by careful driving and lane-keeping assistance. Navigation errors were estimated by differencing a RTK-based truth solution from a separate source (not the same as the source of lane centerlines) from the real-time automotive OBU position estimate.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="618" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-1024x618.png" alt="Screen-Shot-2023-07-14-at-11.41.26-AM" class="wp-image-191581" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-1024x618.png 1024w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-300x181.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-768x464.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM-48x29.png 48w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.26-AM.png 1534w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="340" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-1024x340.png" alt="Screen-Shot-2023-07-14-at-11.41.41-AM" class="wp-image-191582" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-1024x340.png 1024w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-300x100.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-768x255.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-1536x510.png 1536w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM-48x16.png 48w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.41-AM.png 1542w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>Figure 8&nbsp;</strong>uses the Stanford triangle diagram to compare along-track position errors (on the x-axis) with the protection levels (PLs) computed by the OBU as bounds on this error to the GNSS THR of 10<sup>-6</sup>&nbsp;per hour for this application under SL 1 in&nbsp;<strong>Table 1.</strong>&nbsp;<strong>Figure 9</strong>&nbsp;shows the same position error data as a function of time during the drive from Rome to Fiumicino airport. These plots show the actual position error did not exceed about 1.25 meters for time epochs that were available, where “available” means the calculated protection level did not exceed the 5-meter alert limit for SL 1 in&nbsp;<strong>Table 1</strong>&nbsp;(PL and AL are known to the OBU in real time and are one means of protecting integrity). As shown in&nbsp;<strong>Figure 8,</strong>&nbsp;eight epochs had PLs exceeding 5 meters, shown as red points in&nbsp;<strong>Figure 9.</strong>&nbsp;The errors observed during these unavailable epochs were significantly larger than those of the available epochs, reaching as high as 3 meters. However, because the PLs in these cases were above 5 meters, integrity would have been maintained (error ≤ PL) even if the availability determination (PL ≤ AL) were ignored.</p>



<p>In November 2022, the passenger train shown in&nbsp;<strong>Figure 10</strong>&nbsp;was equipped with a prototype rail OBU and used to collect HELMET PoC measurements along the line from Cagliari to Decimomannu in southern Sardinia shown in&nbsp;<strong>Figure 11.&nbsp;</strong>This allowed HELMET to be tested in an operational rail environment.</p>



<p>The position errors estimated during this experiment look much like those obtained from the automobile along the Rome-to-Fiumicino highway.&nbsp;<strong>Figure 12</strong>&nbsp;shows the Stanford triangle diagram for this test and&nbsp;<strong>Figure 13</strong>&nbsp;shows the along-track position error versus time. The position errors in this rail test were slightly larger than those along the highway but did not exceed 2.2 meters. The along-track protection levels on the y-axis in&nbsp;<strong>Figure 12</strong>&nbsp;were also similar to those observed along the highway. Only two out of 1,349 epochs in the rail test had protection levels exceeding the alert limit (and thus unavailable). However, note the alert limit shown in&nbsp;<strong>Figure 12</strong>&nbsp;is 12 meters to correspond to the existing 1-D along-track requirement for ERTMS. The alert limit in&nbsp;<strong>Figure 9</strong>&nbsp;for the automobile test is 5 meters. If it had been set to 12 meters, none of the epochs would have been unavailable.&nbsp;</p>


<div class="wp-block-image">
<figure class="alignleft size-full is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM.png" alt="Screen-Shot-2023-07-14-at-11.41.47-AM" class="wp-image-191583" style="width:774px;height:383px" width="774" height="383" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM.png 1016w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM-300x149.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM-768x381.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.47-AM-48x24.png 48w" sizes="auto, (max-width: 774px) 100vw, 774px" /></figure>
</div>


<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="384" src="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-1024x384.png" alt="Screen-Shot-2023-07-14-at-11.41.58-AM" class="wp-image-191584" srcset="https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-1024x384.png 1024w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-300x112.png 300w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-768x288.png 768w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-1536x576.png 1536w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM-48x18.png 48w, https://insidegnss.com/wp-content/uploads/2023/07/Screen-Shot-2023-07-14-at-11.41.58-AM.png 1542w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<h3 class="wp-block-heading"><strong>Summary</strong></h3>



<p>This article describes HELMET as an example of a single GNSS augmentation architecture that includes multiple service levels and multiple types of GNSS corrections and integrity information to serve multiple user classes and different requirements within each class. HELMET includes two tiers of GNSS augmentation, with multiple forms of corrections and integrity information included within the second tier (e.g., code-phase, PPP and RTK corrections). HELMET represents a practical, cost-effective approach for rail, automotive and UAV applications. HELMET illustrates how multiple forms of GNSS augmentation can be combined to support many different classes of GNSS and navigation users without requiring individual, specialized systems for each one.&nbsp;</p>



<h3 class="wp-block-heading"><strong>Acknowledgments</strong></h3>



<p>The authors would like to thank the team of engineers at RadioLabs and the external partners of HELMET who developed and performed the HELMET prototype tests. They would also like to thank Dr. Daniel Lopour from EUSPA for his technical and programmatic support and Rete Ferroviaria Italiana SpA (RFI) and Azienda Nazionale Autonoma Delle Strade (ANAS) for their help in developing requirements for rail and automotive applications. The HELMET project was developed under contract 870257 from EUSPA.</p>



<h3 class="wp-block-heading"><strong>References</strong></h3>



<p>[1] F. Rispoli, A. Vennarini, et al., “On the GNSS augmentation services for the ERTMS train control and<br>Connected Car applications: technical synergies and opportunities,” Proceedings of ION GNSS+ 2022.<br>Denver, CO, Sept. 2022, pp. 1514-1528.<br>https://www.researchgate.net/publication/364115778_On_the_GNSS<br>_augmentation_services_for_the_ERTMS_train_control_and_Connected_Car_applications_technical_sy<br>nergies_and_opportunities<br>[2] A. Neri, F. Rispoli, P. Salvatori, “The Perspective of Adopting the GNSS for the Evolution of the<br>European Train Control System (ERTMS): A Roadmap for a Standardized and Certifiable Platform,<br>”Proceedings of ION GNSS+ 2015. Tampa, FL, Sept. 2015, pp. 542-552.<br>https://www.ion.org/publications/abstract.cfm?articleID=12903<br>[3] C. Stallo, A. Neri, et al., “GNSS Integrity Monitoring for Rail Applications: Two-Tiers Method,” IEEE<br>Transactions on Aerospace and Electronic Systems. Vol. 55, No. 4, Aug. 2019, pp. 1850-1863.<br>https://doi.org/10.1109/TAES.2018.2876735<br>[4] S. Lo, S. Pullen, et al., “Projected Performance of a Baseline High Integrity GNSS Railway<br>Architecture under Nominal and Faulted Conditions,” Proceedings of ION GNSS+ 2017. Portland, OR,<br>Sept. 2017, pp. 2148-2171. http://web.stanford.edu/<br>group/scpnt/gpslab/pubs/papers/Lo_IONGNSS_2017_Railway.pdf<br>[5] T.G.R. Reid, A. Neish, B. Manning, “Localization &amp; Mapping Requirements for Level 2+<br>Autonomous Vehicles,&#8221; Proceedings of the 2023 International Technical Meeting (ITM). Long Beach, CA,<br>Jan. 2023, pp. 107-123. https://doi.org/10.33012/2023.18634</p>



<h3 class="wp-block-heading"><strong>Authors</strong></h3>



<p><strong>Francesco Rispoli</strong><br>is the General Director of RadioLabs and the Manager of the National Cluster of Transports. From 2011 to 2020, he was with Hitachi Rail, responsible for satellite operations, and was previously with Telespazio and Alenia Spazio. He received a degree in Electronic Engineering from the Polytechnic of Turin in 1978 and a Master on Applied Electromagnetism from the University La Sapienza in Roma in 1980.&nbsp;</p>



<p><strong>Alessandro Neri</strong>&nbsp;<br>is a full professor in Telecommunications at Roma Tre University. Since 2009, he is the President of RadioLabs, a not-for-profit research center based on a partnership between universities and industrial companies. Since November 2022, he is the Vice Rector for Innovation and Technology Transfer at Roma Tre University. He is the chairman of WG-2 of the RTCM SC-134 Special Committee. His research activity has mainly been focused on information theory, signal and image processing, and location and navigation technologies.</p>



<p><strong>Alessia Vennarini</strong>&nbsp;received a Master’s Degree in Information and Communication Technology Engineering from University Roma Tre in 2011. In 2012 she joined the RadioLabs Research Center as a GNSS expert. Since then, she has been involved in European and national projects concerning the use of GNSS for train traffic management and connected road vehicles.</p>



<p><strong>Arianna Persia</strong>&nbsp;received a Master’s Degree in Telecommunication Engineering from the University of L’Aquila (Italy). In 2020, she received a Ph.D. in Information and Communication Technologies in the Department of Information Engineering, Computer Science and Mathematics of the University of L’Aquila. Since 2020, she has been a researcher at the RadioLabs Consortium, where she is currently involved in European and national projects in the field of satellite navigation and connected road vehicles.</p>



<p><strong>Roberto Capua</strong>&nbsp;<br>is an Electronic Engineer with 25 years of experience in GNSS applications along with Research and Development for Public and Private Organizations. Currently, he is responsible for GNSS R&amp;D for SOGEI, the technological partner of the Ministry of Economy and Finance of Italy. He is the Secretary of the Galileo Services Association and the Chairman of the RTCM SC-134 Committee “Integrity for GNSS-Based High Accuracy Applications.”</p>
<p>The post <a href="https://insidegnss.com/q-how-can-gnss-augmentation-services-be-combined-to-simultaneously-support-multiple-user-classes-with-demanding-but-varied-requirements/">Q: How can GNSS augmentation services be combined to simultaneously support multiple user classes with demanding but varied requirements?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Q: How could GNSS users determine in real time that their received navigation signals are correct? What methods are recommended, and when might they go into operation?</title>
		<link>https://insidegnss.com/q-how-could-gnss-users-determine-in-real-time-that-their-received-navigation-signals-are-correct-what-methods-are-recommended-and-when-might-they-go-into-operation/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Tue, 08 Mar 2022 04:22:35 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=188482</guid>

					<description><![CDATA[<p>Cryptographic techniques can optimize the trade-off between authentication integrity (minimizing the probability of authenticating a modified message), ease of modification of existing signals...</p>
<p>The post <a href="https://insidegnss.com/q-how-could-gnss-users-determine-in-real-time-that-their-received-navigation-signals-are-correct-what-methods-are-recommended-and-when-might-they-go-into-operation/">Q: How could GNSS users determine in real time that their received navigation signals are correct? What methods are recommended, and when might they go into operation?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cryptographic techniques can optimize the trade-off between authentication integrity (minimizing the probability of authenticating a modified message), ease of modification of existing signals (for operator and user acceptance), and minimal impact on existing users who will form the vast majority of the GNSS user population for some time to come.</p>



<span id="more-188482"></span>



<p><strong>A:</strong> A serious and growing concern for users of GPS and other GNSS constellations is the possibility that the pseudorandom code signals and navigation data encoded on them might be altered from what is originally transmitted by GNSS satellites. Instances of likely or potential GNSS spoofing have been reported multiple times in this magazine ([1]), as well as various approaches and tools for detection and mitigation ([2,3]), and concerns for specific user segments with the most demanding integrity requirements ([3]). The last two decades of research on spoofing and its mitigation have shown that, while most types of spoofing can be detected by existing receivers using a variety of monitor algorithms, it is difficult to guarantee detection of the most sophisticated forms of spoofing without new tools.</p>



<p>One useful technique likely to be provided to users in the future is the ability to authenticate their received GNSS signals. “Authentication” in this context means confirming that the received signals are the same as those transmitted by authorized sources (GNSS satellites) and have not been modified or overwhelmed by spoofers. Authentication can be limited to the navigation data encoded within the PRN code signal (see [4]) or include the spreading code signal as well.&nbsp;</p>



<p>Unlike indirect monitoring of the potential presence of spoofing, authentication represents a direct confirmation of the authenticity of received signals. To achieve this, some form of cryptography is required. This is a significant change because it implies modifying the interface between GNSS service provider and future users while not significantly affecting existing users who are not aware of this change and don’t need the benefits of authentication.</p>



<p>The basics of cryptographic authentication as it applies to GNSS signals are explained in [5, 6]. Unlike encryption, cryptographic authentication does not modify or obfuscate the transmitted data but instead adds a “signature” to it that is used later to verify the authenticity of the remainder of the data.&nbsp;</p>



<p>Authentication requires additional data bandwidth for these signatures, posing a significant challenge given the constrained data bandwidth of current signals and their pre-internet design. This article focuses on recent work ([7] and [8]) using multiple cryptographic techniques that consider the trade-off between authentication integrity strength and desired features (e.g., minimizing the probability of authenticating a modified message), feasibility of modification of existing signals (for operator and user acceptance), and limited impact on existing users who will form the vast majority of the GNSS user population for some time to come.</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-1024x432.png" alt="Screen-Shot-2022-02-07-at-12.17.20-PM" class="wp-image-188483" width="740" height="312" srcset="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-1024x432.png 1024w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-300x126.png 300w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-768x324.png 768w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM-48x20.png 48w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.20-PM.png 1044w" sizes="auto, (max-width: 740px) 100vw, 740px" /></figure>



<h3 class="wp-block-heading" id="watermarking">Watermarking</h3>



<p>Existing civil GNSS signal authentication concepts, such as Chimera, incorporate the insertion of unpredictable “watermarks” of uninformative content into the GNSS spreading codes, which later allows authentication after the insertions are disclosed [9]. These watermarks are designed to have minimal effect on the spreading codes so that they can be inserted into existing signals without affecting legacy users who do not need signal authentication. Because this attempts to validate the spreading code as well as the encoded navigation data, receivers attempting to authenticate their signals must store raw radio frequency data containing the watermarked spreading codes. After the GNSS provider broadcasts these watermarked codes, the provider separately distributes a cryptographic “seed” so that receivers can generate replicas of the watermarks. Receivers can then go back and re-autocorrelate the spreading codes, considering the signal cryptographically authentic if the replica-to-raw autocorrelation increases correctly after incorporating the watermarks into the replicas [7].</p>



<p>There are several ways to generate watermarks from cryptographic seeds as part of this process, but it is essential to make implementation as data-efficient as possible for both the service provider and user while maintaining a high degree of authentication integrity. One approach based on Timed Efficient Stream Loss-tolerant Authentication (TESLA) was customized to support authentication of SBAS correction and integrity signals in [10] and can be expanded for use with all types of GNSS civil signals.&nbsp;</p>



<h3 class="wp-block-heading" id="tesla-and-ecdsa">TESLA and ECDSA</h3>



<p>Generating cryptographic seeds using TESLA is an alternative to the method known as (the) Elliptic Curve Digital Signature Algorithm, or ECDSA. With ECDSA, a provider produces a message and a signature for a receiver to use for immediate authentication. This signature is pseudorandom and thus can serve as the cryptographic seed of the watermarks. For ECDSA, this is done by asymmetrically providing a “public key” to all users and encoding the signature messages with a “private key” which is secret. The resulting signature can then be verified almost instantaneously by applying the public key. However, the signature messages that result tend to be very large relative to typical GNSS data rates of 50 to 500 bps, and the computation needed to perform authentication in real time is non-trivial [5].&nbsp;</p>



<p>TESLA mitigates these problems by instead providing symmetric keys (the same keys at provider and user) that are provided soon after the signature messages that the keys are used to encode. This creates asymmetry in time: a key received at time&nbsp;<em>t</em>&nbsp;is used to authenticate a signature broadcast some time earlier (<em>t –&nbsp;</em>δ<em>t</em>).&nbsp;<strong>Figure 1</strong>&nbsp;(Figure 2 of [5]) illustrates the use of TESLA’s procedure to validate navigation data in terms of a time series of messages (<em>m</em>), keys (<em>k, K</em>), and Message Authentication Codes (MAC). The MACs represent message signatures and are verified using the same keys that generated (signed) them. First, the MAC is broadcast; then, the key is broadcast later. Both the MACs and the corresponding keys are needed to verify the message data, and since the keys are transmitted after some delay, verification of each set of messages is delayed until the key is provided. The security of authentication arises from how only the original message provider could have generated the message with the transmitted MAC signature before the release of the key [5].&nbsp;</p>



<h3 class="wp-block-heading" id="tesla-based-message-authentication">TESLA-based Message Authentication</h3>



<p>Authentication of the spreading codes is more complex than authentication of encoded data. Since the spreading codes in GNSS ranging signals exist below the thermal noise floor, receivers must know and therefore be able to generate local replicas of the spreading code to deduce pseudoranges. Cryptographic pseudorandom information added to the spreading code must be delivered to receivers separately from the spreading code itself. The advantage of ECDSA in non-GNSS contexts (e.g., internet authentication) is that the receiver can authenticate information immediately, as opposed to the required delay for a so-called “bit-commitment” scheme such as TESLA. However, since the nature of GNSS (the need for correlation of received signals to local replicas) invalidates this feature of ECDSA, it would be better to use a method based on TESLA to exploit the additional features provided by bit-commitment schemes [7].</p>



<p>TESLA provides several advantages relevant to GNSS over exclusively using ECDSA.&nbsp;</p>



<p>First, a small cryptographic distribution can authenticate unlimited information, alleviating the constraint posed by limited GNSS message bandwidth. Second, if a receiver misses a cryptographic distribution, a receiver can rederive that distribution from a later distribution, providing loss tolerance. Third, the cryptographic functions used can be more computationally efficient, saving receiver computation and power. Further, TESLA is used in tandem with ECDSA rather than completely replacing it. ECDSA’s use within TESLA effectively acts as the rekeying operation for TESLA.</p>



<p>TESLA requires the construction of a one-way set of&nbsp;<em>n</em>-bit integers related via repeated application of a cryptographic hash function, where n is the security level of the protocol. Each&nbsp;<em>n</em>-bit integer among the set serves as a hash message authentication code (HMAC) key at a particular time agreed to by provider and receiver [11]. Each&nbsp;<em>n</em>-bit integer is called a Hash Point, and a collection of Hash Points consecutively related via the Hash Function is called a Hash Path. Non-consecutive Hash Points further along the Hash Path are connected via repeated application of the Hash Function. The first Hash Point along the path is called the Hash Path Start, which is just a random&nbsp;<em>n</em>-bit integer. The last Hash Point along the path is called the Hash Path End. The Hash Function (e.g., SHA-256—see [11]) is secure in that it is trivially easy to compute the final Hash Point of the Hash Function given the initial Hash Point, but one can only use exhaustive search to find any initial Hash Point. In other words, the Hash Path is a one-way path. The domain of&nbsp;<em>n</em>-bit integers, together with a randomized&nbsp;<em>n</em>-bit “salt” inclusion to the Hash Function and n ≥ 128, make external precomputation attacks (also called Rainbow Table Attacks) infeasible with modern supercomputers. To complete the security framework, the Hash Path End is separately signed with the ECDSA procedure [7].</p>



<p><strong>Figure 2 </strong>(Figure 1 of [7])shows a simple stream of messages authenticated with TESLA. In this figure, the message provider first generates a complete Hash Path and holds the entire Hash Path secret except for the Hash Path End. In <strong>Figure 2,</strong> the length of the path is 100 Hash Points (HPs). Second, the provider uses ECDSA to sign the Hash Path End (HP 100) and distributes the Hash Path End with an ECDSA signature. Third, the provider sends a message (Message 1 in <strong>Figure 2</strong>) with an HMAC derived from both that message and the currently-secret “preimage” of the Hash Path End, meaning the immediately preceding HP in the Hash Path (i.e., HP 99). Fourth, the provider sends the actual preimage of the Hash Path End (HP 99), meaning it is no longer secret. Fifth, the provider returns to the third step to send a new message (Message 2) and HMAC with the secret second preimage of the Hash Path End (HP 98). This repeats until the provider runs out of preimage Hash Points, at which point it must return to the first step and regenerate a new Hash Path. The receiver’s procedure for validating this received message path is described in detail in [7].</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-1024x763.png" alt="Screen-Shot-2022-02-07-at-12.17.28-PM" class="wp-image-188484" width="707" height="526" srcset="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-1024x763.png 1024w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-300x224.png 300w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-768x572.png 768w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-24x18.png 24w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-36x27.png 36w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM-48x36.png 48w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.28-PM.png 1044w" sizes="auto, (max-width: 707px) 100vw, 707px" /></figure>



<h3 class="wp-block-heading" id="multi-rate-message-authentication">Multi-Rate Message Authentication</h3>



<p>Reference [7] describes an intricate procedure for extending the TESLA-based message authentication procedure to spreading-code authentication based on the generation of separate “slow” and “fast” Hash Paths from a single TESLA sequence to minimize the degradation in spreading code performance created by the insertion of watermarks for authentication (this degradation would be greater if separate Hash Paths were generated independently). This approach takes advantage of the scalability of the TESLA approach since a fixed distribution of TESLA Hash Points can authenticate any amount of information transmitted prior to the Hash Point distribution (within user computation constraints).</p>



<p><strong>Figure 3&nbsp;</strong>(Figure 2 of [7]) shows an overview of this procedure and illustrates the derivation of higher-rate Hash Paths from slower ones by “forking,” as defined mathematically in Section II of [7]. Each black arrow in this figure represents a “normal” hash operation as described previously. The Slow Channel (Hash Path) at the top of the figure is generated first, and the Fast Channel is created from periodic forks (green arrows) of the Slow Channel (via equations (3) and (4) of [7]) combined with normal hash operations in between Slow-Channel updates. Each HP in the Fast Channel is then forked (via equations (7) and (8) of [7]) to generate the watermarks introduced into the spreading-code signal.&nbsp;</p>



<p><strong>Figure 4 </strong>(Figure 3 of [7]) shows how the procedure of <strong>Figure 3 </strong>is further extended to the authentication of both code and data components of GNSS signals. In <strong>Figure 4, </strong>“Ephemeris” refers to the navigation data messages encoded within these signals that supplies satellite ephemeris information, clock corrections, satellite health, and other information. It is authenticated using “Eph Keys” generated from the Fast Channel (red and purple arrows, which correspond to equation (5) of [7] and the normal hashing process of [11]). The watermarks inserted into the spreading code are created by a two-step process from the Fast Channel (blue arrows corresponding to equation (7) of [7]) and yellow arrows corresponding to the “watermarking function” derived in Section V of [7]. With this procedure, we can authenticate all GNSS navigation message data and spreading codes with a minimal distribution and better utilize the limited GNSS data bandwidth. </p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-1024x482.png" alt="Screen-Shot-2022-02-07-at-12.17.38-PM" class="wp-image-188485" width="727" height="342" srcset="https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-1024x482.png 1024w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-300x141.png 300w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-768x361.png 768w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM-48x23.png 48w, https://insidegnss.com/wp-content/uploads/2022/03/Screen-Shot-2022-02-07-at-12.17.38-PM.png 1050w" sizes="auto, (max-width: 727px) 100vw, 727px" /></figure>



<h3 class="wp-block-heading" id="the-near-future-of-gnss-authentication">The (Near) Future of GNSS Authentication</h3>



<p>This article and the details in [7] describe one approach to combined navigation message and spreading code authentication. However, the complexity of this and similar approaches and the need to modify both service provider/satellite transmission protocols and receiver algorithms for users who desire authentication suggests that both code and data GNSS authentication capability will not be in operation before the end of this decade. However, important steps toward this goal are already being made, starting with the easier task of authenticating navigation data messages.&nbsp;</p>



<p>Recently, the European Union Agency for the Space Programme (EUSPA) has published an Info Note and technical details regarding a test phase for Galileo Open Service Navigation Message Authentication (OSNMA) [12, 13]. OSNMA uses a variant of TESLA to distribute cryptographic signatures authenticating Galileo Open Service navigation data messages. These signatures will be broadcast in previously reserved segments of the Galileo navigation message definition (so as not to create a demand for additional bandwidth) from a subset of Galileo satellites. Cross-authentication allows OSNMA to verify navigation data messages from all satellites using only signatures from a subset of the satellites [13].&nbsp;</p>



<p>Authentication of the 250-bit correction and integrity messages encoded on Satellite-based Augmentation System (SBAS) signals is also an area of active development. Reference [10] defines a combined TESLA-ECDSA technique for this that is related to the multi-rate procedure for combined code and data authentication described here and in [7]. Message authentication will help maintain confidence that SBAS continues to meet the demanding integrity requirements that apply to aviation applications of SBAS, such as precision approach under low-visibility conditions.&nbsp;</p>



<h3 class="wp-block-heading" id="summary">Summary</h3>



<p>GNSS signal authentication is expected to be integrated within GNSS services in the next decade or two. One approach to combined authentication of both GNSS navigation data and spreading codes is presented, and its advantages relative to other standard techniques are discussed. Making authentication feasible for future users who require or desire it requires significant changes to both service provider and user equipment and procedures. This emphasizes the need to select authentication approaches that provide the required message verification without undue signal modification, receiver complexity, or undesired effects on the bulk of existing users who will continue to operate without this feature. </p>



<h3 class="wp-block-heading" id="h-references">References</h3>



<p><strong>(1)&nbsp;</strong>“Sinister Spoofing in Shanghai,”&nbsp;<em>Inside GNSS</em>, December 10, 2019.&nbsp;</p>



<p><strong>(2)&nbsp;</strong>G.W. Hein, “Real World Spoofing Trials and Mitigation,”&nbsp;<em>Inside GNSS</em>, May 27, 2017.&nbsp;</p>



<p><strong>(3)&nbsp;</strong>“DHS Publishes Free Resources to Protect Critical Infrastructure from GPS Spoofing,”&nbsp;<em>Inside GNSS</em>. March 5, 2021.&nbsp;</p>



<p><strong>(4)&nbsp;</strong>“What is navigation message authentication?,”&nbsp;<em>Inside GNSS</em>, January 1, 2018.&nbsp;</p>



<p><strong>(5)&nbsp;</strong>A. Neish and T. Walter, “Securing GNSS—A Trip Down Cryptography Lane,”&nbsp;<em>Inside GNSS</em>, May 20, 2020.&nbsp;</p>



<p><strong>(6)&nbsp;</strong>“From Data Schemes to Supersonic Codes,”&nbsp;<em>Inside GNSS</em>, January 16, 2015.&nbsp;</p>



<p><strong>(7)&nbsp;</strong>J. Anderson, S. Lo, T. Walter, “Efficient and Secure Use of Cryptography for Watermarked Signal Authentication,” Proceedings of ION ITM 2022, Long Beach, CA, January 25-27, 2022 (forthcoming).&nbsp;</p>



<p><strong>(8)&nbsp;</strong>J. Anderson, S. Lo, T. Walter, “Cryptographic Ranging Authentication with TESLA, Rapid Re-keying, and a PRF,” Proceedings of ION ITM 2022, Long Beach, CA, January 25-27, 2022 (forthcoming).&nbsp;</p>



<p><strong>(9)&nbsp;</strong>J. M. Anderson, K. L. Carroll, N. P. DeVilbiss, et al, “Chips-Message Robust Authentication (Chimera) for GPS Civilian Signals,” Proceedings of ION GNSS+ 2017, Portland, OR, September 25-29, 2017, pp. 2388–2416.&nbsp;</p>



<p><strong>(10)&nbsp;</strong>J. Anderson, S. Lo, A. Neish, T. Walter, “On SBAS Authentication with Over-the-Air Re-keying (OTAR) Schemes,” Proceedings of ION GNSS+ 2021. St. Louis, MO, Sept. 20-24, 2021, pp. 4288-4304.&nbsp;</p>



<p><strong>(11)&nbsp;</strong>“HMAC,” Wikipedia. https://en.wikipedia.org/wiki/HMAC. Accessed January 11th, 2022.</p>



<p><strong>(12)&nbsp;</strong>“Info Note Available for Galileo Message Authentication (OSNMA); Public Observation Now Underway,”&nbsp;<em>Inside GNSS</em>. December 29, 2021.</p>



<p><strong>(13)&nbsp;</strong>Galileo Open Service Navigation Message Authentication (OSNMA): Info Note, EUSPA, December 2021. doi:10.2878/49446. https://www.gsc-europa.eu/sites/default/files/sites/all/files/Galileo_OSNMA_Info_Note.pdf.</p>
<p>The post <a href="https://insidegnss.com/q-how-could-gnss-users-determine-in-real-time-that-their-received-navigation-signals-are-correct-what-methods-are-recommended-and-when-might-they-go-into-operation/">Q: How could GNSS users determine in real time that their received navigation signals are correct? What methods are recommended, and when might they go into operation?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How can the parameters given in the most recent GPS Standard Positioning Service (SPS) Performance Standard (SPS PS) be used to quantify the performance of GPS applications?</title>
		<link>https://insidegnss.com/how-can-the-parameters-given-in-the-most-recent-gps-standard-positioning-service-sps-performance-standard-sps-ps-be-used-to-quantify-the-performance-of-gps-applications/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Fri, 05 Feb 2021 06:21:44 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=185527</guid>

					<description><![CDATA[<p>The value of the GPS SPS PS goes far beyond the specific parameters that it contains. It has a great deal of information...</p>
<p>The post <a href="https://insidegnss.com/how-can-the-parameters-given-in-the-most-recent-gps-standard-positioning-service-sps-performance-standard-sps-ps-be-used-to-quantify-the-performance-of-gps-applications/">How can the parameters given in the most recent GPS Standard Positioning Service (SPS) Performance Standard (SPS PS) be used to quantify the performance of GPS applications?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="_idContainer009" class="Basic-Text-Frame">
<p class="_Solutions-deck ParaOverride-3">The value of the GPS SPS PS goes far beyond the specific parameters that it contains. It has a great deal of information regarding how GPS operates and ideally should be read in full (including the appendices) by everyone who works with GPS at the measurement level.</p>
<p><span id="more-185527"></span></p>
</div>
<div id="_idContainer011" class="_idGenObjectStyleOverride-1">
<p class="body-txt-1-no-indent-RR-drop-cap">This column reviews the information in the latest SPS PS and shows how it improves the performance of GPS applications. Since this information is used in real time to generate error bounds at high probabilities (“protection levels”) for applications with demanding integrity and continuity requirements, it also discusses the origin of these parameters and the level of reliance that can be placed on them.</p>
<p class="_body-indent ParaOverride-4">In April 2020, the U.S. Government released the 5th Edition of the Global Positioning System Standard Positioning Service Performance Standard (known in short as the “GPS SPS PS” or just “SPS PS”) [1]. This was the first update to the GPS SPS PS in 12 years, as the previous 4th Edition was issued in 2008 [2] (the original version dates to 1993). The new 5th edition contains significant new information as well as tighter standards that at least partially reflect the continued improvements in the GPS Signal-in-Space (SIS) since the mid-2000s.</p>
<h3 class="_Solutions-Ahead">The Meaning of “Performance Standards”</h3>
<p class="_body-indent ParaOverride-5">The SPS PS “Executive Summary” states that “This SPS Performance Standard (SPS PS) specifies the levels of SPS performance in terms of broadcast signal parameters and GPS constellation design. The U.S. Government is committed to meeting and exceeding the minimum levels of service specified in this SPS PS.” Furthermore, “Since GPS initial operational capability (IOC) was first declared in 1993, actual GPS performance has continuously met and exceeded minimum performance levels specified in the SPS PS and users can generally expect improved performance over the minimum levels described here.” [1]</p>
<p class="_body-indent ParaOverride-4">In other words, the “standards” in the SPS PS are based on observed GPS performance over more than 25 years and represent minimums that GPS has consistently met and exceeded. GPS should at least continue to meet or improve upon these standards for the foreseeable future. The U.S. Government evaluates the GPS program and its personnel on whether these SPS standards are met. As noted in [1], the Federal Aviation Administration (FAA) William J. Hughes Technical Center monitors the performance of GPS over time and publishes quarterly Performance Analysis Network (PAN) reports [3] showing recent GPS performance compared to the SPS standards.</p>
<p class="_body-indent ParaOverride-4">While SPS PS standards have always been met (to the author’s knowledge) and are routinely exceeded, as will be shown below, the GPS program cannot guarantee this due to its limited ability to monitor the L1 C/A-code signals that are the basis of SPS in real time. This fact must be kept in mind when applying the standards to safety-critical GPS applications. As an example, the use of modified (dual-frequency, L1 C/A and L5C) GPS SPS within Advanced RAIM or ARAIM (see [4, 6]) depends upon the broadcast of an Integrity Support Message (ISM) containing key integrity parameters, such as the probability of a single GPS satellite being in a faulted state that is not obvious (P<span class="CharOverride-3">sat</span>). These parameters are based on performance commitments from GPS and other constellation service providers but are backed up by ground monitoring and can be changed if violations are detected (depending on the timeliness of both the monitoring and the ISM message updates).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-185528" src="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM.jpg" alt="Screen Shot 2021-01-22 at 1.41.16 PM" width="694" height="487" srcset="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM.jpg 1044w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-300x210.jpg 300w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-1024x718.jpg 1024w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-768x538.jpg 768w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-24x17.jpg 24w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-36x25.jpg 36w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.16-PM-48x34.jpg 48w" sizes="auto, (max-width: 694px) 100vw, 694px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-185529" src="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM.png" alt="Screen Shot 2021-01-22 at 1.41.25 PM" width="818" height="331" srcset="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM.png 1044w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-300x121.png 300w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-1024x414.png 1024w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-768x310.png 768w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.25-PM-48x19.png 48w" sizes="auto, (max-width: 818px) 100vw, 818px" /></p>
<h3 class="_Solutions-Ahead">Performance and Accuracy Standards</h3>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figure 1</span> illustrates GPS SIS User Range Error (URE) performance and shows how it has improved over time. In <span class="_figure-flash" lang="fi-FI">Figure 1,</span> 95th-percentile (roughly 2-sigma) bounds on estimated URE for each GPS satellite (indexed by SVN on the right) during each month since 2008 are shown as determined by a network of ground stations collecting samples every 15 minutes (extended from [5]). The thick black line indicates the 95% URE bound over all active satellites. Lower UREs provided by the improved clocks in newer satellite types and GPS Control Segment (CS) improvements have contributed to the steady decrease in overall constellation URE, but a significant spread between best and worst-performing satellites (even within the same Block type) remains to this day.</p>
<p class="_body-indent ParaOverride-4">Section 3.4 of the SPS PS [1] defines accuracy standards for URE as well as for URRE (User Range Rate Error), URAE (User Range Acceleration Error), and UTC time offset error (UTCOE). All these errors reflect GPS SIS contributions and not those due to atmospheric or user errors. Only URE will be addressed here due to space constraints.</p>
<p class="_body-indent ParaOverride-4">The first and fourth rows of Table 3.4-1 have four key parameters that are summarized in <span class="_figure-flash" lang="fi-FI">Table 1.</span> The key distinction between them is Age of Data (AOD), or the time elapsed since the clock and ephemeris parameters within the GPS navigation data were computed by the GPS CS. The URE bound in the first row is an average over all AODs across the constellation within the range of “normal operations,” meaning that each satellite receives a CS upload with new clock and ephemeris parameters at least once per day. The bound in the second row is for the theoretical (but impractical) possibility of Zero AOD and thus represent a lower bound on URE based on CS modeling and navigation data quantization errors. The bound in the third row is a worst-case value, as it applies to “any AOD” and thus must cover the maximum AOD within “normal operations,” which is 26 hours with 1 upload per satellite per day and 10 hours with 3 uploads per satellite per day. As <span class="_figure-flash" lang="fi-FI">Table 1</span> shows, these URE bounds have improved significantly between the 4th and 5th Editions of the SPS PS.</p>
<p class="_body-indent ParaOverride-4">The bounds in the first three rows of <span class="_figure-flash" lang="fi-FI">Table 1</span> apply to any usable (trackable and healthy satellite), meaning that they individually cover each healthy satellite in the constellation (including those with relatively high errors). The fourth row of <span class="_figure-flash" lang="fi-FI">Table 1</span> is new in the 5th Edition of the SPS PS and provides an ensemble URE bound over all usable satellites. This distinction is important, as shown in <span class="_figure-flash" lang="fi-FI">Figure 1,</span> where the ensemble 95% URE bound entering 2020 (about 1.0 m, according to the thick black line) is much lower than the bound for the satellite with the largest error (about 2.5 m). Both of these numbers are well below the bounds over all AODs of 2.0 and 7.0 m, respectively, which indicates the amount of margin still present in the SPS PS parameters.</p>
<h3 class="_Solutions-Ahead">GPS Satellite Constellation Definition</h3>
<p class="_body-indent ParaOverride-5">Section 3.2 of the GPS SPS PS defines the orbit parameters of the baseline and expandable 24-slot GPS constellations that the GPS CS attempts to maintain. The parameters in the 5th Edition [1] have been changed from earlier versions. In particular, the orbit parameters in Table 3.2-1 have different time epoch and Greenwich Hour Angle as well as modified RAAN and Argument of Latitude parameters for each orbit slot for this new epoch (note that “Argument of Latitude” is the sum of the Argument of Perigee and Mean Anomaly angles that are provided separately in GPS almanacs). However, the Groundtrack Equatorial Crossing (GEC) or Geographic Longitude of the Ascending Node (GLAN) angles remain the same, indicating that the same satellite ground tracks on Earth’s surface are being maintained. In addition, the three expandable orbit slots from before (B1, D2, and F2), where two nearby satellites could be present instead of a single satellite, have been augmented by three more in slots A2, C4, and D3, so that there is now one expandable slot per orbit plane. Table 3.2-2 shows how each expandable slot would be occupied by two nearby orbit slots rather than the single slot in Table 3.2-1.</p>
<p class="_body-indent ParaOverride-4">For comparison, <span class="_figure-flash" lang="fi-FI">Figure 2</span> shows a recent depiction of the GPS constellation as of August 1, 2020 [7]. At that time, 31 satellites were in orbit, and all orbit planes except the A Plane had more than four satellites present. Expandable slots B1, D2, and F2, which were already defined in 2008 [2], each had two satellites ((F)ore and (A)ft) in them. Four other satellites were present in auxiliary “spare” slots: SVN 59 in the C Plane, SVN 45 in the D Plane, and SVNs 47 and 76 in the E plane. The GLAN (or GEC) values on the y-axis can be roughly compared to the ideal values in Tables 3.2-1 and 3.2-2 and match to within a few degrees.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-185530" src="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM.png" alt="Screen Shot 2021-01-22 at 1.41.33 PM" width="602" height="390" srcset="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM.png 1044w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-300x194.png 300w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-1024x663.png 1024w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-768x497.png 768w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.33-PM-48x31.png 48w" sizes="auto, (max-width: 602px) 100vw, 602px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-185531" src="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM.jpg" alt="Screen Shot 2021-01-22 at 1.41.42 PM" width="488" height="444" srcset="https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM.jpg 706w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM-300x273.jpg 300w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM-24x22.jpg 24w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM-36x33.jpg 36w, https://insidegnss.com/wp-content/uploads/2021/02/Screen-Shot-2021-01-22-at-1.41.42-PM-48x44.jpg 48w" sizes="auto, (max-width: 488px) 100vw, 488px" /></p>
<h3 class="_Solutions-Ahead">Error Bounding and Integrity Standards</h3>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figure 3</span> shows how GPS UREs were bounded by the User Range Accuracy (URA) bounds derived from the navigation data broadcast by each GPS satellite from 2008 to 2018, inclusive [6]. In this plot, Maximum Position Errors (MPEs) are estimated and are normalized by the URA derived for that satellite. MPE differs from URE in that it represents the maximum satellite clock and orbit error projected onto earth at the time in question (as opposed to the URE at a specific user location) [5]. In <span class="_figure-flash" lang="fi-FI">Figure 3,</span> satellites of the same Block type are grouped together (along with all SVs combined) and show that newer satellites (Blocks IIR and especially IIF) have lower errors relative to URA. All these lines are bounded by the red line representing the standard Gaussian distribution (which represents the “overbound” provided by URA after normalization) out to at least a probability of 10<span class="CharOverride-4">-5</span>.</p>
<p class="_body-indent ParaOverride-4">Section 3.5 of the GPS SPS PS defines the integrity parameters that apply to UREs and other errors. Table 3.5-1 states that the probability of URE from any satellite exceeding an NTE tolerance given by 4.42 times the URA derived from the broadcast navigation data without a timely alert being issued (within 10 seconds) is no greater than 10<span class="CharOverride-4">-5</span> over any hour during normal operations. Note that 4.42 represents the value of a standard Gaussian distribution covering both positive and negative tails to a probability of 1–10<span class="CharOverride-4">-5</span>. Thus, this requirement effectively states that a Gaussian distribution with zero mean and variance given by URA<span class="CharOverride-4">2</span> bounds the true URE out to 10<span class="CharOverride-4">-5</span> under the listed conditions, and this is what is demonstrated in <span class="_figure-flash" lang="fi-FI">Figure 3.</span> The listed conditions include the satellite in question having URE below NTE at the start of the hour and that the worst-case delayed alert is 6 hours after the URE ≤ NTE criterion is violated. This has not changed in the 5th Edition of the SPS PS, but Figure 3 shows that the margin by which this requirement is met has increased greatly since 2008 (recall that no Block IIA satellites remain in the GPS constellation).</p>
<p class="_body-indent ParaOverride-4">Table 3.5-5 is an important addition to the 5th Edition of the SPS PS. It gives specific parameters for the P<span class="CharOverride-3">sat</span> and P<span class="CharOverride-3">const</span> parameters required for ARAIM and contained in the ARAIM ISM mentioned earlier. P<span class="CharOverride-3">sat</span> represents the state probability (probability at any given time) that any individual satellite is in a faulty (but still usable) state, while P<span class="CharOverride-3">const</span> represents the state probability of a correlated constellation failure across multiple (or all) satellites. These values are 10<span class="CharOverride-4">-5</span> for P<span class="CharOverride-3">sat</span> and 10<span class="CharOverride-4">-8</span> for P<span class="CharOverride-3">const</span>, respectively, using the same definition of fault (URE &gt; NTE) as in Table 3.5-1. In addition, the mean delay before an alert takes place (at which point a failed satellite is no longer usable) is given as 1 hour, which allows conversion between these state probabilities and the probability rates per time interval used in ARAIM.</p>
<p class="_body-indent ParaOverride-4">The value of 10<span class="CharOverride-4">-5</span> for P<span class="CharOverride-3">sat</span> is not new, as it was already implied by the requirement in Table 3.5-1. Only 5 satellite-fault events under the SPS PS definition have been observed since 2008 (with none observed since 2012) [5], which provides confidence that the value of P<span class="CharOverride-3">sat</span> will continue to be met with margin in the future. However, the value of 10<span class="CharOverride-4">-8</span> for P<span class="CharOverride-3">const</span>is new and represents a much lower probability than thought to be independently verifiable by ARAIM [4]. Given a mean alert delay of one hour, the implied constellation failure rate is 10<span class="CharOverride-4">-8</span> per hour, or approximately one failure per 11,400 years. This is difficult to verify from the history of GPS (even given that no such faults have been known to occur since 1995) or from continuous ground monitoring. However, it represents a commitment that is of significant value to ARAIM users if it can be relied upon. As shown in [9], it would allow ARAIM to be implemented using the GPS constellation only and still support applications with integrity risk requirements of 1 in 10<span class="CharOverride-4">-7</span> per operation. Previously, the use of multiple GNSS constellations was assumed to be required for these applications so that each constellation could be cross-checked against at least one other in real time [4].</p>
<h3 class="_Solutions-Ahead">GPS Continuity and Availability Standards</h3>
<p class="_body-indent ParaOverride-5">Sections 3.6 and 3.7 of the SPS PS define standards on GPS satellite (or orbit slot) continuity and availability. For continuity, meaning unscheduled signal interruption (e.g., a satellite in a given orbit slot suddenly broadcasts an “unhealthy” flag without warning from a previous NANU), Table 3.6-1 limits this probability to 1–0.9998 (or 0.0002) over any hour given that the signal from that orbit slot was available and healthy at the start of that hour. This value represents a mean time between failures (unscheduled interruptions) of 5,000 hours, or 0.57 years, which is conservative given observed GPS history. This value applies to the ensemble of satellites across the GPS constellation; it may not be met for older satellites with limited redundancy that are more vulnerable to unscheduled interruptions [8].</p>
<p class="_body-indent ParaOverride-4">Table 3.7-1 specifies a state probability of 0.957 or greater of a slot in either the baseline or expandable 24-slot configuration being occupied by a satellite broadcasting a healthy SIS (meaning appearing to be “healthy” and meeting the other SPS PS standards). Again, this is an average over all slots in the constellation and may not be met for a given slot that is occupied by an older satellite. This number has not changed from the 4th Edition and is based on the conservative outage model given in Section A.7; thus, it has been met with margin since at least 2008. The notes under Table 3.7-1 clarify that, while the 24 baseline slots should be occupied by at least one satellite, the six expandable slots of these 24 shown in Table 3.2-2 are not always occupied by two satellites, and if they have two satellites, losing availability from one of them does not constitute loss of availability from that slot.</p>
<h3 class="_Solutions-Ahead">Conclusions</h3>
<p class="_body-indent ParaOverride-5">This article describes the key performance standards provided by the 5th Edition of the GPS SPS PS released in 2020, how they have improved beyond the 4th Edition of 2008, how they compare to observed performance, and the degree of reliance that can be placed on them. In general, observed GPS performance significantly exceeds these standards, providing confidence that the parameters in the PS will continue to be met with margin. However, the GPS Program cannot physically guarantee this due to its limited resources. Care should be taken when applying these standards, or any similar standards, to safety-of-life-critical GNSS applications.</p>
<p class="_body-indent ParaOverride-4">The value of the GPS SPS PS goes far beyond the specific parameters that it contains. It has a great deal of information regarding how GPS operates and ideally should be read in full (including the appendices) by everyone who works with GPS at the measurement level. Other GNSS constellation providers should follow the lead of the GPS SPS PS and provide public standards for their own open-service signals once they gain sufficient operational history.</p>
<p class="_Solutions-Ahead ParaOverride-3">References</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(1) </span>Global Positioning System Standard Positioning Service Performance Standard, Washington, DC, U.S. Dept. of Defense, 5th Ed, April 2020. https://www.gps.gov/technical/ps/2020-SPS-performance-standard.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(2) </span>Global Positioning System Standard Positioning Service Performance Standard, Washington, DC, U.S. Dept. of Defense, 4th Ed (superseded), Sept. 2008. https://www.gps.gov/technical/ps/2008-SPS-performance-standard.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(3) </span>“GPS PAN Report Archive,” U.S. Federal Aviation Administration, William J. Hughes Technical Center, Atlantic City, NJ. Updated Oct. 2020. https://www.nstb.tc.faa.gov/DisplayArchive.htm</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(4) </span>“Milestone 3 Report of the E.U.-U.S. Cooperation on Satellite Navigation Working Group C: ARAIM Technical Subgroup,” Final Version, Feb. 25, 2016. https://www.gps.gov/policy/ cooperation/europe/2016/working-group-c/ARAIM-milestone-3-report.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(5) </span>T. Walter, K. Gunning, R.E. Phelts, J. Blanch, “Validation of the Unfaulted Error Bounds for ARAIM,” Proceedings of ION Pacific PNT 2017, Honolulu, HI, May 2017. http://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Walter_IONPNT_2017.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(6) </span>T. Walter, J. Blanch, K. Gunning, “Standards for ARAIM ISM Data Analysis,” Proceedings of ION Pacific PNT 2019, Honolulu, HI, April 2019. http://web.stanford.edu/group/scpnt/gpslab/pubs/papers/Walter_Standards_for_ARAIM_ISM_IONPacPNT2019.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(7) </span>“U.S. Coast Guard Navigation Center (NavCen) GPS Constellation Status,” https://www.navcen.uscg.gov/? Do=constellationStatus, Accessed Dec. 16, 2020. Direct link to figure at: https://www.navcen.uscg.gov/pdf/gps/current.pdf</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(8) </span>S. Pullen, P. Enge, “Using Outage History to Exclude High-Risk Satellites from GBAS Corrections,” Navigation, Vol. 60, No. 1, Spring 2013, pp, 41-51. https://www.ion.org/publications/abstract.cfm?articleID=102590^p</p>
<p class="_body-3-no-indent ParaOverride-6"><span class="_small-RED">(9) </span>A. Katz, S. Pullen, S. Lo, et al., “ARAIM for Military Users: ISM Parameters, Constellation-Check Procedure and Performance Estimates,” Proceedings of ION ITM 2021, San Diego, CA (virtual), Jan. 2021 (forthcoming).</p>
</div>
<p>&nbsp;</p>
<p>The post <a href="https://insidegnss.com/how-can-the-parameters-given-in-the-most-recent-gps-standard-positioning-service-sps-performance-standard-sps-ps-be-used-to-quantify-the-performance-of-gps-applications/">How can the parameters given in the most recent GPS Standard Positioning Service (SPS) Performance Standard (SPS PS) be used to quantify the performance of GPS applications?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can Analytical Techniques Guarantee That GNSS Errors Are Bounded Under Rare Conditions? What Techniques Are Available?</title>
		<link>https://insidegnss.com/can-analytical-techniques-guarantee-that-gnss-errors-are-bounded-under-rare-conditions-what-techniques-are-available/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Mon, 05 Oct 2020 18:36:20 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=184542</guid>

					<description><![CDATA[<p>Research has focused on methods to analytically determine bounding probability distributions and parameters and identify the conditions under which such bounds are guaranteed...</p>
<p>The post <a href="https://insidegnss.com/can-analytical-techniques-guarantee-that-gnss-errors-are-bounded-under-rare-conditions-what-techniques-are-available/">Can Analytical Techniques Guarantee That GNSS Errors Are Bounded Under Rare Conditions? What Techniques Are Available?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="body-txt-1-no-indent-RR-drop-cap"><span class="_idGenDropcap-1">Research has focused on methods to analytically determine bounding probability distributions and parameters and identify the conditions under which such bounds are guaranteed to hold. This column summarizes several important examples from this research to highlight the most useful principles and techniques.</span><span id="more-184542"></span></p>
<p class="body-txt-1-no-indent-RR-drop-cap"><span class="_idGenDropcap-1">T</span><span class="CharOverride-3">he <a href="https://insidegnss.com/why-is-bounding-gnss-errors-under-rare-or-anomalous-conditions-important-and-what-makes-it-difficult/" target="_blank" rel="noopener noreferrer">GNSS Solutions column in the May/June issue of </a></span><span class="CharOverride-4">Inside GNSS</span><span class="CharOverride-3"> ([1], hereafter “Part I”) explained that error bounds valid to very low probabilities such as 10</span><span class="CharOverride-5">-7</span><span class="CharOverride-3"> to 10</span><span class="CharOverride-5">-9</span><span class="CharOverride-3"> are needed to calculate protection levels (PLs) that can be compared to safe error limits (“alert limits”) to confirm that safety is maintained in real time. It also highlighted the difficulties in creating such error bounds when the probability distributions governing GNSS errors at such small probabilities are unknown and often have tails that are fatter than those of a normal (Gaussian) distribution.</span></p>
<p class="body-txt-1-no-indent-RR-drop-cap">Part I addressed this problem empirically by showing how Gaussian distributions with larger (inflated) sigma values can be used to bound the tails of sampled error data. This approach is commonly used and provides some confidence that rare-event error values used to compute protection levels for GNSS applications with demanding integrity requirements are acceptably conservative. However, when inflated sigma values are determined empirically, no guarantee exists that the resulting position-domain protection levels bound actual errors to the required probabilities.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-184544" src="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM.jpg" alt="Screen Shot 2020-10-05 at 2.33.17 PM" width="606" height="517" srcset="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM.jpg 1010w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM-300x256.jpg 300w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM-768x655.jpg 768w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM-24x20.jpg 24w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM-36x31.jpg 36w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.17-PM-48x41.jpg 48w" sizes="auto, (max-width: 606px) 100vw, 606px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-184545" src="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM.png" alt="Screen Shot 2020-10-05 at 2.33.23 PM" width="378" height="239" srcset="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM.png 560w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM-300x190.png 300w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.23-PM-48x30.png 48w" sizes="auto, (max-width: 378px) 100vw, 378px" /></p>
<p class="body-txt-1-indent-RR ParaOverride-4">To address this problem and to further fortify the confidence that safety-of-life users have in their protection levels, a significant amount of research has focused on methods to analytically determine bounding probability distributions and parameters and identify the conditions under which such bounds are guaranteed to hold. While none of these magically solve the problem of not knowing the true error distributions, they provide a great deal of insight into why this problem is hard and what can be done to reduce bounding uncertainty without requiring extreme conservatism (e.g., very large inflation factors, which result in loss of availability). This column summarizes several important examples from this research to highlight the most useful principles and techniques.</p>
<h3 class="_Solutions-Ahead">CDF Bounding</h3>
<p class="_body-indent ParaOverride-5">A paper published by Bruce DeCleene in 2000 [2] was a key starting point in understanding the difficulty of analytically bounding rare-event errors and proposing analysis techniques. This paper explained the concept of cumulative distribution function (CDF) bounding that is the foundation for most practical bounding techniques. CDF bounding requires that the CDF of a bounding distribution (in the range domain) exceed the true (unknown) CDF for every error value above the mean error and be below the true CDF for every error value below the mean. When multiple statistically independent bounding distributions in the range domain are combined (convolved) together to form position-domain error distributions, the resulting distributions will also bound actual position-domain errors as long as the following conditions are met for both the bounding distribution and the underlying error distribution [2,3]:</p>
<p class="_body-indent ParaOverride-5">• Both distributions are zero-mean (or any non-zero means are known and accounted for in determining error probabilities).</p>
<p class="_body-indent ParaOverride-6">• Both distributions are symmetric about the mean, meaning that the shape of the probability density function (PDF) and CDF on both sides of the mean are identical. Symmetric distributions have the same mean, median, and mode.</p>
<p class="_body-indent ParaOverride-6">• Both distributions are unimodal, meaning that the distribution has only one peak frequency of occurrence and continuously falls off in probability on both sides of this peak (i.e., its PDF has only one “hump”).</p>
<p class="_body-indent ParaOverride-7">In practice, the bounding distribution is usually a Gaussian distribution with a standard deviation made large enough to bound data sets of actual error samples (the empirical technique in Part I uses this approach). This supports the existing Gaussian formulation of the protection level equations for civil aviation applications and makes range to position domain convolution straightforward.</p>
<p class="_body-indent ParaOverride-7">The difficulty, of course, is determining if these properties hold for an unknown actual error distribution. In practice, even for symmetrical distributions, the true mean error is difficult to observe with sufficient confidence, so a conservative estimate of it needs to be included in the inflated bounding sigma. In addition, error distributions are not symmetric and unimodal in general, especially for low-probability errors. Some GNSS range-domain error sources, such as multipath and atmospheric delay, may have different distribution shapes on positive and negative sides for physical reasons. Also, multiple local maxima often occur at low probabilities in actual data, but it is hard to tell if these are due to statistical randomness or actual error behavior. As noted in Part I, the “nominal” conditions described by a single error distribution encompass many different nominal, near-nominal, and off-nominal conditions. Off-nominal events with low probabilities can be bounded by a single distribution with an inflated CDF, but they can create additional “peaks” in the PDF that violate the unimodal condition.</p>
<p class="_body-indent ParaOverride-7">For illustration, <span class="_figure-flash" lang="fi-FI">Figure 1</span> shows the histogram (in PDF form) of a data set generated by Monte Carlo sampling from multiple Gaussian distributions with different means in the manner conducted in Part I. <span class="_figure-flash" lang="fi-FI">Table 1</span> shows the five Gaussian distributions sampled from and the probability that applies to each, meaning that each of the 10 million samples collected has that probability of being taken from the corresponding Gaussian distribution. Since four of the five distributions (all but <span class="CharOverride-6">r0</span>) are biased in the positive direction by different amounts, the resulting distribution is not symmetric. In addition, because two of these distributions (<span class="CharOverride-6">r2</span> and <span class="CharOverride-6">r4,</span> with means of 2.5 and 5.5, respectively) have similar probabilities of occurrence as the unbiased distribution, two humps appear at those bias values and prevent unimodality (with the hump from <span class="CharOverride-6">r2</span> being the highest).</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-184546" src="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM.jpg" alt="Screen Shot 2020-10-05 at 2.33.36 PM" width="565" height="898" srcset="https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM.jpg 758w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM-189x300.jpg 189w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM-645x1024.jpg 645w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM-15x24.jpg 15w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM-23x36.jpg 23w, https://insidegnss.com/wp-content/uploads/2020/10/Screen-Shot-2020-10-05-at-2.33.36-PM-30x48.jpg 30w" sizes="auto, (max-width: 565px) 100vw, 565px" /></p>
<h3 class="_Solutions-Ahead">Paired Bounding and Extensions</h3>
<p class="_body-indent ParaOverride-5">Given how difficult it is to guarantee CDF bounding by proving that the above conditions are met, subsequent work developed approaches for achieving a similar guarantee while relaxing them. One such approach is “paired bounding” as described in [3]. This approach replaces the single bounding distribution of [2] with a pair of distributions, one which “left bounds” all possible error values and another which “right bounds” all error values. Mathematically, defining <span class="CharOverride-6">G</span><span class="CharOverride-7">L</span> and <span class="CharOverride-6">G</span><span class="CharOverride-7">R</span> as the CDFs of the left and right bounding distributions, <span class="CharOverride-6">G</span><span class="CharOverride-7">a</span> as the unknown actual CDF, and <span class="CharOverride-6">x</span> representing the vector of possible error values, this requires [3]:</p>
<p class="_body-indent ParaOverride-8"><span class="CharOverride-8"><img decoding="async" class="_idGenObjectAttribute-2" src="image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAUIAAAAWCAYAAAC1xZXJAAAACXBIWXMAABcRAAAXEQHKJvM/AAAK40lEQVR4Xu2cvZMTOxLAf7oix0tsCh/ljXHV+wMYqrgYX8ClO5eQPhPxshuyl+GU6IZ0L3hLzFXdkB+Fian3bihiL+Yv0AVqrTRjzWjGHvOxbFd1jUdqSa1Wq7v1MVZaa740KKUyIAVWWut5O/U2KKVS4J/ACyDTWpetBS4xiCwyoNRaJ63EAbiS5RVcAagmQ6iUmgMzed0AK4zh2gQLdACl1AgogDvsOfFkAi/ldaG1zpupvx4opWaAb+wLjNEqgwU6wo8oyyu4ghic3zw+Ak6BNzc+vv+lgeYU4MbH93+7SNRaVxBYYAyflqf9bTGpl+mCwAhjTDWQxui7YK3OeUf6SYxuCAQSoPTk5v/WGIMTraeh7kPLcpA6LyOKnGYxum8Fvydeh8D1eHq6Hk/P1+PpUQvN7fV4qtfj6a82rUIA5DgDmHjpmZ3AMUaaEDjb1wA01DvBGexJhDYRHs4OOdkxy/4tg+e1r9nRoUg9VpZZjLYP9pHlj4aY1VEusili9F8TZRyXGOdbxOgvC67H0/ti4J50oP1VaG9r7RlCEZw1ghUvgvGCeleh4gxAGaPdBXGGOo/QzahGZhvp9yTWRlfELINt/Wkgf8V+DuWbkOWPgBi9X+AiZYtZrOzXQIwDLmq85rFylwXX4+mr9Xj6ey3tp/V4+nw9np7W0o8kcjzVWgwh1UglDTUiQk5izDSUPUg06NU/8fgfdaCf46JfiyvpY7R8S70j3FZC3tJ2GqurpY1Dy9I6vU6yvIyImQ+D68chkGqkanktMQZ8Eit/WdBb7j7x0mzUp9fjqQ6UeS55R2itwXmRMtbgLugN0CRCtxBeznxaGewzyQvuBbLD/hZm0qdUPf4Go1i991Zw0dSGAymhx2cjf9KvJU6WIy8vkfSiqQ6cPqQxfg6FmDG3fFiZLmo0GdUIf8XuznoSqK9kzxUDxvFZ3U29dH+MlrF6anUOqrdevXae9ZV5dH/+0LgeT5/4S11JO40YwoeS9wiq0VQaa7Av4qLNTYQup3o4k0v6xEvTNE/epV+uL1LdV/EnwoKOUUCd96ERL3JvoRlhlLP0+Enr5SN1ZKF+eOmNZYdAnE5uMGOS4iboUmhyry8FVaOZxNrw2rKGSnuYM8Dkxm2TWIO18fJ8/rNYXVImYTv6O2OAeUt1f7gu8zzAcyFoedlbXvugLIvPa2n3127fUAfK2CjyORxYuTGGRNOyvyiDUGI8klWeUvJWIuyUFoXx+tHYTlcksHTuUCbx6JMY/S5IN1kmIrMRzjmc4RR9hZFl2rcdDqwrXjt2Aia19Jmk235t8Cagl1/G2hD6i/5wgKUvxlAs5Lc1GDOv3YX8jkZxVPWrZOClL07fk1r6DGccbft1mW/oKPND4Xo8/X09nv43kH67yRBK/vl6PH11TQQM8JrDwChGoM39t4m8rpRSALeUUrmkJ1rrVaisBwXwD1w9+8BGnp+B622EHiTy/Ky1Llro9oEusiyQ+59KqTPgZ9w+UomRpe1fE1hZz2rpJRE9UUolbfktsPL4SoDXdTlqrVdKqaeYcQbjGM9q+S+AE6XUqEM/fehD2wl09YJ7ATzAGLAT4LHWehko9rVgTrPMlziZPw7IPAd+VkpN9I53WQeA28CbGFEAjoCja8BdSSj8XKXUBDN5fCi01hmHh9cYvk6Av3Ywgj7cihGEQPqbCto6PmA89sXAt0Aizy1exSD5Rmyjd/iipi9orQvrVDDtdzGCPlScgDYXrfMgpYP/RPKb4B5OB7s4nw8NhqSU54yaTtdBa50ppUqMEXiA0bmljFc+sENbYdo4AV70NYIylvcw+nkCPAOeKaVeAmd6/0vw+8jc6tQEJ/8vDX9gjNou8Oma91KZwFrrUj6Fs4r90jeCgS8m8gG9wQqjlC9879MRPscILMjXGXOMl77jZb1g94kQMtopRkGuY4zrLEBzKLBOZdnToewKT2MEDVDW3n3HAVw4q4W8lvV8AVuuKb8C1rjXHOEJJqr8gHGCywF0u8BFVbYPvUD0sVBKLXC8PgAeSNRmed1lnD8TlvkIx2+TE+0l8wPBG+Dh+c3joxsf33+KEQOc3zy+LT/fgFv3J7q2fsbtuYT2Dia4Deqchr0Vdti7w20u9ymz6FqGA1yf8erJdsnvgn1lSfU6T+eTSdyF8E7tDI007xEWli/pV1rLt/1tPZiLIYfRj8yra6c6GuqdMcD1GbrLfBEoW7KnzPfF9Xj6SPYC79fSL/YI17WvTfwyeMJL6pXjXQ4ONe4Jr3Gz16ujjHVG6HO8QY3Re+UyIpOX8IXqvI3/rogz3lkgb+S1mTSUTwRnQr/FEz1kiTs9trJcxcp4ZTO+riFMcOOzpHqpeYNxwqm8Z/I+w03arcm6C8LFheqSqlHMYmVr9dhxs2Mx+Akr7kqNlYHFTg6Q3WVubUAWa+OQuDYXpPXauzi9rl2fWW/fM7w4aQY3OGm9cpxXLEKN08ET0OOyMy6qm+OUL5G8VmOFU4CshSax/WGAKwe1uq1C5IG81MogkDfDi4AtHQGZ00+WOWZsZ/UyxGUZVG7cXbssVG5IxOiA1U2Lpc87Tl98PAhvVCOvIkZfK7eRshmeccLIc7Do0GtzgjFmfXn9pmTeF9fmgvTFd8YNhvCR5P3kG0Zwx+KrWodTr6NbXgU3KYsYgzijtuUJcdFS7reFm4xnOAOWtLRhB7AtOh3RY7nQB3Hy2vj9xE0ETS0qw1vKWb5x45E1tGONZhrIs4psZTeX9FLeF5jJuKFFDjTIkg73GIdGaTOlOZKeSL/nbX0aCmmI1gN0BWYcNrjrTHM84yLpnSK2XbELr4Ey35TMu6Isg8/X4+nzDrSvfKN5DTMxEsxhwVul1DsM3MFdH1mxDTN5FoG8Oiwxp1wp2yewiTxPMIcjC3nPkY1gwce64fBC/kbqOuZUK8SrDxPZGO8Dm1i9Wutcro6cAL/JRnuJOaiwBzhFrViG4fvvXv0beTa1l+NkmdfyZpj6rLysrHPMRv0zeb+nGzb/e8ry4NA05l5+yY6b9KIHk3aqIGyIw115fsY4pI1SqpD3W8Bb4J2n760ghxYz+kMXXitwSJkfEm58fP/H+c3jX4Dn5zeP/3Xj4/t/h+jObx4/Au4Df7k4WLEWEmPdM8EFErbL+1b4jotckpj1pbppn9TyEttmoJzlKbaUK2mIOANt6R2wiPXRa2OGk+MF7xiZ1iOsDbWtBdzyOLhkwsiyJCzLVNoMRd4LOmyg4yLOUB2p5K3qed8jUj3A6INFpN4JbvxHtTyrH/N6XqTOpANfvXm9jCiHIA/75Df+MWsMlFIrTNR4pOVumnjYkQ5EEsr80etvwDv632drBLnMeYKJJtMI7QQzmftCqfe/p1UB8fCfMJdYE0mbAP/DRAqN3t+T5QeMcR1ali914J6jRDR3MRFlUc//3kAi+CRCFoLB9SEG35LuXkqIWdcmJBAZYKKZvKVMasuxw95Fra4R3mEOPbzrt4C4Q4zCS7P9yeW9sU8HlOUq1C5ukzyN1XeFV/i94Z/YASQiAdnHUkpN5JLnXVr2DLXxTPcwE++tXALtDdJ+iVlePNVaJ3qgqOhLgTZR82fMnuVcorGLKFDeG+UzoCwTjCxPMLJsijBzzFc+eSDvCq7gu4beS2NlvigpaP4k58+6wy18a0x1/y9H7DJhjomcvisD6IM4jwwjyxe4u1u3MF+EzLv070qWV3AF+8H/AX0tsCiSAGSpAAAAAElFTkSuQmCC" alt="" /></span></p>
<p class="_body-indent ParaOverride-9"><span class="CharOverride-8"><img decoding="async" class="_idGenObjectAttribute-2" src="image/png;base64,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" alt="" /></span></p>
<p class="_body-indent ParaOverride-7">A combination of left and right-hand bounding distributions that satisfies these conditions preserves bounding through convolution (including range-to-position domain convolution) even if these three distributions do not meet the (single) CDF bounding conditions described above.</p>
<p class="_body-indent ParaOverride-7">One difficulty of this approach is the need to create and convey distinct left and right-hand bounding distributions to users whose protection-level equations assume a single bounding distribution. The implementation proposed in [3] creates separate but parallel left and right-hand Gaussian bounding distributions with the same standard deviation and the same bias magnitude as the empirical distribution used as input (i.e., a data-generated estimate of the actual distribution). Thus, only a single bias parameter is added to the standard deviation that is already transmitted. If existing user interfaces do not have room to add this bias, the broadcast standard deviation must be inflated substantially to bound this bias with a zero-mean Gaussian distribution.</p>
<p class="_body-indent ParaOverride-7">Another weakness of paired bounding is illustrated in a more recent paper [4]. It is very difficult to meet the pair-bounding condition when, as just mentioned, the actual distribution (<span class="CharOverride-6">G</span><span class="CharOverride-7">a</span>) is represented by an empirical function generated from data (e.g., a histogram of error values collected into discrete bins) without excessive conservatism, such as selecting a bias value that is orders of magnitude larger than the sample mean. An extension of paired bounding using “excess mass” functions (see [5]) is one way to ameliorate this conservatism and is also applied in [4].</p>
<h3 class="_Solutions-Ahead">Single-CDF and Paired Bounding</h3>
<p class="_body-indent ParaOverride-5">The method proposed in [4] combines the single CDF and paired bounding techniques in a two-step process. The first step applies a heuristic algorithm to create a single discrete symmetric and unimodal distribution from the original data set (expressed as a histogram) which in general is neither symmetric nor unimodal. The second step determines the means and standard deviations of two Gaussian distributions that left-bound and right-bound the output of the first step. Because each of these two bounds starts with a symmetric, unimodal distribution but only has to bound half of its CDF (instead of all of it), the resulting bias needed to meet the CDF bounding condition is much lower than for single-step paired bounding. Matlab scripts that implement the methods described in [4] are available online at [7].</p>
<p class="_body-indent ParaOverride-7"><span class="_figure-flash" lang="fi-FI">Figure 2</span> (from Figure 3(b) of [4]) shows this improvement graphically by comparing the CDFs of the tighter two-step Gaussian bound (in green) to the looser (more conservative) one-step Gaussian bound that would have been generated (in black) using paired bounding only. The blue line represents the CDF of the original sampled data, and the almost identical red line shows the CDF after heuristic modification to make it symmetric and unimodal.</p>
<h3 class="_Solutions-Ahead">Non-Gaussian Bounding and EVT</h3>
<p class="_body-indent ParaOverride-5">The methods described above focus on developing Gaussian distribution bounds for empirical error data with unknown distributions. In other words, the only knowledge of the actual error distribution (at least in the tails) comes from the collected data itself. Many examples of collected error data have tails that appear fatter than Gaussian as far as the data extends. Any form of Gaussian bounding implicitly assumes that actual error probabilities beyond those covered by the number of samples (and are thus unobservable) fall below the Gaussian tail shape, which is very optimistic since Gaussian tails fall off quickly with increasing error sizes. Even within the range of probabilities covered by the empirical data, high inflation factors are often required to bound the observed tails (see the example in Part I).</p>
<p class="_body-indent ParaOverride-7">Approaches have been developed that addresses this limitation by proposing non-Gaussian (and fatter-than-Gaussian) distributions to bound the tails of the distribution. The method proposed in [6] combines Gaussian bounding of the core (center) of the actual error distribution with bounding via a generalized Pareto distribution (GPD) for the tails. Use of the GPD is motivated by Extreme Value Theory (EVT), which has been applied in many fields to approximate bounds on low-probability events. EVT states that the tails of all continuous distributions approach that of the GPD as the threshold separating the tail from the core approaches a maximum value (up to infinity—see Section 3 of [6] for details). Since the actual threshold cannot be infinite to be useful, this is an approximation at best, but the GPD is practically useful as a better model of fatter-than Gaussian tails. Section 4 of [6] describes a method of selecting appropriate threshold values and estimating the Gaussian and GPD parameters of the core and tail components that form a combined bounding distribution.</p>
<p class="_body-indent ParaOverride-7">The benefits of the combined Gaussian core/GPD tail bounding approach in [6] is illustrated in <span class="_figure-flash" lang="fi-FI">Figure 3</span> (Figure 8 from [6]), which uses a data set of 5 years of estimated Differential GPS pseudorange errors between two NGS CORS reference stations tracking satellites at elevation angles between 30 and 35 degrees (range-domain errors are a function of elevation angle, so only measurements at nearly the same elevation angles should be combined to limit the “mixing” phenomenon described in Part I). In this figure, the y-axis probabilities are scaled such that the CDF of a Gaussian distribution is a straight line. The black line shows the empirical CDF of the observed data, which is much more closely fit by the combined Gaussian/GPD bounding CDF (dashed red line) compared to the dotted blue line formed by a single bounding Gaussian distribution. As a result, use of the Gaussian/GPD bound in (modified) protection-level calculations gives a lower protection level than would be obtained using existing protection level equations with a single Gaussian distribution.</p>
<h3 class="_Solutions-Ahead">Conclusions</h3>
<p class="_body-indent ParaOverride-5">This article has introduced several analytical approaches to bounding unknown GNSS range-domain error distributions with Gaussian distributions, potentially augmented with non-Gaussian tail distributions. Analytical methods have three general advantages over the purely empirical approach of Part I:</p>
<p class="_body-indent ParaOverride-5">• They provide additional flexibility in modeling low-probability (tail) error behavior,</p>
<p class="_body-indent ParaOverride-5">• They are more systematic and repeatable, and</p>
<p class="_body-indent ParaOverride-5">• They provide theoretical assurance that the resulting bounds hold at the required integrity probabilities under certain conditions.</p>
<p class="_body-indent ParaOverride-7">In practice, these advantages are useful but are less important than they might seem. The use of non-Gaussian models of errors in the tail leads to significantly tighter bounds, but it conflicts with the many existing applications whose protection level equations assume Gaussian-distributed tails only. Systematized algorithms help reduce variations due to individual judgement, but extensive judgment is still required, particularly when deciding how to collect representative error data, how to sort it into sets that represent different environmental conditions, and how much error data is needed to provide sufficient sampling of errors at low probabilities.</p>
<p class="_body-indent ParaOverride-7">Finally, the theoretical bases for assured bounds generally do not apply in the real world (or, at least, they cannot be demonstrated to apply), thus they can only be assumed or “asserted.” Beyond the conditions described here, these analytical methods (and the empirical approach in Part I) assume that range-domain errors on individual satellites are statistically independent when they are combined into the position domain. This is virtually never true due to atmospheric delays being correlated in space and multipath errors being correlated by the local reflective environment. Furthermore, all these methods assume that the empirical CDFs of collected error data are perfect models of the actual error distribution out to infinitely small probabilities. Because of practical limits on the number of data samples and unavoidable differences between practical data-collection scenarios and the much larger set of environments that affect actual users, this cannot be the case either. All these factors must be kept in mind when utilizing the results of any error bounding algorithm in a safety-critical application.</p>
<h3 class="_Solutions-Ahead ParaOverride-3">References</h3>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(1) </span>S. Pullen, “Why is bounding GNSS errors under rare or anomalous conditions important?” <span class="CharOverride-6">Inside GNSS,</span> May/June 2020.</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(2) </span>B. DeCleene, “Defining Pseudorange Integrity—Overbounding,” Proceedings of ION GPS 2000, Salt Lake City, UT, 2000.</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(3) </span>J. Rife, S. Pullen, P. Enge, B. Pervan, “Paired Overbounding for Nonideal LAAS and WAAS Error Distributions,” IEEE Transactions on Aerospace and Electronic Systems, Vol. 42, No. 4, October 2006..</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(4) </span>J. Blanch, T. Walter, P. Enge, “Gaussian Bounds of Sample Distributions for Integrity Analysis,” <span class="CharOverride-6">ibid</span>, Vol. 55, No. 4, October 2018.</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(5) </span>J. Rife, T. Walter, J. Blanch, “Overbounding SBAS and GBAS Error Distributions with Excess-Mass Functions,” Proceedings of 2004 International Symposium on GNSS/GPS, 2004.</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(6) </span>J.D. Larson, D. Gebre-Egziabher, J. Rife, “Gaussian-Pareto Overbounding of DGNSS Pseudoranges from CORS,” <span class="CharOverride-6">Navigation: Journal of the Institute of Navigation</span>, Vol. 66, No. 1, Spring 2019, pp. 139-150.</p>
<p class="_body-3-no-indent ParaOverride-10"><span class="_small-RED">(7) </span>“Gaussian Overbound,” Stanford GPS Lab Software Tools (Online), https://gps.stanford.edu/resources/software-tools/gaussian-overbound.</p>
<p>The post <a href="https://insidegnss.com/can-analytical-techniques-guarantee-that-gnss-errors-are-bounded-under-rare-conditions-what-techniques-are-available/">Can Analytical Techniques Guarantee That GNSS Errors Are Bounded Under Rare Conditions? What Techniques Are Available?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What freeware or open-source software packages are available to support GNSS performance evaluations?</title>
		<link>https://insidegnss.com/what-freeware-or-open-source-software-packages-are-available-to-support-gnss-performance-evaluations/</link>
		
		<dc:creator><![CDATA[Sam Pullen]]></dc:creator>
		<pubDate>Mon, 27 Jan 2020 04:13:59 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=182478</guid>

					<description><![CDATA[<p>In the years since civil and commercial use of GPS and GNSS became common in the mid-1990s, a variety of software tools have...</p>
<p>The post <a href="https://insidegnss.com/what-freeware-or-open-source-software-packages-are-available-to-support-gnss-performance-evaluations/">What freeware or open-source software packages are available to support GNSS performance evaluations?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In the years since civil and commercial use of GPS and GNSS became common in the mid-1990s, a variety of software tools have been developed to perform offline analyses of GNSS performance and data collected from GNSS receivers. Some of these tools are part of commercial software packages such as Matlab [1] or STK [2]. This article focuses on tools that are freely available (as of early 2020) and are standalone or work with commercial software.</em><span id="more-182478"></span></p>
<p class="body-txt-1-no-indent-RR-drop-cap"><span class="_idGenDropcap-1">A</span>t least two different classes of GNSS analysis software exist, although some tools support multiple objectives. The first class includes tools that predict GNSS performance based on propagating GNSS satellite orbits and calculating GNSS performance factors at specific user locations and times based on the projected locations of GNSS satellites (“satellite geometries”). The second class focuses on analysis of previously-collected GNSS measurements converted into a standard data format. This article will focus on performance prediction, and a later article within this column will examine the processing of measurement data. Future articles in this column may also consider the use of software tools to emulate GNSS receiver functions in real-time and post-processing.</p>
<p class="body-txt-1-indent-RR ParaOverride-3">One of the original motivations for software to predict GNSS performance was simply to show the quality of future GNSS satellite geometry at specific places and times. In the early years of GPS, when the GPS constellation had fewer and shorter-lived satellites than it does now, periods of weak GPS geometries (either an insufficient number of visible and healthy satellites to compute a solution or a sufficient number but with poor Dilution of Precision, or DOP, which relates range measurement error to position and/or timing error) were not uncommon. However, absent a sudden change in the health of the GPS satellites, these periods could (and can) be predicted in advance.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-182480" src="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM.jpg" alt="Screen Shot 2020-01-26 at 11.02.58 PM" width="551" height="970" srcset="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM.jpg 1016w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-170x300.jpg 170w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-582x1024.jpg 582w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-768x1352.jpg 768w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-873x1536.jpg 873w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-14x24.jpg 14w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-20x36.jpg 20w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.02.58-PM-27x48.jpg 27w" sizes="auto, (max-width: 551px) 100vw, 551px" /></p>
<h3 class="_Solutions-Ahead">Trimble Online GNSS Planning Tool</h3>
<p class="_body-indent ParaOverride-4">The Trimble Online GNSS Planning Tool available at [3] is useful because it is easy to access and run. It is an evolution of software previously provided by Trimble to help surveyors and other users of Trimble GNSS receivers identify the periods when GNSS satellite geometries would be good enough to support their applications. <span class="_figure-flash" lang="fi-FI">Figure 1</span> shows the screen presented to a user when first connecting to the website. The central window shows the default user location at the intersection of the equator and the prime meridian, the elevation angle cutoff (“mask angle”) for satellite visibility, and the time period to be simulated, while the left-hand screen shows the GNSS satellite constellations that can be used (or not used) as part of the performance prediction. All of these parameters are easy to change. The user location, for example, can be changed manually or by using the map in the right-hand window, while the usable satellites can be set by constellation or individually by satellite (using the “Satellite Library” menu tab). When constellations are selected to be used, all satellites marked as “healthy” by the latest almanac downloaded for that constellation are set to be used, while those marked as “unhealthy” are set as unused, but this can be changed on a satellite-by-satellite basis.</p>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figure 2</span> shows a scenario in which the user location has been changed to St. John’s, Newfoundland and Labrador, Canada, to investigate GNSS performance at higher latitudes. The left-hand window shows that only GPS satellites are used in this scenario and that 30 GPS satellites are healthy in the latest almanac. The time of interest is set to be the 24 hours following midnight Universal Time (UT) on Christmas Day, 25 December 2019 (note that local time in St John’s is 3 hours and 30 minutes behind UT in winter), and the elevation mask angle is left at the default value of 10 degrees.</p>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figure 3</span> shows two of the plots obtained by selecting the “Charts” menu item at the top of the screen. The upper plot shows the number of visible (and healthy) GPS satellites in view over the selected time period, and the lower plot shows five varieties of DOP values over this period, differentiated by different line colors. (The cursor can be placed at any point within the plot to read off exact numbers.) These plots show that between 7 and 12 healthy GPS satellites are visible over this period, and the PDOP (3D position DOP, not including time) varies between about 1.3 and 3.5, which is significant.</p>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figure 4</span> shows these same two plot results when the scenario is changed to use all satellite constellations. Now, as expected, the picture is very different, as GLONASS, Galileo, and BeiDou satellites also contribute significantly to positioning geometry (QZSS and IRNSS are used but are not visible at this location). The total number of visible and healthy satellites now ranges from 24 to 35, and PDOP varies between about 0.8 and 1.3. Not only are the DOPs much improved from before, but their variation with time decreases, making it much more unlikely that periods of unavailability will exist.</p>
<p class="body-txt-1-indent-RR ParaOverride-3">A key limitation of this tool is that all satellites are treated as having identical performance (both within and across constellations) except for being healthy or unhealthy, and key details such as satellite almanac parameters are fixed and cannot be changed. To perform more in-depth studies of GNSS performance, tools that allow access to these details and allow users to design their own performance metrics are needed.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-182481" src="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM.jpg" alt="Screen Shot 2020-01-26 at 11.05.12 PM" width="740" height="684" srcset="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM.jpg 1762w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-300x277.jpg 300w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-1024x946.jpg 1024w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-768x710.jpg 768w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-1536x1419.jpg 1536w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-24x22.jpg 24w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-36x33.jpg 36w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.12-PM-48x44.jpg 48w" sizes="auto, (max-width: 740px) 100vw, 740px" /></p>
<h3 class="_Solutions-Ahead">Stanford MAAST</h3>
<p class="body-txt-1-indent-RR ParaOverride-4">The Stanford Matlab Algorithm Availability Simulation Tool, or MAAST, is available at [4] and is a publicly-available set of source-code scripts that run within Matlab (and require a Matlab license to use). MAAST was originally developed about 20 years ago to predict Satellite-based Augmentation System (SBAS) performance (now “MAAST Version 1.4”) and has more recently been extended to support Advanced RAIM or ARAIM analysis (in “MAAST for ARAIM Version 0.4”). Dated but useful information on using and modifying MAAST software is contained in the “User’s Guide” and “Developer’s Guide” also available at [4]. Both versions of the MAAST source code can be modified and extended to support other GNSS applications.</p>
<p class="_body-indent ParaOverride-5">The script “maast.m” within the SBAS version of MAAST currently runs a script called “maastgui.m,” which provides a graphical user interface (GUI) that allows users to change settings and execute performance simulations. This can be changed to instead run “maast_no_gui.m,” which allows these settings and parameters to be altered within the Matlab files. <span class="_figure-flash" lang="fi-FI">Figure 5</span> shows the control panel of the GUI after it has been altered to change certain parameters, including the values of UDRE (satellite clock/ephemeris error after SBAS corrections), GIVE (grid ionospheric vertical error after SBAS corrections), CNMP (receiver code noise and multipath error) models, user grid (covering all of North America in a grid of 2 × 2 degrees in latitude and longitude), GPS satellite almanac (the Yuma almanac for GPS Week 35 as of early December 2019, downloaded from the U.S. Coast Guard Navigation Center website at [5] and copied into the MAAST folder), the time update interval (one day at 300-second or 5-minute updates starting from the time of applicability of the almanac), the alert limits for SBAS-supported LPV approaches (HAL = 40 m, VAL = 35 m, corresponding to LPV-200, meaning LPV down to a 200-ft minimum decision height), and the output contour plots desired (vertical and horizontal protection levels, VPL and HPL, in addition to LPV-200 availability).</p>
<p class="body-txt-1-indent-RR ParaOverride-3">Pressing the “RUN” button at the lower right in the GUI starts a MAAST simulation with these parameters that generates the selected plots. Figure 6 shows the resulting contours of LPV-200 availability, which is defined as the probability at a given user grid location over the 288 simulated GPS geometries that VPL ≤ VAL and HPL ≤ HAL. The color scale at the bottom of the figure indicates the range of availability achieved within each contour, and these contours show how LPV-200 availability with these settings varies from above 99.9% (meaning in this case that all 288 geometries are available) near the center of the simulated reference station network to lower values farther away from the center of North America. The “Coverage(95%)” statistic at the bottom right indicates the percentage of user locations in the 2 x 2 user grid within the map that have availability of 95% or higher. It is less than 50% because the majority of the user grid is far away from the reference station network and does not expect to obtain high availability from SBAS.</p>
<p class="_body-indent ParaOverride-5">Since vertical positioning is more challenging than horizontal positioning for GNSS, and because VAL is below HAL for LPV-200, the VPL ≤ VAL constraint on availability dominates the similar constraint on HPL. <span class="_figure-flash" lang="fi-FI">Figure 7 </span>shows contours of 95th-percentile (95%) values of VPL from the same run that generated the availability results of <span class="_figure-flash" lang="fi-FI">Figure 6.</span>These contours roughly (but not exactly) correspond to those of <span class="_figure-flash" lang="fi-FI">Figure 6,</span> as the region in <span class="_figure-flash" lang="fi-FI">Figure 6</span> where availability exceeds 95% (light blue or darker) is similar to the region in <span class="_figure-flash" lang="fi-FI">Figure 7</span> where 95% VPL is below the VAL of 35 meters (light green or darker).</p>
<p class="_body-indent ParaOverride-5">Note that, because the parameters shown in the GUI settings of <span class="_figure-flash" lang="fi-FI">Figure 5</span> (particularly the fixed values of UDRE and GIVE) are idealized and only roughly approximate actual SBAS values, these results do not mirror those achieved by today’s SBAS in North America (WAAS). Non-public versions of MAAST include the actual (proprietary) WAAS algorithms and give very accurate predictions for today’s WAAS as well as variations that are being considered for the future. The internal code of public version of MAAST described here can be modified to input WAAS UDRE or GIVE maps stored online, such as those provided in real time at the FAA NSTB website [6].</p>
<p class="body-txt-1-indent-RR ParaOverride-3">To show how to modify MAAST internal code scripts, it is easier to start with the ARAIM version mentioned above, which only runs in offline mode (starting with “main_maast_araim.m”). ARAIM is an evolution of traditional RAIM that uses multiple hypothesis solution separation to support real-time monitoring of multiple-satellite and constellation faults and is thus not limited to single-satellite faults, as is traditional RAIM. A detailed algorithmic description of ARAIM is at [7] (also see [Blanch, et al, 2015]).</p>
<p class="_body-indent ParaOverride-5"><span class="_figure-flash" lang="fi-FI">Figures 8 and 9 </span>show the results of running the default ARAIM version of “main_maast_araim.m” except for two changes to reduce the granularity in the results. The first change (at lines 214-215) is to change the worldwide user grid to 5 × 5 instead of 10 × 10 degrees. The default ARAIM user grid covers almost the entire world because it is based on uncorrected (“standalone”) GNSS measurements and is not region-limited, as is SBAS. The second change (at line 225) reduces the interval between time epochs from 300 to 60 seconds, meaning that 1440 separate epochs are run to complete 1 day. Note that, unlike for SBAS, this ARAIM simulation uses a combination of 24 GPS satellites and 24 Galileo satellites to provide high availability of LPV-200 while also considering possible faults of all satellites in one constellation or the other.</p>
<p class="_body-indent ParaOverride-5">The availability contours in <span class="_figure-flash" lang="fi-FI">Figure 8 </span>show that the use of both GPS and Galileo (with the assumed default parameters) provides LPV-200 availability of 99.9% or better in most locations on Earth. Some high-latitude locations in both northern and southern hemispheres (at latitudes above the inclinations of GPS and Galileo satellite orbits) have availabilities as low as 99%. The contours of 99.5th-percentile VPL in <span class="_figure-flash" lang="fi-FI">Figure 9</span> show that it is these high latitudes that have the highest probability of VPL exceeding the 35-meter VAL for LPV-200. Within 60 degrees of the Equator, the 99.5th-percentile VPL appears to never exceed 35 meters.</p>
<p class="_body-indent ParaOverride-5">Again, the key advantage of the no-GUI version of MAAST is the ability to modify any of the parameters or algorithms that are described in the code. <span class="_figure-flash" lang="fi-FI">Table 1</span> summarizes where several key aspects of the ARAIM performance model are described in MAAST code files so that specific changes are easier to make.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-182482" src="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM.jpg" alt="Screen Shot 2020-01-26 at 11.05.36 PM" width="735" height="349" srcset="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM.jpg 2308w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-300x142.jpg 300w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-1024x486.jpg 1024w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-768x365.jpg 768w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-1536x729.jpg 1536w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-2048x973.jpg 2048w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-24x11.jpg 24w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-36x17.jpg 36w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.05.36-PM-48x23.jpg 48w" sizes="auto, (max-width: 735px) 100vw, 735px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-182483" src="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM.png" alt="Screen Shot 2020-01-26 at 11.09.48 PM" width="706" height="292" srcset="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM.png 1486w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-300x124.png 300w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-1024x423.png 1024w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-768x317.png 768w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-26-at-11.09.48-PM-48x20.png 48w" sizes="auto, (max-width: 706px) 100vw, 706px" /></p>
<h3 class="_Solutions-Ahead">Other Performance Analysis Tools</h3>
<p class="body-txt-1-no-indent-RR-">Several other GNSS analysis tools are freely available online, including the GPS Toolkit (GPSTk) [8] and RTKLIB [9]. Both of these are extensive and capable packages that support measurement analysis and position calculations based on data collected from GNSS receivers and stored in RINEX or other formats. A description of tools like these will appear in a subsequent article in this column.</p>
<h3>Useful Links</h3>
<p><a href="https://gpsoftnav.com/products/satellite-navigation-satnav-toolbox-3-0/">SatNav Toolbox for Matlab</a></p>
<p><a href="http://help.agi.com/stk/index.htm#stk/vehSat_orbitProp_GPSProperties.html">GPS Propagator for STK </a></p>
<p><a href="http://www.gnssplanning.com/#/settings">Trimble GNSS Planning Online</a></p>
<p><a href="https://gps.stanford.edu/resources/tools/maast">Stanford Matlab Algorithm Availability Simulation Tool (MAAST)</a></p>
<p><a href="https://www.navcen.uscg.gov/?pageName=gpsAlmanacs">U.S. Coast Guard Navigation Center website for GPS NANUS, ALMANACS, OPS ADVISORIES, &amp; SOF</a></p>
<p><a href="https://www.nstb.tc.faa.gov/RT_WaasSIGPStatus.htm">Federal Aviation Administration William J. Hughes Technical Center WAAS Team test site</a></p>
<p><a href="http://web.stanford.edu/group/scpnt/gpslab/website_files/maast/ARAIM_TSG_Reference_ADD_v3.0.pdf">ARAIM Reference ADD, Version 3.0 (2017)</a></p>
<p><a href="https://github.com/SGL-UT/GPSTk">GPS Toolkit (GPSTkt) </a></p>
<p><a href="http://www.rtklib.com">RTKLIB: An Open Source Program Package for GNSS Positioning</a></p>
<h3>Additional Reading</h3>
<p><img loading="lazy" decoding="async" class="wp-image-182492 alignleft" src="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM.png" alt="Screen Shot 2020-01-27 at 9.49.20 PM" width="769" height="104" srcset="https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM.png 1046w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-1024x139.png 1024w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-768x104.png 768w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2020/01/Screen-Shot-2020-01-27-at-9.49.20-PM-48x7.png 48w" sizes="auto, (max-width: 769px) 100vw, 769px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://insidegnss.com/what-freeware-or-open-source-software-packages-are-available-to-support-gnss-performance-evaluations/">What freeware or open-source software packages are available to support GNSS performance evaluations?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
